Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
0438.pdf.exe

Overview

General Information

Sample name:0438.pdf.exe
renamed because original name is a hash value
Original sample name: .pdf.exe
Analysis ID:1543779
MD5:2d11dba46735af1cb1c0a42e9564e20d
SHA1:b2e17960c6d080f7aba7df87f57c08b4bc2e7051
SHA256:e19477a56b247e6cc435fee367abcf6e0c3db21de91ae2514b4a6b1807233c53
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sigma detected: Suspicious Double Extension File Execution
Connects to many ports of the same IP (likely port scanning)
Enables network access during safeboot for specific services
Enables remote desktop connection
Initial sample is a PE file and has a suspicious name
Uses an obfuscated file name to hide its real file extension (double extension)
Checks for available system drives (often done to infect USB drives)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Internet Provider seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file contains strange resources
Queries disk information (often used to detect virtual machines)
Queries the installation date of Windows
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Stores files to the Windows start menu directory
Stores large binary data to the registry
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 0438.pdf.exe (PID: 6312 cmdline: "C:\Users\user\Desktop\0438.pdf.exe" MD5: 2D11DBA46735AF1CB1C0A42E9564E20D)
    • msiexec.exe (PID: 3524 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\pdf.msi" /qn MD5: E5DA170027542E25EDE42FC54C929077)
    • Acrobat.exe (PID: 2000 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\Doc.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
      • AcroCEF.exe (PID: 3852 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
        • AcroCEF.exe (PID: 7372 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2228 --field-trial-handle=1508,i,11782010648643187908,10597558926359828636,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
  • msiexec.exe (PID: 6240 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • ROMFUSClient.exe (PID: 8160 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /siex /silentinstall MD5: 63D0964168B927D00064AA684E79A300)
      • ROMServer.exe (PID: 7352 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /siex /silentinstall MD5: F3D74B072B9697CF64B0B8445FDC8128)
    • ROMFUSClient.exe (PID: 7544 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /firewall MD5: 63D0964168B927D00064AA684E79A300)
      • ROMServer.exe (PID: 7768 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /firewall MD5: F3D74B072B9697CF64B0B8445FDC8128)
    • ROMFUSClient.exe (PID: 2132 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /start MD5: 63D0964168B927D00064AA684E79A300)
      • ROMServer.exe (PID: 764 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /start MD5: F3D74B072B9697CF64B0B8445FDC8128)
  • svchost.exe (PID: 7200 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • ROMServer.exe (PID: 4488 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" MD5: F3D74B072B9697CF64B0B8445FDC8128)
    • ROMFUSClient.exe (PID: 7768 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" MD5: 63D0964168B927D00064AA684E79A300)
    • ROMFUSClient.exe (PID: 2144 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /tray MD5: 63D0964168B927D00064AA684E79A300)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
          SourceRuleDescriptionAuthorStrings
          00000008.00000000.1814024336.0000000000401000.00000020.00000001.01000000.0000000B.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
            00000009.00000000.1822596622.0000000000401000.00000020.00000001.01000000.0000000C.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
              SourceRuleDescriptionAuthorStrings
              8.0.ROMFUSClient.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                9.0.ROMServer.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\0438.pdf.exe", CommandLine: "C:\Users\user\Desktop\0438.pdf.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\0438.pdf.exe, NewProcessName: C:\Users\user\Desktop\0438.pdf.exe, OriginalFileName: C:\Users\user\Desktop\0438.pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\Desktop\0438.pdf.exe", ProcessId: 6312, ProcessName: 0438.pdf.exe
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 111.90.140.76, DestinationIsIpv6: false, DestinationPort: 465, EventID: 3, Image: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe, Initiated: true, ProcessId: 4488, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 52493
                  Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7200, ProcessName: svchost.exe
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\EULA.rtfJump to behavior
                  Source: 0438.pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: 0438.pdf.exe
                  Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeFile opened: c:
                  Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FFB190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF665FFB190
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FE40BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF665FE40BC
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF66600FCA0 FindFirstFileExA,0_2_00007FF66600FCA0
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeFile opened: C:\Windows\SysWOW64\wininet.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeFile opened: C:\Windows\SysWOW64\winspool.drv
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_a8625c1886757984\COMCTL32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_a8625c1886757984
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeFile opened: C:\Windows\SysWOW64\
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeFile opened: C:\Windows\SysWOW64\winmm.dll

                  Networking

                  barindex
                  Source: global trafficTCP traffic: 111.90.140.76 ports 5651,8080,1,465,5,6,80
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeRegistry value created: NULL Service
                  Source: global trafficTCP traffic: 192.168.2.4:52490 -> 111.90.140.76:5651
                  Source: global trafficTCP traffic: 192.168.2.4:52495 -> 65.21.245.7:5555
                  Source: Joe Sandbox ViewASN Name: SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: global trafficDNS traffic detected: DNS query: x1.i.lencr.org
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B27BE000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.dr, 5ded59.msi.3.dr, 5ded5c.msi.3.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                  Source: svchost.exe, 00000005.00000002.3418433466.00000265D3400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                  Source: svchost.exe, 00000005.00000003.1761372145.00000265D3618000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                  Source: svchost.exe, 00000005.00000003.1761372145.00000265D3618000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acosgr5ufcefr7w7nv4v6k4ebdda_117.0.5938.132/117.0.5
                  Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                  Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                  Source: svchost.exe, 00000005.00000003.1761372145.00000265D3618000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                  Source: svchost.exe, 00000005.00000003.1761372145.00000265D3618000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                  Source: svchost.exe, 00000005.00000003.1761372145.00000265D364D000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                  Source: qmgr.db.5.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                  Source: ROMFUSClient.exe, 00000008.00000000.1818737515.00000000008E4000.00000002.00000001.01000000.0000000B.sdmp, ROMServer.exe, 00000009.00000000.1825724042.00000000009FE000.00000002.00000001.01000000.0000000C.sdmp, ROMServer.exe, 0000000E.00000002.3584968888.000000000180C000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000011.00000002.3585086886.000000000296C000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000011.00000002.3585086886.000000000286C000.00000004.00001000.00020000.00000000.sdmp, English.lg.3.drString found in binary or memory: http://litemanager.com/
                  Source: ROMServer.exe, 0000000E.00000002.3584968888.0000000001813000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000011.00000002.3585086886.0000000002973000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://litemanager.com/03
                  Source: ROMServer.exe, 0000000E.00000002.3584968888.000000000180C000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000011.00000002.3585086886.000000000296C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://litemanager.com/1
                  Source: ROMFUSClient.exe, 00000008.00000000.1818737515.00000000008E4000.00000002.00000001.01000000.0000000B.sdmp, ROMServer.exe, 00000009.00000000.1825724042.00000000009FE000.00000002.00000001.01000000.0000000C.sdmpString found in binary or memory: http://litemanager.ru/
                  Source: ROMServer.exe, 00000009.00000000.1822596622.0000000000401000.00000020.00000001.01000000.0000000C.sdmpString found in binary or memory: http://litemanager.ru/noip.txtU
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B27BE000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.dr, 5ded59.msi.3.dr, 5ded5c.msi.3.drString found in binary or memory: http://ocsp.thawte.com0
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B27BE000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.dr, 5ded59.msi.3.dr, 5ded5c.msi.3.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B27BE000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.dr, 5ded59.msi.3.dr, 5ded5c.msi.3.drString found in binary or memory: http://s2.symcb.com0
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B27BE000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.dr, 5ded59.msi.3.dr, 5ded5c.msi.3.drString found in binary or memory: http://sv.symcb.com/sv.crl0f
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B27BE000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.dr, 5ded59.msi.3.dr, 5ded5c.msi.3.drString found in binary or memory: http://sv.symcb.com/sv.crt0
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B27BE000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.dr, 5ded59.msi.3.dr, 5ded5c.msi.3.drString found in binary or memory: http://sv.symcd.com0&
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B27BE000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.dr, 5ded59.msi.3.dr, 5ded5c.msi.3.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B27BE000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.dr, 5ded59.msi.3.dr, 5ded5c.msi.3.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B27BE000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.dr, 5ded59.msi.3.dr, 5ded5c.msi.3.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                  Source: ROMFUSClient.exe, 00000008.00000003.1836347325.0000000002807000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000008.00000000.1814024336.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, ROMServer.exe, 00000009.00000000.1822596622.0000000000951000.00000020.00000001.01000000.0000000C.sdmp, ROMServer.exe, 00000009.00000003.1827354006.00000000011C7000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 0000000A.00000003.1849784435.0000000002837000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 0000000B.00000003.1847557448.0000000002A17000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 0000000C.00000003.1891012785.00000000028D7000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 0000000D.00000003.1886219496.0000000001157000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 0000000E.00000002.3584968888.0000000001777000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000010.00000002.3584341571.0000000002897000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000011.00000002.3585086886.00000000028D7000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.indyproject.org/
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B27BE000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.dr, 5ded59.msi.3.dr, 5ded5c.msi.3.drString found in binary or memory: http://www.symauth.com/cps0(
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B27BE000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.dr, 5ded59.msi.3.dr, 5ded5c.msi.3.drString found in binary or memory: http://www.symauth.com/rpa00
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B27BE000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.dr, 5ded59.msi.3.dr, 5ded5c.msi.3.drString found in binary or memory: https://d.symcb.com/cps0%
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B27BE000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.dr, 5ded59.msi.3.dr, 5ded5c.msi.3.drString found in binary or memory: https://d.symcb.com/rpa0
                  Source: svchost.exe, 00000005.00000003.1761372145.00000265D36C2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.drString found in binary or memory: https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
                  Source: svchost.exe, 00000005.00000003.1761372145.00000265D3656000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.drString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
                  Source: svchost.exe, 00000005.00000003.1761372145.00000265D36C2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2
                  Source: svchost.exe, 00000005.00000003.1761372145.00000265D36A3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1761372145.00000265D36E8000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1761372145.00000265D3707000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1761372145.00000265D36C2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
                  Source: svchost.exe, 00000005.00000003.1761372145.00000265D36C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
                  Source: ROMFUSClient.exe, 00000008.00000000.1814024336.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, ROMServer.exe, 00000009.00000000.1822596622.0000000000401000.00000020.00000001.01000000.0000000C.sdmpString found in binary or memory: https://litemanager.com/romversion.txt
                  Source: ROMFUSClient.exe, 00000008.00000000.1814024336.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, ROMServer.exe, 00000009.00000000.1822596622.0000000000401000.00000020.00000001.01000000.0000000C.sdmpString found in binary or memory: https://litemanager.com/soft/pro/ROMServer.zip
                  Source: svchost.exe, 00000005.00000003.1761372145.00000265D36C2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.drString found in binary or memory: https://oneclient.sfx.ms/Win/Installers/23.194.0917.0001/amd64/OneDriveSetup.exe
                  Source: svchost.exe, 00000005.00000003.1761372145.00000265D3656000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe.C:

                  System Summary

                  barindex
                  Source: initial sampleStatic PE information: Filename: 0438.pdf.exe
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FDC2F0: CreateFileW,CloseHandle,wcscpy,wcscpy,wcscpy,wcscpy,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF665FDC2F0
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5ded59.msiJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{71FFA475-24D5-44FB-A51F-39B699E3D82C}Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIF170.tmpJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ARPPRODUCTICON.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ROMServer.exe_9D09B2BC25A2414CBD848E2B75898676.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\UNINST_Uninstall_L_78AA5B6662514D94A847D6C603AF0895.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\stop_server_51B516B87C64408FA3C56354EA2277C2.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\config_server_B6BD2967C67B44649764F06ADFFD6458.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5ded5c.msiJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5ded5c.msiJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\5ded5c.msiJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF6660007540_2_00007FF666000754
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FDF9300_2_00007FF665FDF930
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FE49280_2_00007FF665FE4928
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FF34840_2_00007FF665FF3484
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FEA4AC0_2_00007FF665FEA4AC
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FFB1900_2_00007FF665FFB190
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FD5E240_2_00007FF665FD5E24
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FFCE880_2_00007FF665FFCE88
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FF1F200_2_00007FF665FF1F20
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FD48400_2_00007FF665FD4840
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF66600C8380_2_00007FF66600C838
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF6660125500_2_00007FF666012550
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FD76C00_2_00007FF665FD76C0
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FF53F00_2_00007FF665FF53F0
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FEB5340_2_00007FF665FEB534
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FEF1800_2_00007FF665FEF180
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FF21D00_2_00007FF665FF21D0
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FE126C0_2_00007FF665FE126C
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FD72880_2_00007FF665FD7288
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FDC2F00_2_00007FF665FDC2F0
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FDA3100_2_00007FF665FDA310
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF6660120800_2_00007FF666012080
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FF2D580_2_00007FF665FF2D58
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF6660007540_2_00007FF666000754
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FF8DF40_2_00007FF665FF8DF4
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FEAF180_2_00007FF665FEAF18
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FE5B600_2_00007FF665FE5B60
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FEBB900_2_00007FF665FEBB90
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FF4B980_2_00007FF665FF4B98
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF666008C1C0_2_00007FF666008C1C
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FF39640_2_00007FF665FF3964
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FEC96C0_2_00007FF665FEC96C
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF6660089A00_2_00007FF6660089A0
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FE1A480_2_00007FF665FE1A48
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF66600FA940_2_00007FF66600FA94
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FD1AA40_2_00007FF665FD1AA4
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FF2AB00_2_00007FF665FF2AB0
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF666015AF80_2_00007FF666015AF8
                  Source: ROMViewer.exe.3.drStatic PE information: Resource name: RT_VERSION type: Intel ia64 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                  Source: ROMServer.exe.3.drStatic PE information: Resource name: RT_VERSION type: Intel ia64 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                  Source: ROMServer.exe0.3.drStatic PE information: Resource name: RT_VERSION type: Intel ia64 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                  Source: ROMServer.exe0.3.drStatic PE information: Number of sections : 11 > 10
                  Source: ROMServer.exe.3.drStatic PE information: Number of sections : 11 > 10
                  Source: ROMViewer.exe.3.drStatic PE information: Number of sections : 11 > 10
                  Source: ROMFUSClient.exe.3.drStatic PE information: Number of sections : 11 > 10
                  Source: ROMViewer.exe.3.drStatic PE information: Resource name: RT_RCDATA type: Delphi compiled form 'TfmEditBinaryValue'
                  Source: 0438.pdf.exe, 00000000.00000003.1740982799.000001F1AE8CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAcrobat.exe< vs 0438.pdf.exe
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2744000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_IsIcoRes.exe< vs 0438.pdf.exe
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2744000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSetAllUsers.dll< vs 0438.pdf.exe
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameISRegSvr.dll vs 0438.pdf.exe
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B27E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_IsIcoRes.exe< vs 0438.pdf.exe
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B27CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_IsIcoRes.exe< vs 0438.pdf.exe
                  Source: 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B27D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_IsIcoRes.exe< vs 0438.pdf.exe
                  Source: classification engineClassification label: mal68.troj.evad.winEXE@38/76@1/3
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FDB6D8 GetLastError,FormatMessageW,LocalFree,0_2_00007FF665FDB6D8
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FF8624 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipAlloc,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00007FF665FF8624
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - ServerJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.6672Jump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeMutant created: \Sessions\1\BaseNamedObjects\Local\ROMFUSLocal
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeMutant created: \Sessions\1\BaseNamedObjects\Local\ROMFUSTray
                  Source: C:\Users\user\Desktop\0438.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\__tmp_rar_sfx_access_check_6153109Jump to behavior
                  Source: Yara matchFile source: 8.0.ROMFUSClient.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.0.ROMServer.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000000.1814024336.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000000.1822596622.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, type: MEMORY
                  Source: Yara matchFile source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exe, type: DROPPED
                  Source: 0438.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Users\user\Desktop\0438.pdf.exeFile read: C:\Windows\win.iniJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeFile read: C:\Users\user\Desktop\0438.pdf.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\0438.pdf.exe "C:\Users\user\Desktop\0438.pdf.exe"
                  Source: C:\Users\user\Desktop\0438.pdf.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\pdf.msi" /qn
                  Source: C:\Users\user\Desktop\0438.pdf.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\Doc.pdf"
                  Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2228 --field-trial-handle=1508,i,11782010648643187908,10597558926359828636,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /siex /silentinstall
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /siex /silentinstall
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /firewall
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /firewall
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /start
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /start
                  Source: unknownProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe"
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe"
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /tray
                  Source: C:\Users\user\Desktop\0438.pdf.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\pdf.msi" /qnJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\Doc.pdf"Jump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /siex /silentinstallJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /firewallJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /startJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2228 --field-trial-handle=1508,i,11782010648643187908,10597558926359828636,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8Jump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /siex /silentinstall
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /firewall
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /start
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe"
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /tray
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: dxgidebug.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: riched20.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: usp10.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: msls31.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: pcacli.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: dlnashext.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wpdshext.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: linkinfo.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: ntshrui.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: cscapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: umpdc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: fwpuclnt.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: idndl.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dwmapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: propsys.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: profapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: edputil.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: urlmon.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: iertutil.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: srvcli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: windows.staterepositoryps.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wintypes.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: appresolver.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: bcp47langs.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: slc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: userenv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sppc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: onecorecommonproxystub.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: onecoreuapcommonproxystub.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: apphelp.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: pcacli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: mpr.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sfc_os.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: apphelp.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avifil32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: umpdc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: umpdc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: fwpuclnt.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: idndl.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dwmapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: propsys.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: profapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: edputil.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: urlmon.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: iertutil.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: srvcli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: windows.staterepositoryps.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wintypes.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: appresolver.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: bcp47langs.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: slc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: userenv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sppc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: onecorecommonproxystub.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: onecoreuapcommonproxystub.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: pcacli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: mpr.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sfc_os.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avifil32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: umpdc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: firewallapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: dnsapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: fwbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: fwpolicyiomgr.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: sxs.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: umpdc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: fwpuclnt.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: idndl.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dwmapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: propsys.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: profapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: edputil.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: urlmon.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: iertutil.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: srvcli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: windows.staterepositoryps.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wintypes.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: appresolver.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: bcp47langs.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: slc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: userenv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sppc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: onecorecommonproxystub.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: onecoreuapcommonproxystub.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: pcacli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: mpr.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sfc_os.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avifil32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: umpdc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avifil32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: umpdc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: fwpuclnt.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: idndl.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: ntmarta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msxml6.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: userenv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: profapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: mswsock.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dsound.dll
                  Source: C:\Users\user\Desktop\0438.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                  Source: Start LM-Server.lnk.3.drLNK file: ..\..\..\..\..\..\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                  Source: Uninstall LiteManager - Server.lnk.3.drLNK file: ..\..\..\..\..\..\Windows\SysWOW64\msiexec.exe
                  Source: Stop LM-Server.lnk.3.drLNK file: ..\..\..\..\..\..\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                  Source: Settings for LM-Server.lnk.3.drLNK file: ..\..\..\..\..\..\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: 0438.pdf.exeStatic PE information: Image base 0x140000000 > 0x60000000
                  Source: 0438.pdf.exeStatic file information: File size 11654747 > 1048576
                  Source: 0438.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: 0438.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: 0438.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: 0438.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: 0438.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: 0438.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: 0438.pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Source: 0438.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: 0438.pdf.exe
                  Source: 0438.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: 0438.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: 0438.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: 0438.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: 0438.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\0438.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\__tmp_rar_sfx_access_check_6153109Jump to behavior
                  Source: 0438.pdf.exeStatic PE information: section name: .didat
                  Source: 0438.pdf.exeStatic PE information: section name: _RDATA
                  Source: ROMViewer.exe.3.drStatic PE information: section name: .didata
                  Source: ROMFUSClient.exe.3.drStatic PE information: section name: .didata
                  Source: ROMwln.dll.3.drStatic PE information: section name: .didata
                  Source: ROMServer.exe.3.drStatic PE information: section name: .didata
                  Source: HookDrv.dll.3.drStatic PE information: section name: .didata
                  Source: ROMServer.exe0.3.drStatic PE information: section name: .didata
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF666015166 push rsi; retf 0_2_00007FF666015167
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF666015156 push rsi; retf 0_2_00007FF666015157
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\config_server_B6BD2967C67B44649764F06ADFFD6458.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\stop_server_51B516B87C64408FA3C56354EA2277C2.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\files\ROMServer.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ARPPRODUCTICON.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\HookDrv.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\UNINST_Uninstall_L_78AA5B6662514D94A847D6C603AF0895.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\ROMwln.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\AledensoftIpcServer.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ROMServer.exe_9D09B2BC25A2414CBD848E2B75898676.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\config_server_B6BD2967C67B44649764F06ADFFD6458.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\stop_server_51B516B87C64408FA3C56354EA2277C2.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ARPPRODUCTICON.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\UNINST_Uninstall_L_78AA5B6662514D94A847D6C603AF0895.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ROMServer.exe_9D09B2BC25A2414CBD848E2B75898676.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\EULA.rtfJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\romserver.exe
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LiteManager Pro - ServerJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LiteManager Pro - Server\Start LM-Server.lnkJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LiteManager Pro - Server\Uninstall LiteManager - Server.lnkJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LiteManager Pro - Server\Stop LM-Server.lnkJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LiteManager Pro - Server\Settings for LM-Server.lnkJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: Possible double extension: pdf.exeStatic PE information: 0438.pdf.exe
                  Source: C:\Windows\System32\msiexec.exeKey value created or modified: HKEY_LOCAL_MACHINE\SYSTEM\LiteManager\v3.4\Server\Parameters NoIPSettingsJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeWindow / User API: threadDelayed 1822
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeWindow / User API: threadDelayed 8034
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\config_server_B6BD2967C67B44649764F06ADFFD6458.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\stop_server_51B516B87C64408FA3C56354EA2277C2.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\LiteManager Pro - Server\files\ROMServer.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ARPPRODUCTICON.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\LiteManager Pro - Server\HookDrv.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\UNINST_Uninstall_L_78AA5B6662514D94A847D6C603AF0895.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\LiteManager Pro - Server\ROMwln.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\LiteManager Pro - Server\AledensoftIpcServer.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ROMServer.exe_9D09B2BC25A2414CBD848E2B75898676.exeJump to dropped file
                  Source: C:\Windows\System32\svchost.exe TID: 7276Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\svchost.exe TID: 7276Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe TID: 5432Thread sleep count: 51 > 30
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe TID: 3624Thread sleep time: -911000s >= -30000s
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe TID: 3624Thread sleep time: -4017000s >= -30000s
                  Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeLast function: Thread delayed
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FFB190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF665FFB190
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FE40BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF665FE40BC
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF66600FCA0 FindFirstFileExA,0_2_00007FF66600FCA0
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF6660016A4 VirtualQuery,GetSystemInfo,0_2_00007FF6660016A4
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeFile opened: C:\Windows\SysWOW64\wininet.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeFile opened: C:\Windows\SysWOW64\winspool.drv
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_a8625c1886757984\COMCTL32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_a8625c1886757984
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeFile opened: C:\Windows\SysWOW64\
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeFile opened: C:\Windows\SysWOW64\winmm.dll
                  Source: ROMFUSClient.exe, 0000000C.00000003.1892251046.0000000000C24000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\jv?
                  Source: svchost.exe, 00000005.00000002.3417826929.00000265CDE2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3417800181.00000265CDE13000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3418776273.00000265D345E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: ROMFUSClient.exe, 0000000C.00000003.1892251046.0000000000C24000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Iv
                  Source: ROMServer.exe, 0000000E.00000002.3583933926.0000000000E58000.00000004.00000020.00020000.00000000.sdmp, ROMFUSClient.exe, 00000010.00000002.3583592685.0000000000AE8000.00000004.00000020.00020000.00000000.sdmp, ROMFUSClient.exe, 00000011.00000002.3583742166.0000000000C58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF6660076D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6660076D8
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF666010D20 GetProcessHeap,0_2_00007FF666010D20
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess token adjusted: Debug
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess token adjusted: Debug
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /startJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF6660076D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6660076D8
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF666003354 SetUnhandledExceptionFilter,0_2_00007FF666003354
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF666002510 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF666002510
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF666003170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF666003170
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FFB190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF665FFB190
                  Source: C:\Users\user\Desktop\0438.pdf.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\pdf.msi" /qnJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\Doc.pdf"Jump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /siex /silentinstall
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /firewall
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /start
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF6660158E0 cpuid 0_2_00007FF6660158E0
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00007FF665FFA2CC
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF666000754 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,OleUninitialize,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF666000754
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665FE51A4 GetVersionExW,0_2_00007FF665FE51A4

                  Remote Access Functionality

                  barindex
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server AllowRemoteRPC
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure1
                  Replication Through Removable Media
                  Windows Management Instrumentation1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  1
                  Disable or Modify Tools
                  OS Credential Dumping1
                  System Time Discovery
                  1
                  Remote Desktop Protocol
                  1
                  Archive Collected Data
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/Job1
                  Windows Service
                  1
                  DLL Side-Loading
                  11
                  Obfuscated Files or Information
                  LSASS Memory11
                  Peripheral Device Discovery
                  Remote Desktop ProtocolData from Removable Media1
                  Non-Standard Port
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAt1
                  Registry Run Keys / Startup Folder
                  1
                  Windows Service
                  1
                  Software Packing
                  Security Account Manager3
                  File and Directory Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook11
                  Process Injection
                  1
                  DLL Side-Loading
                  NTDS65
                  System Information Discovery
                  Distributed Component Object ModelInput Capture1
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                  Registry Run Keys / Startup Folder
                  1
                  File Deletion
                  LSA Secrets31
                  Security Software Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts122
                  Masquerading
                  Cached Domain Credentials2
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Modify Registry
                  DCSync1
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                  Virtualization/Sandbox Evasion
                  Proc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                  Process Injection
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1543779 Sample: 0438.pdf.exe Startdate: 28/10/2024 Architecture: WINDOWS Score: 68 52 x1.i.lencr.org 2->52 60 Sigma detected: Suspicious Double Extension File Execution 2->60 62 Uses an obfuscated file name to hide its real file extension (double extension) 2->62 64 Connects to many ports of the same IP (likely port scanning) 2->64 66 Initial sample is a PE file and has a suspicious name 2->66 9 ROMServer.exe 2->9         started        13 msiexec.exe 99 61 2->13         started        16 0438.pdf.exe 6 9 2->16         started        18 svchost.exe 1 1 2->18         started        signatures3 process4 dnsIp5 54 111.90.140.76, 465, 52490, 52491 SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY Malaysia 9->54 56 65.21.245.7, 52494, 52495, 52648 CP-ASDE United States 9->56 68 Enables remote desktop connection 9->68 70 Enables network access during safeboot for specific services 9->70 20 ROMFUSClient.exe 9->20         started        22 ROMFUSClient.exe 9->22         started        44 C:\Program Files (x86)\...\ROMServer.exe, PE32 13->44 dropped 46 stop_server_51B516...3C56354EA2277C2.exe, PE32 13->46 dropped 48 config_server_B6BD...764F06ADFFD6458.exe, PE32 13->48 dropped 50 9 other files (none is malicious) 13->50 dropped 24 ROMFUSClient.exe 13->24         started        26 ROMFUSClient.exe 13->26         started        28 ROMFUSClient.exe 13->28         started        30 Acrobat.exe 70 16->30         started        32 msiexec.exe 16->32         started        58 127.0.0.1 unknown unknown 18->58 file6 signatures7 process8 process9 34 ROMServer.exe 24->34         started        36 ROMServer.exe 26->36         started        38 ROMServer.exe 28->38         started        40 AcroCEF.exe 106 30->40         started        process10 42 AcroCEF.exe 40->42         started       

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  C:\Program Files (x86)\LiteManager Pro - Server\AledensoftIpcServer.dll0%ReversingLabs
                  C:\Program Files (x86)\LiteManager Pro - Server\HookDrv.dll0%ReversingLabs
                  C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe3%ReversingLabs
                  C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe3%ReversingLabs
                  C:\Program Files (x86)\LiteManager Pro - Server\ROMwln.dll0%ReversingLabs
                  C:\Program Files (x86)\LiteManager Pro - Server\files\ROMServer.exe3%ReversingLabs
                  C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exe3%ReversingLabs
                  C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ARPPRODUCTICON.exe0%ReversingLabs
                  C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ROMServer.exe_9D09B2BC25A2414CBD848E2B75898676.exe5%ReversingLabs
                  C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\UNINST_Uninstall_L_78AA5B6662514D94A847D6C603AF0895.exe0%ReversingLabs
                  C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\config_server_B6BD2967C67B44649764F06ADFFD6458.exe5%ReversingLabs
                  C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\stop_server_51B516B87C64408FA3C56354EA2277C2.exe5%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://g.live.com/odclientsettings/Prod.C:0%URL Reputationsafe
                  https://g.live.com/odclientsettings/ProdV20%URL Reputationsafe
                  http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
                  https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c960%URL Reputationsafe
                  http://www.symauth.com/rpa000%URL Reputationsafe
                  http://ocsp.thawte.com00%URL Reputationsafe
                  https://g.live.com/odclientsettings/ProdV2.C:0%URL Reputationsafe
                  http://www.indyproject.org/0%URL Reputationsafe
                  http://www.symauth.com/cps0(0%URL Reputationsafe
                  https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b60%URL Reputationsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  x1.i.lencr.org
                  unknown
                  unknownfalse
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://litemanager.com/1ROMServer.exe, 0000000E.00000002.3584968888.000000000180C000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000011.00000002.3585086886.000000000296C000.00000004.00001000.00020000.00000000.sdmpfalse
                      unknown
                      http://litemanager.ru/ROMFUSClient.exe, 00000008.00000000.1818737515.00000000008E4000.00000002.00000001.01000000.0000000B.sdmp, ROMServer.exe, 00000009.00000000.1825724042.00000000009FE000.00000002.00000001.01000000.0000000C.sdmpfalse
                        unknown
                        https://g.live.com/odclientsettings/Prod.C:svchost.exe, 00000005.00000003.1761372145.00000265D3656000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.drfalse
                        • URL Reputation: safe
                        unknown
                        https://litemanager.com/soft/pro/ROMServer.zipROMFUSClient.exe, 00000008.00000000.1814024336.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, ROMServer.exe, 00000009.00000000.1822596622.0000000000401000.00000020.00000001.01000000.0000000C.sdmpfalse
                          unknown
                          http://litemanager.com/03ROMServer.exe, 0000000E.00000002.3584968888.0000000001813000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000011.00000002.3585086886.0000000002973000.00000004.00001000.00020000.00000000.sdmpfalse
                            unknown
                            https://g.live.com/odclientsettings/ProdV2svchost.exe, 00000005.00000003.1761372145.00000265D36C2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.drfalse
                            • URL Reputation: safe
                            unknown
                            https://litemanager.com/romversion.txtROMFUSClient.exe, 00000008.00000000.1814024336.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, ROMServer.exe, 00000009.00000000.1822596622.0000000000401000.00000020.00000001.01000000.0000000C.sdmpfalse
                              unknown
                              http://crl.thawte.com/ThawteTimestampingCA.crl00438.pdf.exe, 00000000.00000003.1725051641.000001F1B27BE000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.dr, 5ded59.msi.3.dr, 5ded5c.msi.3.drfalse
                              • URL Reputation: safe
                              unknown
                              https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96svchost.exe, 00000005.00000003.1761372145.00000265D36C2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.symauth.com/rpa000438.pdf.exe, 00000000.00000003.1725051641.000001F1B27BE000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.dr, 5ded59.msi.3.dr, 5ded5c.msi.3.drfalse
                              • URL Reputation: safe
                              unknown
                              http://ocsp.thawte.com00438.pdf.exe, 00000000.00000003.1725051641.000001F1B27BE000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.dr, 5ded59.msi.3.dr, 5ded5c.msi.3.drfalse
                              • URL Reputation: safe
                              unknown
                              http://litemanager.ru/noip.txtUROMServer.exe, 00000009.00000000.1822596622.0000000000401000.00000020.00000001.01000000.0000000C.sdmpfalse
                                unknown
                                http://crl.ver)svchost.exe, 00000005.00000002.3418433466.00000265D3400000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://g.live.com/odclientsettings/ProdV2.C:svchost.exe, 00000005.00000003.1761372145.00000265D36A3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1761372145.00000265D36E8000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1761372145.00000265D3707000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1761372145.00000265D36C2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://litemanager.com/ROMFUSClient.exe, 00000008.00000000.1818737515.00000000008E4000.00000002.00000001.01000000.0000000B.sdmp, ROMServer.exe, 00000009.00000000.1825724042.00000000009FE000.00000002.00000001.01000000.0000000C.sdmp, ROMServer.exe, 0000000E.00000002.3584968888.000000000180C000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000011.00000002.3585086886.000000000296C000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000011.00000002.3585086886.000000000286C000.00000004.00001000.00020000.00000000.sdmp, English.lg.3.drfalse
                                    unknown
                                    http://www.indyproject.org/ROMFUSClient.exe, 00000008.00000003.1836347325.0000000002807000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000008.00000000.1814024336.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, ROMServer.exe, 00000009.00000000.1822596622.0000000000951000.00000020.00000001.01000000.0000000C.sdmp, ROMServer.exe, 00000009.00000003.1827354006.00000000011C7000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 0000000A.00000003.1849784435.0000000002837000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 0000000B.00000003.1847557448.0000000002A17000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 0000000C.00000003.1891012785.00000000028D7000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 0000000D.00000003.1886219496.0000000001157000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 0000000E.00000002.3584968888.0000000001777000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000010.00000002.3584341571.0000000002897000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000011.00000002.3585086886.00000000028D7000.00000004.00001000.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.symauth.com/cps0(0438.pdf.exe, 00000000.00000003.1725051641.000001F1B27BE000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1725051641.000001F1B2780000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.dr, 5ded59.msi.3.dr, 5ded5c.msi.3.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6svchost.exe, 00000005.00000003.1761372145.00000265D36C2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    111.90.140.76
                                    unknownMalaysia
                                    45839SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMYtrue
                                    65.21.245.7
                                    unknownUnited States
                                    199592CP-ASDEfalse
                                    IP
                                    127.0.0.1
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1543779
                                    Start date and time:2024-10-28 13:02:04 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 8m 21s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Run name:Run with higher sleep bypass
                                    Number of analysed new started processes analysed:21
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:0438.pdf.exe
                                    renamed because original name is a hash value
                                    Original Sample Name: .pdf.exe
                                    Detection:MAL
                                    Classification:mal68.troj.evad.winEXE@38/76@1/3
                                    EGA Information:
                                    • Successful, ratio: 50%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 69
                                    • Number of non-executed functions: 93
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                    • Excluded IPs from analysis (whitelisted): 184.28.88.176, 2.19.126.149, 2.19.126.143, 34.193.227.236, 54.144.73.197, 18.207.85.246, 107.22.247.231, 172.64.41.3, 162.159.61.3, 184.28.90.27, 2.23.197.184, 93.184.221.240, 95.101.148.135, 95.101.54.240, 2.16.202.97, 95.101.54.242, 95.101.54.233, 2.16.202.67, 2.16.202.83, 95.101.54.243, 95.101.54.241, 2.16.202.66, 2.16.202.16, 2.16.164.11, 2.16.164.96, 2.16.164.64, 2.16.164.19, 2.16.164.59, 2.16.164.115, 2.16.164.75, 2.16.164.91, 2.16.202.107, 2.16.164.35, 2.16.164.50, 2.16.164.112, 95.101.54.219, 2.16.202.98, 2.16.164.114, 2.16.164.107, 2.22.242.11, 2.22.242.123
                                    • Excluded domains from analysis (whitelisted): e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, e8652.dscx.akamaiedge.net, slscr.update.microsoft.com, e4578.dscb.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, acroipm2.adobe.com, wu.azureedge.net, d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, ocsp.digicert.com, ssl-delivery.adobe.com.edgekey.net, a122.dscd.akamai.net, e16604.g.akamaiedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, crl.root-x1.letsencrypt.org.edgekey.net, fs.microsoft.com, otelrules.azureedge.net, acroipm2.adobe.com.edgesuite.net, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, p13n.adobe.io, fe3cr.delivery.mp.microsoft.com, ssl.adobe.com.edgekey.net, armmf.adobe.com, geo2.adobe.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • VT rate limit hit for: 0438.pdf.exe
                                    TimeTypeDescription
                                    08:03:50API Interceptor296356x Sleep call for process: ROMFUSClient.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    65.21.245.7044f.pdf.scrGet hashmaliciousRMSRemoteAdminBrowse
                                      3e#U043c.scrGet hashmaliciousRMSRemoteAdminBrowse
                                        3e#U043c.scrGet hashmaliciousRMSRemoteAdminBrowse
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMYb.cmdGet hashmaliciousUnknownBrowse
                                          • 101.99.92.203
                                          rrwzOU7A9F.exeGet hashmaliciousXWormBrowse
                                          • 101.99.92.203
                                          3xlcP3DFLm.exeGet hashmaliciousXWormBrowse
                                          • 101.99.92.203
                                          JruZmEO5Dm.exeGet hashmaliciousXWormBrowse
                                          • 101.99.92.203
                                          zVlbADkNqu.exeGet hashmaliciousXWormBrowse
                                          • 101.99.92.203
                                          vqUuq8t2Uc.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                          • 101.99.92.203
                                          pXJ9iQvcQa.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                          • 101.99.92.203
                                          https://app.adjust.com/mr11ui?fallback=https://abcshopbd.com/#amVmZi5kaXhvbiRhdXN0YWx1c2EuY29tGet hashmaliciousHTMLPhisherBrowse
                                          • 111.90.141.53
                                          Transferencias6231.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 101.99.94.195
                                          CP-ASDEiQPxJrxxaj.exeGet hashmaliciousPikaBotBrowse
                                          • 65.20.66.218
                                          iQPxJrxxaj.exeGet hashmaliciousPikaBotBrowse
                                          • 65.20.66.218
                                          http://www.thegioimoicau.com/Get hashmaliciousUnknownBrowse
                                          • 65.21.45.74
                                          Bill Of Lading_MEDUVB935991.pdf.exeGet hashmaliciousFormBookBrowse
                                          • 65.21.196.90
                                          arm.elfGet hashmaliciousUnknownBrowse
                                          • 65.21.50.224
                                          P1 BOL.exeGet hashmaliciousUnknownBrowse
                                          • 65.21.196.90
                                          Doc 784-01965670.exeGet hashmaliciousFormBookBrowse
                                          • 65.21.196.90
                                          TT Swift copy1.exeGet hashmaliciousFormBookBrowse
                                          • 65.21.196.90
                                          BL.exeGet hashmaliciousFormBookBrowse
                                          • 65.21.196.90
                                          No context
                                          No context
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:data
                                          Category:modified
                                          Size (bytes):25210
                                          Entropy (8bit):5.138821896481996
                                          Encrypted:false
                                          SSDEEP:384:xS75t8t+CqZ+oNbynfBytjj3IhdgdVOVv:xS1t8t+CqZ+oNbynfEtIh+jMv
                                          MD5:2B6769811297D38734C1FC542BB6A21C
                                          SHA1:DF9A153AC9D2CB14607588C4ABEBC998511A400F
                                          SHA-256:605453A43D08B46E5CB1F19767DAF7D57BE8745C0E84BD2C30B15531682F38EF
                                          SHA-512:398EACB0E6AE28D6B8A1F0FE474F510F36BBC683D211C8C04527F368F2EA82F79465ACC4E2000EE494ABEF82EF1D57BF862204FC143D243753B4125C46D7E506
                                          Malicious:false
                                          Preview:...@IXOS.@.....@c@\Y.@.....@.....@.....@.....@.....@......&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}..LiteManager Pro - Server..pdf.msi.@.....@.....@.....@......ARPPRODUCTICON.exe..&.{9EF586E9-112B-4AAE-B439-5B62B7A0B1DE}.....@.....@.....@.....@.......@.....@.....@.......@......LiteManager Pro - Server......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{3244CDE6-6414-4399-B0D5-424562747210}&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}.@......&.{4D4D18AA-F74D-4291-B5A9-93C3CC48B75F}&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}.@......&.{641F154A-FEEF-4FA7-B5BF-414DB1DB8390}&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}.@......&.{26EAB54E-4659-47E8-86F9-4CB74F7E03BE}&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}.@......&.{596F4636-5D51-49F5-B3B4-F3C366E9DC23}&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}.@......&.{596F4636-5D51-49F5-B3B4-F3C366E9DC23}&.{00000000-0000-0000-0000-000000000000}.@......&.{A3DC5A2F-2249-4674-B
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):132032
                                          Entropy (8bit):6.10195829980833
                                          Encrypted:false
                                          SSDEEP:3072:sh/1J7RYdzZU4Z5tegH1q888888888888W888888888882zgP:sh/jIZPZ5tJ8888888888888W888888s
                                          MD5:C40455A478E0B76521130D9DAAAADC4B
                                          SHA1:42DE923D5E36A9F56B002DD66DB245BC44480089
                                          SHA-256:308085BC357BF3A3BEE0D662FCC01628E9EE2FFD478AE0F1E7140939AD99B892
                                          SHA-512:76ED6D763F603BCAA7FE186C0A7449E614DCDB18036F7587C6E5A11C3F3269E400E3D2062856CC280AC20C094617924783B6C360F25AF66767DCC53C2F3045C9
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....xK............................p........ ..........................................................................\.......\...............................x#...................................................................................text...$........................... ..`.itext.............................. ..`.data...0.... ......................@....bss....xN...@...........................idata..\...........................@....edata..\............&..............@..@.reloc..x#.......$...(..............@..B.rsrc................L..............@..@....................................@..@........................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:Rich Text Format data, version 1, ANSI, code page 1251, default language ID 1049
                                          Category:dropped
                                          Size (bytes):58679
                                          Entropy (8bit):4.738446173390891
                                          Encrypted:false
                                          SSDEEP:768:bkJC7UF9eVWSlBY8Aq9CBGDtD8gX1ZDCZjewbAsCw1vPDQuJPQzusxxeCNHnPPsT:htwqueMZYU
                                          MD5:BAED4E7AF33F77350D454B69317EE63B
                                          SHA1:2B598774F0C73850A36117F29EA8DAC57BE1C138
                                          SHA-256:671D65183C39E53FC1759C45B105A0FBE2D3A216E4099B66D5FCF274EA625E07
                                          SHA-512:E740997BDECB8F907A000D01BF3E823898A1289D1DBFAE5BF342D4BCB6FF09D258317955F4FD858FF6B239E5BA08E49E90CDEC06E24DABDB18C1CF2D8943590C
                                          Malicious:false
                                          Preview:{\rtf1\ansi\ansicpg1251\uc1\deff0\stshfdbch0\stshfloch37\stshfhich37\stshfbi37\deflang1049\deflangfe1049{\fonttbl{\f0\froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman{\*\falt Times New Roman};}..{\f1\fswiss\fcharset204\fprq2{\*\panose 020b0604020202020204}Arial;}{\f2\fmodern\fcharset204\fprq1{\*\panose 02070309020205020404}Courier New;}{\f3\froman\fcharset2\fprq2{\*\panose 05050102010706020507}Symbol;}..{\f10\fnil\fcharset2\fprq2{\*\panose 05000000000000000000}Wingdings;}{\f37\fswiss\fcharset204\fprq2{\*\panose 020f0502020204030204}Calibri;}{\f211\froman\fcharset0\fprq2 Times New Roman{\*\falt Times New Roman};}..{\f209\froman\fcharset238\fprq2 Times New Roman CE{\*\falt Times New Roman};}{\f212\froman\fcharset161\fprq2 Times New Roman Greek{\*\falt Times New Roman};}{\f213\froman\fcharset162\fprq2 Times New Roman Tur{\*\falt Times New Roman};}..{\f214\froman\fcharset177\fprq2 Times New Roman (Hebrew){\*\falt Times New Roman};}{\f215\froman\fcharset178\fprq2 Time
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):89220
                                          Entropy (8bit):3.469297258214741
                                          Encrypted:false
                                          SSDEEP:768:YvozCzKUNNfMnuQhgdXT0Z2BPshK+4aCWpQJ3OEInKDcbztlXnpQbbMv3PI:Yvoz4TXTI2pQCWOJvgXnpQbS3PI
                                          MD5:B1C96EF24061BF294CAC6C4C9CBF7757
                                          SHA1:5D1B1934091E257B5F1C69B13F5FC1E424348584
                                          SHA-256:20DB884523DA62C20F80B8A3BB71E11091B90A443B83C06D8FE2A1BBC00C1C33
                                          SHA-512:6E90562FD804F91DDADEF2310551063D34B859FF1CC6E58A41667E9CDA062DCA851C8455882EF47CF3E1A8EC21EBD9F0761F15E54174CC4A95427238CB39BA14
                                          Malicious:false
                                          Preview:..[._.s.y.s.t.e.m.].....l.a.n.g.u.a.g.e._.i.d.=.1.0.3.3.........[._.m.e.s.s.a.g.e.s.].....w.e.b._.s.i.t.e. .=. .h.t.t.p.:././.l.i.t.e.m.a.n.a.g.e.r...c.o.m./.....q.u.e.s.t.i.o.n. .=. .Q.u.e.s.t.i.o.n.....e.r.r.o.r. .=. .E.r.r.o.r.....i.n.f.o.r.m.a.t.i.o.n. .=. .I.n.f.o.r.m.a.t.i.o.n.....n.o.t.i.f.i.c.a.t.i.o.n. .=. .N.o.t.i.f.i.c.a.t.i.o.n.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.r.e.a.d._.c.o.n.f.i.g.u.r.a.t.i.o.n. .=. .C.a.n. .n.o.t. .r.e.a.d. .s.e.r.v.i.c.e. .c.o.n.f.i.g.u.r.a.t.i.o.n...\.n.;.R.e.i.n.s.t.a.l.l. .L.i.t.e.M.a.n.a.g.e.r. .s.e.r.v.i.c.e.?.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e. .=. .C.a.n. .n.o.t. .s.e.t. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r. .s.e.r.v.i.c.e. .s.t.a.r.t.u.p. .m.o.d.e.......f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e._.r.e.s.t.a.r.t. .=. .C.a.n. .n.o.t. .s.e.t. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r. .s.e.r.v.i.c.e. .s.t.a.r.t.u.p. .m.o.d.e...\.n.;.R.e.b.o.o.t. .s.y.s.t.e.m.,. .p.l.e.a.s.e.......
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):201728
                                          Entropy (8bit):6.3607488106285075
                                          Encrypted:false
                                          SSDEEP:3072:rmqdVRkbN1G3OKtVLqKc3IuQquARCASmShKJ:rmyTmNw3zqKcFLRs
                                          MD5:1D4F8CFC7BBF374CCC3AAE6045B2133D
                                          SHA1:802EDF0B0ED1D0305BCD6688EE3301366FEC1337
                                          SHA-256:C04885562F17BAEEFBCD2D4FC29F054EB8A66C44BD015750498C69A912D94C1F
                                          SHA-512:68643A30FEA87B2B61AF546F42BF32A25459152C1BCCE5A8A881714139CE828DFE4237874FF1E9CC3B78D6CDBEF7DD45C9F3459C3337D83693C704C274AFFF3E
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...|..[.................\...........v............@.................................................................. ...................@...................@...G..................................................$................................text....S.......T.................. ..`.itext..D....p.......X.............. ..`.data...<............`..............@....bss....<Y...............................idata...............z..............@....didata.............................@....edata....... ......................@..@.rdata..E....0......................@..@.reloc...G...@...H..................@..B.rsrc....@.......@..................@..@....................................@..@........................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):61034
                                          Entropy (8bit):4.429529654892776
                                          Encrypted:false
                                          SSDEEP:768:nebbtdP4XFsh6HWiIZTYp7JtMLG54ttg2kGPyWtvQTznCKDMlV2f:ne3KOhTTocL8HnMlV2f
                                          MD5:7303B5AE0B8911CEB238DC01419695BE
                                          SHA1:22B89BDB8FAEC62BA3E66639E38E6271B593944A
                                          SHA-256:88155FB3F0E198AA4A24F9CFECBB83C5A4E081C6EA362BC50294410CB2FB5C50
                                          SHA-512:8AE802616AF60BAF214E254F6A55D312DC46B6E3F8BEE5F50E30E372FF38103776278B5FB07A562C2149EEA58107CB427A03B1629F72044AB69D3507E5DFAB15
                                          Malicious:false
                                          Preview:[._.s.y.s.t.e.m.].....l.a.n.g.u.a.g.e._.i.d.=.1.0.2.8.........[._.m.e.s.s.a.g.e.s.].....w.e.b._.s.i.t.e. .=. .h.t.t.p.:././.l.i.t.e.m.a.n.a.g.e.r...c.o.m./.....q.u.e.s.t.i.o.n. .=. .OUL.....e.r.r.o.r. .=. ./.......i.n.f.o.r.m.a.t.i.o.n. .=. ........n.o.t.i.f.i.c.a.t.i.o.n. .=. ....w....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.r.e.a.d._.c.o.n.f.i.g.u.r.a.t.i.o.n. .=. .!q.l...S.g.RD}Ka.0\.n.;...e.[. .L.i.t.e.M.a.n.a.g.e.r. ..g.R?.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e. .=. .!q.l-..[ .L.i.t.e.M.a.n.a.g.e.r. .:O.ghV.g.R_U.R!j._.0....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e._.r.e.s.t.a.r.t. .=. .!q.l-..[ .L.i.t.e.M.a.n.a.g.e.r. .:O.ghV.g.R_U.R!j._.0\.n.;....e.._j.|q}.0....f.m._.s.e.t.t.i.n.g.s._.r.e.s.t.a.r.t._.s.e.r.v.i.c.e._.t.o._.a.p.p.l.y. .=. ....e_U.R .L.M. .:O.ghV.a(u.z._.NWY(u...f.0....f.m._.s.e.c.u.r.i.t.y._.f.o.r.c.e._.g.u.e.s.t. .=. .7_6R.O.(Wdk.|q}.N-..[.....asTW.@b.g.}..O(u.....S.g.O.X[.S.kP..0 .!q.l.O(u.07_
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):58794
                                          Entropy (8bit):3.642324420313977
                                          Encrypted:false
                                          SSDEEP:768:D+XPobz4qFlRiiXc0HwgHSSxnrKT7nke7GShFBy/x97fuTLY57aC7I/Fj:yPQMw1ZOT7kef1y/X7fuTq4j
                                          MD5:606DC375E898D7221CCB7CEB8F7C686B
                                          SHA1:26DCF93876C89283623B8150C1B79EDB24B6A7EC
                                          SHA-256:F442E440580EA35040E35BF1D85A118E7C182FDE0B9BA2A3C1816DEAB5F822BB
                                          SHA-512:9FBC42165B51A2020D2DA2FFE33287A4F3AA33639126813B290D329D47C4F4DA8F297A47AF3C1F63AF6F9E1BA47ACE840BC1660D603E17589E5DB6DDA0E1E5B1
                                          Malicious:false
                                          Preview:..[._.s.y.s.t.e.m.].....l.a.n.g.u.a.g.e._.i.d.=.1.0.5.5.........[._.m.e.s.s.a.g.e.s.].....w.e.b._.s.i.t.e. .=. .h.t.t.p.:././.l.i.t.e.m.a.n.a.g.e.r...c.o.m./.....q.u.e.s.t.i.o.n. .=. .S.o.r.u.....e.r.r.o.r. .=. .H.a.t.a.....i.n.f.o.r.m.a.t.i.o.n. .=. .B.i.l.g.i.....n.o.t.i.f.i.c.a.t.i.o.n. .=. .B.i.l.d.i.r.i.m.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.r.e.a.d._.c.o.n.f.i.g.u.r.a.t.i.o.n. .=. .H.i.z.m.e.t. .y.a.p.1.l.a.n.d.1.r.m.a.s.1. .o.k.u.n.a.m.1.y.o.r...\.n.;.L.i.t.e.M.a.n.a.g.e.r. .h.i.z.m.e.t.i.n.i. .y.e.n.i.d.e.n. .y...k.l.e.m.e.k. .m.i. .i.s.t.i.y.o.r.s.u.n.u.z.?.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e. .=. .L.i.t.e.M.a.n.a.g.e.r. .h.i.z.m.e.t. .b.a._.l.a.n.g.1... .m.o.d.u.n.u. .a.y.a.r.l.a.y.a.m.1.y.o.r.......f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e._.r.e.s.t.a.r.t. .=. .L.i.t.e.M.a.n.a.g.e.r. .h.i.z.m.e.t. .b.a._.l.a.n.g.1... .m.o.d.u.n.u. .a.y.a.r.l.a.y.a.m.1.y.o.r...\.n.;.S.i.s.t.e.m.i. .y.e.n.i.d.e.n. .b.a._.l.
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:Unicode text, UTF-16, little-endian text, with very long lines (305), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):87912
                                          Entropy (8bit):4.303374267443204
                                          Encrypted:false
                                          SSDEEP:768:VUlHxa/yEOYEJNHWjlUu1pZ26ER2nkUTbfk74Q:aNxWREb4lUu1P29R2JbfC4Q
                                          MD5:3FC082E8F516EAD9FC26AC01E737F9EF
                                          SHA1:3B67EBCE4400DDCF6B228E5668F3008561FB8F21
                                          SHA-256:3DC0CEAE11F445B57B17B7C35A90B5133E313CF6B61550AB418252C5B8089C99
                                          SHA-512:9A9D20AF2F8C27056F58AB5A9C687F5124CE5F6D563E396C9558331FB8BE48E88E148B1FDC548A5EBDEDB451E3D89F2F96856F3BBFD695691D5687599F376421
                                          Malicious:false
                                          Preview:..[._.s.y.s.t.e.m.].....l.a.n.g.u.a.g.e._.i.d. .=. .1.0.5.8.........[._.m.e.s.s.a.g.e.s.].....w.e.b._.s.i.t.e. .=. .h.t.t.p.:././.l.i.t.e.m.a.n.a.g.e.r...r.u./.....q.u.e.s.t.i.o.n. .=. ...8.B.0.=.=.O.....e.r.r.o.r. .=. ...>.<.8.;.:.0.....i.n.f.o.r.m.a.t.i.o.n. .=. ...=.D.>.@.<.0.F.V.O.....n.o.t.i.f.i.c.a.t.i.o.n. .=. ...>.2.V.4.>.<.;.5.=.=.O.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.r.e.a.d._.c.o.n.f.i.g.u.r.a.t.i.o.n. .=. ...5.<.>.6.;.8.2.>. .?.@.>.G.8.B.0.B.8. .:.>.=.D.V.3.C.@.0.F.V.N. .A.;.C.6.1.8...\.n.;...5.@.5.2.A.B.0.=.>.2.8.B.8. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r.?.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e. .=. ...5.<.>.6.;.8.2.>. .2.A.B.0.=.>.2.8.B.8. .@.5.6.8.<. .7.0.?.C.A.:.C. .A.;.C.6.1.8. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r.......f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e._.r.e.s.t.a.r.t. .=. ...5.<.>.6.;.8.2.>. .2.A.B.0.=.>.2.8.B.8. .@.5.6.8.<. .7.0.?.C.A.:.C. .A.;.C.6.1.8. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r.
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):6307408
                                          Entropy (8bit):6.5944937257467116
                                          Encrypted:false
                                          SSDEEP:98304:NwiA/GmKEt3LQ7V8z3uHWkd49GMdqOxaB:NOGmKEt31kd2dqwaB
                                          MD5:63D0964168B927D00064AA684E79A300
                                          SHA1:B4B9B0E3D92E8A3CBE0A95221B5512DED14EFB64
                                          SHA-256:33D1A34FEC88CE59BEB756F5A274FF451CAF171A755AAE12B047E678929E8023
                                          SHA-512:894D8A25E9DB3165E0DAAE521F36BBD6F9575D4F46A2597D13DEC8612705634EFEA636A3C4165BA1F7CA3CDC4DC7D4542D0EA9987DE10D2BC5A6ED9D6E05AECB
                                          Malicious:false
                                          Yara Hits:
                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe, Author: Joe Security
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 3%
                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......f..................C..F........C.......C...@.......................... i.......`..........@................... N.......M..A...@T...............`.P"...PN.<............................@N.......................M.......N......................text.....C.......C................. ..`.itext...0....C..2....C............. ..`.data... 3....C..4....C.............@....bss........0E..........................idata...A....M..B....E.............@....didata.......N......LE.............@....edata....... N......ZE.............@..@.tls....X....0N..........................rdata..]....@N......\E.............@..@.reloc..<....PN......^E.............@..B.rsrc........@T......DK.............@..@............. i.......`.............@..@................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):7753808
                                          Entropy (8bit):6.615075046955521
                                          Encrypted:false
                                          SSDEEP:98304:D4/WZQ7lc63BJGS1VFeIEll251o7+YcMBk2VVyN/RTfCAFIqOx9N:DXQ7SIEXeMBk2V4N/Nq2Iqw9N
                                          MD5:F3D74B072B9697CF64B0B8445FDC8128
                                          SHA1:8408DA5AF9F257D12A8B8C93914614E9E725F54C
                                          SHA-256:70186F0710D1402371CE2E6194B03D8A153443CEA5DDB9FC57E7433CCE96AE02
                                          SHA-512:004054EF8CDB9E2FEFC3B7783574BFF57D6D5BF9A4624AD88CB7ECCAE29D4DFD2240A0DC60A14480E6722657132082332A3EC3A7C49D37437644A31E59F551AF
                                          Malicious:true
                                          Yara Hits:
                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe, Author: Joe Security
                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe, Author: Joe Security
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 3%
                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...w#.f.................ZU... ......qU.......U...@.......................... ........v..........@...................._......`_..K....g.. ............v.P"...._.4............................._..................... m_.|....._......................text....&U......(U................. ..`.itext..$1...@U..2...,U............. ..`.data....@....U..B...^U.............@....bss....0.....V..........................idata...K...`_..L....V.............@....didata......._.......V.............@....edata........_.......V.............@..@.tls....`....._..........................rdata..]....._.......V.............@..@.reloc..4....._.......V.............@..B.rsrc.... ....g.. ....^.............@..@............. ........v.............@..@................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):999944
                                          Entropy (8bit):6.626732213066839
                                          Encrypted:false
                                          SSDEEP:12288:SA9+TVJdg0YMgqAahyv0jKdTq4lrBhqSq/rt8VwGFrt:SRho0lgqA6yvnrBhq/rQDt
                                          MD5:ED32E23322D816C3FE2FC3D05972689E
                                          SHA1:5EEA702C9F2AC0A1AADAE25B09E7983DA8C82344
                                          SHA-256:7F33398B98E225F56CD287060BEFF6773ABB92404AFC21436B0A20124919FE05
                                          SHA-512:E505265DD9D88B3199EB0D4B7D8B81B2F4577FABD4271B3C286366F3C1A58479B4DC40CCB8F0045C7CD08FD8BF198029345EEF9D2D2407306B73E5957AD59EDF
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...`.-\.................J...........X.......`....@.................................................................. ...................@...........0.......@.. O...................................................................................text...0?.......@.................. ..`.itext..8....P.......D.............. ..`.data....:...`...<...N..............@....bss.....]...............................idata..............................@....didata.............................@....edata....... ......................@..@.rdata..E....0......................@..@.reloc.. O...@...P..................@..B.rsrc....@.......@..................@..@.....................0..............@..@........................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):94772
                                          Entropy (8bit):4.284840986247552
                                          Encrypted:false
                                          SSDEEP:768:r1kyTyZFOTb6QeZGJXYbFAMrKARuZk7FRwZoFTa2n:rn+2iZGhYbK4KARpAoFTa2n
                                          MD5:0E204FABE68B4B65ED5E0834651FB732
                                          SHA1:B338A6E54AA18F3F8A573580520F16C74A51F3D2
                                          SHA-256:302373D81F0AE15589206420CB01A266804C9FD1C1FF0D6E09CE6BA3FEF92B64
                                          SHA-512:AAD76F6A76DC693D959389CE471BC585D0DA72737FED99F42F219FDC7C71617C00E8003A467092E12820A359D672C6FB80D99772F3F6433923B2ABB7EEA40F08
                                          Malicious:false
                                          Preview:..[._.s.y.s.t.e.m.].....l.a.n.g.u.a.g.e._.i.d.=.1.0.4.9.........[._.m.e.s.s.a.g.e.s.].....w.e.b._.s.i.t.e. .=. .h.t.t.p.:././.l.i.t.e.m.a.n.a.g.e.r...r.u./.....q.u.e.s.t.i.o.n. .=. ...>.?.@.>.A.....e.r.r.o.r. .=. ...H.8.1.:.0.....i.n.f.o.r.m.a.t.i.o.n. .=. ...=.D.>.@.<.0.F.8.O.....n.o.t.i.f.i.c.a.t.i.o.n. .=. ...?.>.2.5.I.5.=.8.5.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.r.e.a.d._.c.o.n.f.i.g.u.r.a.t.i.o.n. .=. ...5.2.>.7.<.>.6.=.>. .?.@.>.G.8.B.0.B.L. .:.>.=.D.8.3.C.@.0.F.8.N. .A.;.C.6.1.K...\.n.;...5.@.5.C.A.B.0.=.>.2.8.B.L. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r.?.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e. .=. ...5.2.>.7.<.>.6.=.>. .C.A.B.0.=.>.2.8.B.L. .@.5.6.8.<. .7.0.?.C.A.:.0. .A.;.C.6.1.K. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r.......f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e._.r.e.s.t.a.r.t. .=. ...5.2.>.7.<.>.6.=.>. .C.A.B.0.=.>.2.8.B.L. .@.5.6.8.<. .7.0.?.C.A.:.0. .A.;.C.6.1.K. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r...\.n.
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):7752272
                                          Entropy (8bit):6.615186281886958
                                          Encrypted:false
                                          SSDEEP:98304:y4/WZQ7lc63BJGS1VFeIEll251o7+YcMBk2VVyN/RTfCEFIqOxJn:yXQ7SIEXeMBk2V4N/NqiIqwJn
                                          MD5:84FB34E529BEDE393A3F604EAA8137B2
                                          SHA1:195EA03B7BD086454A13C0D8357E0A9E447D9EC9
                                          SHA-256:1E396C4066AC8F421A54893442A0D76C4F8D4146E63825D67DFC0DA782E73EE5
                                          SHA-512:A48A80D62E588667B4C891CDED279BABFFA5FB4FDF092F345212F81D29A9ACAA06E6DB27B49DC601909409A3C82AA9272BCDF90D0AE1738E83E80D9FCA4D93E6
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 3%
                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......f.................ZU... ......qU.......U...@.......................... ........v..........@...................._......`_..K....g..............(v.P"...._.4............................._..................... m_.|....._......................text....&U......(U................. ..`.itext..$1...@U..2...,U............. ..`.data....@....U..B...^U.............@....bss....0.....V..........................idata...K...`_..L....V.............@....didata......._.......V.............@....edata........_.......V.............@..@.tls....`....._..........................rdata..]....._.......V.............@..@.reloc..4....._.......V.............@..B.rsrc.........g.......^.............@..@............. .......(v.............@..@................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):11361360
                                          Entropy (8bit):6.496049600782297
                                          Encrypted:false
                                          SSDEEP:98304:AshiRp5hPI7N9sSA5wbZXJOu/0uOXZYfmQYanSjS+cWuNOlQpgfYLyPsd+QgBBP5:Al5hPwgvyAjDjS+igfgym+bHJxmK
                                          MD5:B0E355EC3453C8FFAEE08CD4257E96F2
                                          SHA1:0FA023CA8F1C1ECDADDE3DD3BD551870C2D965E2
                                          SHA-256:60248BA026064B116E4F94020DABB74DF519F5B4C41379CA19A38D725692CA8E
                                          SHA-512:B6004F83FD78EED84BF21611EFA45F2FFADF3625E0A2FDCDAE531B4734A4B886EBFE5EBE990DA42302B7368282D83DFFEF19E71DA8EC4C155EE5C8619AD028DD
                                          Malicious:false
                                          Yara Hits:
                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exe, Author: Joe Security
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 3%
                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......f..................v..67.......v...... v...@..........................0...................@...................p...........L...p....+..........:..P"...................................................................`.......................text.....u.......u................. ..`.itext...6....u..8....u............. ..`.data....R... v..T....v.............@....bss.........w..........................idata...L.......N...Xw.............@....didata......`........w.............@....edata.......p........w.............@..@.tls....`................................rdata..].............w.............@..@.reloc................w.............@..B.rsrc.....+..p....+.................@..@.............0.......:..............@..@................
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):8192
                                          Entropy (8bit):0.363788168458258
                                          Encrypted:false
                                          SSDEEP:6:6xPoaaD0JOCEfMuaaD0JOCEfMKQmDNOxPoaaD0JOCEfMuaaD0JOCEfMKQmDN:1aaD0JcaaD0JwQQbaaD0JcaaD0JwQQ
                                          MD5:0E72F896C84F1457C62C0E20338FAC0D
                                          SHA1:9C071CC3D15E5BD8BF603391AE447202BD9F8537
                                          SHA-256:686DC879EA8690C42D3D5D10D0148AE7110FA4D8DCCBF957FB8E41EE3D4A42B3
                                          SHA-512:AAA5BE088708DABC2EC9A7A6632BDF5700BE719D3F72B732BD2DFD1A3CFDD5C8884BFA4951DB0C499AF423EC30B14A49A30FBB831D1B0A880FE10053043A4251
                                          Malicious:false
                                          Preview:*.>...........&.....D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................&.............................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1310720
                                          Entropy (8bit):1.3107788957216946
                                          Encrypted:false
                                          SSDEEP:3072:5JCnRjDxImmaooCEYhlOe2Pp4mH45l6MFXDaFXpVv1L0Inc4lfEnogVsiJKrvrL:KooCEYhgYEL0In
                                          MD5:76665AE8E3C1947A1157EC9FBE6F4A05
                                          SHA1:32725365DE0ED7A71E6D838E23667EE52777725D
                                          SHA-256:DC0244072160408962E7D02AB9FDAEE16667626206A574DE513AFFF60E1DD431
                                          SHA-512:D1222904B868B347D01032742B874134F29023E7D77804AB6BE5E7360517741AFE7F77D7C3AECBB96888CA38A4F706C6AE9AFB20D6DFBB711FB7824219D8C521
                                          Malicious:false
                                          Preview:z3..........@..@.;...{..................<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@..........................................#.................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:Extensible storage engine DataBase, version 0x620, checksum 0x13f83988, page size 16384, Windows version 10.0
                                          Category:dropped
                                          Size (bytes):1310720
                                          Entropy (8bit):0.4221697002103083
                                          Encrypted:false
                                          SSDEEP:1536:XSB2ESB2SSjlK/uedMrSU0OrsJzvqYkr3g16f2UPkLk+ku4/Iw4KKazAkUk1k2DO:Xazag03A2UrzJDO
                                          MD5:46B8AD5D086BD58AFD2BC0A541B4B220
                                          SHA1:3F5887459120C58479BA43165F6E9EF02023140D
                                          SHA-256:24FB01F195907096AF43E1902A1B70A3084543C9FA11DBCB1756B34AC2AAE483
                                          SHA-512:8382E90F8CB80603F2D0B749F4CE540AC3ED9390C21FC22013FFB2D69802C18D739AB5320C9014785068E87F3AD26E0B60389BBEA507D73B6C4EF66AD514AEC8
                                          Malicious:false
                                          Preview:..9.... .......Y.......X\...;...{......................n.%..........|.......|..h.#..........|..n.%.........D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ............................................................................................................................................................................................................2...{....................................Vt.....|..................g.r......|...........................#......n.%.....................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):16384
                                          Entropy (8bit):0.07871813946654403
                                          Encrypted:false
                                          SSDEEP:3:OEetYeX0gNCsnXO6ne6nPSnXBXWrnXAllOE/tlnl+/rTc:OdzX0PGXOMeMcXh+XApMP
                                          MD5:6231913E0B8D8C2347E37AD25A1DB025
                                          SHA1:2C9C1EA2A929C3561AE18D732767AFD8039042B5
                                          SHA-256:6260D33C243D895729B147B0B7E7A0BC87BB00F2C3F2E56568EA58E66EFEBF23
                                          SHA-512:D512764E3F45EA3184472065540D1714310D8C686408E010D6EEF760A4A09F95DA20C8BA1820D24916E5734A9958C64642134183C190EA39FDAC446355744C5B
                                          Malicious:false
                                          Preview:...:.....................................;...{.......|.......|...............|.......|.....F.....|..................g.r......|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Thu Aug 22 17:41:10 2024, mtime=Mon Oct 28 11:03:09 2024, atime=Thu Aug 22 17:41:10 2024, length=7753808, window=hide
                                          Category:dropped
                                          Size (bytes):2167
                                          Entropy (8bit):3.9006746833262875
                                          Encrypted:false
                                          SSDEEP:48:862U6mdO5G3BCZd5Y+d5YsP5qoZkmrSUp8JWqoZkmtw:86siL9O5qoZbcJWqoZbt
                                          MD5:F61CFB800A5298DEF576D9FD4D2EA860
                                          SHA1:CC0FFA56D6107B4BFE6F2E534CCA7536A79A6048
                                          SHA-256:12DC9CB1D4A62645C7FFC941EEE4AC3E5C1475EF807AA7A45A6EA689E3340C37
                                          SHA-512:986F481F66CE55CA0A8F9FB8E2578D0B4C47222C2886CB32CAE152071872336AFFDF9E3F5D7886100F9853849524E0597CEAA5820FCD56F4B7A74D6D81287C3E
                                          Malicious:false
                                          Preview:L..................F.@.. .....>......#.Z1)....>.....PPv..........................P.O. .:i.....+00.../C:\.....................1.....\Yc`..PROGRA~2.........O.I\Yc`....................V......,..P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....z.1.....\Ye`..LITEMA~1..b......\Yc`\Ye`...........................C..L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.....h.2.PPv..Y%. .ROMSER~1.EXE..L.......Y%.\Ye`..............................R.O.M.S.e.r.v.e.r...e.x.e.......l...............-.......k.............'......C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe..L.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.\.R.O.M.S.e.r.v.e.r...e.x.e.0.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.\.../.c.o.n.f.i.g.n.C.:.\.W.i.n.d.o.w.s.\.I.n.s.t.a.l.l.e.r.\.{.7.1.F.F.A.4.7.5.-.2.4.D.5.-.4.4.F.B.-.A.5.1.F.-.3.9.B.6.9.9.E.3.D.8.2.C.}.\
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                          Category:dropped
                                          Size (bytes):1890
                                          Entropy (8bit):3.1573107695942624
                                          Encrypted:false
                                          SSDEEP:48:8ddOEPLqd5Y+d5YcCP5q2DT2S0Wq2DTKX7:85LJ9cM5qUoWqUE
                                          MD5:5FC67E19699B3F0B2AB7B4B89B0B3F1A
                                          SHA1:6F6380DF2EB8C5D30452A846864F001A8B0E473A
                                          SHA-256:45451F933B472FA53301D46B7C072AF67E51EC60172E6E9C01E0B308DF78A2F4
                                          SHA-512:81C7A9F5683DB54893BD26A6EC1BCBDB17983037668CD996E03934E7708331594195DBF2CCE9EB2B0C0567A9E8B24DD629D40866D49E55C9DF77A864D15744E5
                                          Malicious:false
                                          Preview:L..................F.@...........................................................P.O. .:i.....+00.../C:\...................z.1...........Program Files (x86).X............................................P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)..."...1...........LiteManager Pro - Server..b............................................L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r...(.h.2...........ROMServer.exe.L............................................R.O.M.S.e.r.v.e.r...e.x.e.......L.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.\.R.O.M.S.e.r.v.e.r...e.x.e.0.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.\.../.s.t.a.r.t.n.C.:.\.W.i.n.d.o.w.s.\.I.n.s.t.a.l.l.e.r.\.{.7.1.F.F.A.4.7.5.-.2.4.D.5.-.4.4.F.B.-.A.5.1.F.-.3.9.B.6.9.9.E.3.D.8.2.C.}.\.R.O.M.S.e.r.v.e.r...e.x.e._.9.D.0.9.B.2.B.C.2.5.A.2.4.1.4.C.B.D.8.4.8.E.2.B.7.5.8.9.8.6.7.6...e.x.e.........%SystemRoot%\In
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Thu Aug 22 17:41:10 2024, mtime=Mon Oct 28 11:03:09 2024, atime=Thu Aug 22 17:41:10 2024, length=7753808, window=hide
                                          Category:dropped
                                          Size (bytes):2159
                                          Entropy (8bit):3.8960676812781156
                                          Encrypted:false
                                          SSDEEP:48:8b2U6mdOs9eCZd5Y+d5Ys5qcxFWT84SslWqcxFWT8cw:8b5969s5qcxYT8SWqcxYT8c
                                          MD5:C6AA7F2B0B30D410E402707AF4EB74E4
                                          SHA1:B08077F8A6EADA7DD64869AAD47B274C514FB3B9
                                          SHA-256:B20112773E8008253745811BB3F8DFCE4694B17B2035EC5B3EFE8170DE6EFEDD
                                          SHA-512:69E4707565A5F72704169CCD0E26160B110808058BA9D1792090831C634A957031385ED4725F8276E9764877564C061CBE04ACE440A28096BC20C4586B11207A
                                          Malicious:false
                                          Preview:L..................F.@.. .....>......j.Z1)....>.....PPv..........................P.O. .:i.....+00.../C:\.....................1.....\Yc`..PROGRA~2.........O.I\Yc`....................V......,..P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....z.1.....\Yd`..LITEMA~1..b......\Yc`\Yd`..........................S4;.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.....h.2.PPv..Y%. .ROMSER~1.EXE..L.......Y%.\Yd`..............................R.O.M.S.e.r.v.e.r...e.x.e.......l...............-.......k.............'......C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe..L.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.\.R.O.M.S.e.r.v.e.r...e.x.e.0.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.\.../.s.t.o.p.l.C.:.\.W.i.n.d.o.w.s.\.I.n.s.t.a.l.l.e.r.\.{.7.1.F.F.A.4.7.5.-.2.4.D.5.-.4.4.F.B.-.A.5.1.F.-.3.9.B.6.9.9.E.3.D.8.2.C.}.\.s.t
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=0, Archive, ctime=Sat Dec 7 08:10:02 2019, mtime=Wed Oct 4 09:56:56 2023, atime=Sat Dec 7 08:10:02 2019, length=59904, window=hide
                                          Category:dropped
                                          Size (bytes):1953
                                          Entropy (8bit):3.8809425986964357
                                          Encrypted:false
                                          SSDEEP:48:8Wn0l9MSMb0rHOn5qmjlt6ScWqmjltZV:8w0loZn5qmjlmWqmjl
                                          MD5:E8722C2D55899FC1CA3FDEFAE9928708
                                          SHA1:E13D8E04499974C5A3170E3A565DB9F2DEBAF631
                                          SHA-256:89E0D75CE01D42F50447CFCEE3171CE3F91CCC7C9627FC9F3BB745CD55AD7D80
                                          SHA-512:0D76520534FD7A929FAE0DB8947CB903DD9301D213EFC5C93085598F4D220D20F9F965C00F498C8F26286DA7A937AA700A4EE2318461A0B1B7B9189AF547F5E8
                                          Malicious:false
                                          Preview:L..................F.@.. ...25.....1>.~....25.............................A....P.O. .:i.....+00.../C:\...................V.1.....DWR`..Windows.@......OwH\Y]`....3.........................W.i.n.d.o.w.s.....Z.1.....\Y[`..SysWOW64..B......O.I\Y]`....Y.........................S.y.s.W.O.W.6.4.....b.2......OBI .msiexec.exe.H......OBIDW.V................|.............m.s.i.e.x.e.c...e.x.e.......N...............-.......M.............'......C:\Windows\SysWOW64\msiexec.exe........\.....\.....\.....\.....\.....\.W.i.n.d.o.w.s.\.S.y.s.W.O.W.6.4.\.m.s.i.e.x.e.c...e.x.e.)./.x. .{.7.1.F.F.A.4.7.5.-.2.4.D.5.-.4.4.F.B.-.A.5.1.F.-.3.9.B.6.9.9.E.3.D.8.2.C.}.s.C.:.\.W.i.n.d.o.w.s.\.I.n.s.t.a.l.l.e.r.\.{.7.1.F.F.A.4.7.5.-.2.4.D.5.-.4.4.F.B.-.A.5.1.F.-.3.9.B.6.9.9.E.3.D.8.2.C.}.\.U.N.I.N.S.T._.U.n.i.n.s.t.a.l.l._.L._.7.8.A.A.5.B.6.6.6.2.5.1.4.D.9.4.A.8.4.7.D.6.C.6.0.3.A.F.0.8.9.5...e.x.e.........%SystemRoot%\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\UNINST_Uninstall_L_78AA5B6662514D94A847D6C6
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          File Type:ASCII text
                                          Category:dropped
                                          Size (bytes):292
                                          Entropy (8bit):5.145104270193998
                                          Encrypted:false
                                          SSDEEP:6:ydWJq2Pwkn2nKuAl9OmbnIFUt8hdWWrZmw+hdWWhkwOwkn2nKuAl9OmbjLJ:fvYfHAahFUt8br/+bh5JfHAaSJ
                                          MD5:553DF771E63955637137A2B825A8E429
                                          SHA1:25545F405609A33512B4AF882886476164EAA88A
                                          SHA-256:9E5BCBC261698E97FF5961D02A2DFED68A1980C9F2A0B83EF2DFDBAA724E3961
                                          SHA-512:D62ED68E14E426B69E2A1298F6B1D327B09B18756830DF88EC245B07E98B30B6FB030130BB9F4FE1932EFB4B3C1ADCD851389806779F77DE1DDA4887F78FF1E0
                                          Malicious:false
                                          Preview:2024/10/28-08:03:04.631 1c04 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/10/28-08:03:04.633 1c04 Recovering log #3.2024/10/28-08:03:04.633 1c04 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          File Type:ASCII text
                                          Category:dropped
                                          Size (bytes):292
                                          Entropy (8bit):5.145104270193998
                                          Encrypted:false
                                          SSDEEP:6:ydWJq2Pwkn2nKuAl9OmbnIFUt8hdWWrZmw+hdWWhkwOwkn2nKuAl9OmbjLJ:fvYfHAahFUt8br/+bh5JfHAaSJ
                                          MD5:553DF771E63955637137A2B825A8E429
                                          SHA1:25545F405609A33512B4AF882886476164EAA88A
                                          SHA-256:9E5BCBC261698E97FF5961D02A2DFED68A1980C9F2A0B83EF2DFDBAA724E3961
                                          SHA-512:D62ED68E14E426B69E2A1298F6B1D327B09B18756830DF88EC245B07E98B30B6FB030130BB9F4FE1932EFB4B3C1ADCD851389806779F77DE1DDA4887F78FF1E0
                                          Malicious:false
                                          Preview:2024/10/28-08:03:04.631 1c04 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/10/28-08:03:04.633 1c04 Recovering log #3.2024/10/28-08:03:04.633 1c04 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          File Type:ASCII text
                                          Category:dropped
                                          Size (bytes):336
                                          Entropy (8bit):5.145613633667834
                                          Encrypted:false
                                          SSDEEP:6:ydEzIq2Pwkn2nKuAl9Ombzo2jMGIFUt8hdEf0XZmw+hdWgPkwOwkn2nKuAl9OmbX:WvYfHAa8uFUt8//+75JfHAa8RJ
                                          MD5:4BC68D06D9633C97935EFFD9C3757CE9
                                          SHA1:FEC5D8E1974DC37A9A4BAF54D0822371D548B5CD
                                          SHA-256:581A1EF74A6C4D45CD98B02AF6FF6905B70B925B2FF206E6ED5FE57E09803428
                                          SHA-512:75DB983746037F23A26F3B4C399956579AAC7E6CC5B33DB9769E6E43C6CBCBCBFF6689207F5C759C84DC782A3D6B08645DC1AEDE36A6C587F42044F7FEFC7812
                                          Malicious:false
                                          Preview:2024/10/28-08:03:04.628 1ce4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/10/28-08:03:04.629 1ce4 Recovering log #3.2024/10/28-08:03:04.630 1ce4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          File Type:ASCII text
                                          Category:dropped
                                          Size (bytes):336
                                          Entropy (8bit):5.145613633667834
                                          Encrypted:false
                                          SSDEEP:6:ydEzIq2Pwkn2nKuAl9Ombzo2jMGIFUt8hdEf0XZmw+hdWgPkwOwkn2nKuAl9OmbX:WvYfHAa8uFUt8//+75JfHAa8RJ
                                          MD5:4BC68D06D9633C97935EFFD9C3757CE9
                                          SHA1:FEC5D8E1974DC37A9A4BAF54D0822371D548B5CD
                                          SHA-256:581A1EF74A6C4D45CD98B02AF6FF6905B70B925B2FF206E6ED5FE57E09803428
                                          SHA-512:75DB983746037F23A26F3B4C399956579AAC7E6CC5B33DB9769E6E43C6CBCBCBFF6689207F5C759C84DC782A3D6B08645DC1AEDE36A6C587F42044F7FEFC7812
                                          Malicious:false
                                          Preview:2024/10/28-08:03:04.628 1ce4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/10/28-08:03:04.629 1ce4 Recovering log #3.2024/10/28-08:03:04.630 1ce4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          File Type:JSON data
                                          Category:modified
                                          Size (bytes):475
                                          Entropy (8bit):4.973413864143525
                                          Encrypted:false
                                          SSDEEP:12:YH/um3RA8sqsN7MhsBdOg2HtzZcaq3QYiubInP7E4T3y:Y2sRdsp7XdMH9g3QYhbG7nby
                                          MD5:4464D65AC3D17BF3D4CC20C2A36EAC3C
                                          SHA1:214C10128288C15079242CFCBC6086D14F8A73E9
                                          SHA-256:5A3D224D1734D4F23AE55ECCB3798328F5E4E0BA5226FCA2209E9D1A72EFBF4A
                                          SHA-512:89F06D1A4EE963A42E6E0284AC535A477DC65CD20FD1281196578AEA75041CE7E0D4B5C301E23F67096294A7FB0EA2366F3794F20D03D26CF948FDB312D2D1D0
                                          Malicious:false
                                          Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13374676991157174","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":279070},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.4","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          File Type:JSON data
                                          Category:dropped
                                          Size (bytes):475
                                          Entropy (8bit):4.973413864143525
                                          Encrypted:false
                                          SSDEEP:12:YH/um3RA8sqsN7MhsBdOg2HtzZcaq3QYiubInP7E4T3y:Y2sRdsp7XdMH9g3QYhbG7nby
                                          MD5:4464D65AC3D17BF3D4CC20C2A36EAC3C
                                          SHA1:214C10128288C15079242CFCBC6086D14F8A73E9
                                          SHA-256:5A3D224D1734D4F23AE55ECCB3798328F5E4E0BA5226FCA2209E9D1A72EFBF4A
                                          SHA-512:89F06D1A4EE963A42E6E0284AC535A477DC65CD20FD1281196578AEA75041CE7E0D4B5C301E23F67096294A7FB0EA2366F3794F20D03D26CF948FDB312D2D1D0
                                          Malicious:false
                                          Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13374676991157174","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":279070},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.4","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):4320
                                          Entropy (8bit):5.250715179537171
                                          Encrypted:false
                                          SSDEEP:96:etJCV4FAsszrNamjTN/2rjYMta02fDtehgO7BtTgo78Zm8:etJCV4FiN/jTN/2r8Mta02fEhgO73goO
                                          MD5:53D271A53A7F5BAACB2D29662793EED1
                                          SHA1:7537F5E302CF0D70B3E573E639880566974738BF
                                          SHA-256:E7448C30CA6CE3948B13D278C8BE29CD9A3065F5168B128EEA522E0B1292D0C3
                                          SHA-512:37CE05C6017683851CDFDD6F388661D7969983E12FDAE143AE5217E9C053EE42477D93BE3A724D9531B6115B63B602CA220FE5258CD5938E9EDA2E26D442B26E
                                          Malicious:false
                                          Preview:*...#................version.1..namespace-['O.o................next-map-id.1.Pnamespace-158f4913_074a_4bdf_b463_eb784cc805b4-https://rna-resource.acrobat.com/.0>...r................next-map-id.2.Snamespace-fd2db5bd_ef7e_4124_bfa7_f036ce1d74e5-https://rna-v2-resource.acrobat.com/.1O..r................next-map-id.3.Snamespace-cd5be8d1_42d2_481d_ac0e_f904ae470bda-https://rna-v2-resource.acrobat.com/.2.\.o................next-map-id.4.Pnamespace-6070ce43_6a74_4d0a_9cb8_0db6c3126811-https://rna-resource.acrobat.com/.3....^...............Pnamespace-158f4913_074a_4bdf_b463_eb784cc805b4-https://rna-resource.acrobat.com/..|.^...............Pnamespace-6070ce43_6a74_4d0a_9cb8_0db6c3126811-https://rna-resource.acrobat.com/n..Fa...............Snamespace-fd2db5bd_ef7e_4124_bfa7_f036ce1d74e5-https://rna-v2-resource.acrobat.com/DQ..a...............Snamespace-cd5be8d1_42d2_481d_ac0e_f904ae470bda-https://rna-v2-resource.acrobat.com/i.`do................next-map-id.5.Pnamespace-de635bf2_6773_4d83_ad16_
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          File Type:ASCII text
                                          Category:dropped
                                          Size (bytes):324
                                          Entropy (8bit):5.170253307539203
                                          Encrypted:false
                                          SSDEEP:6:y6xJ9q2Pwkn2nKuAl9OmbzNMxIFUt8h6xSuGQZmw+h6xSuGYkwOwkn2nKuAl9Omk:jxPvYfHAa8jFUt88xSu/+8xSC5JfHAab
                                          MD5:9FDC830DC5241312429B6C064771244C
                                          SHA1:5A40FC0C2829FDF8F705A6BB841F355E8B713950
                                          SHA-256:351358C8E96CAFB15C51C0E4BE3D5AEDD02B72A39F6BA5ABC12861E460967791
                                          SHA-512:D830DD1EBD1E25DFCCA708060E598E8A07CE0DEB28B7359A9CB8B6A94E4DE2AB9382355A444911ABE35524F4943809D01CCFD77CD104A315332188E1C1BF9D75
                                          Malicious:false
                                          Preview:2024/10/28-08:03:05.426 1ce4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/10/28-08:03:05.427 1ce4 Recovering log #3.2024/10/28-08:03:05.427 1ce4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          File Type:ASCII text
                                          Category:dropped
                                          Size (bytes):324
                                          Entropy (8bit):5.170253307539203
                                          Encrypted:false
                                          SSDEEP:6:y6xJ9q2Pwkn2nKuAl9OmbzNMxIFUt8h6xSuGQZmw+h6xSuGYkwOwkn2nKuAl9Omk:jxPvYfHAa8jFUt88xSu/+8xSC5JfHAab
                                          MD5:9FDC830DC5241312429B6C064771244C
                                          SHA1:5A40FC0C2829FDF8F705A6BB841F355E8B713950
                                          SHA-256:351358C8E96CAFB15C51C0E4BE3D5AEDD02B72A39F6BA5ABC12861E460967791
                                          SHA-512:D830DD1EBD1E25DFCCA708060E598E8A07CE0DEB28B7359A9CB8B6A94E4DE2AB9382355A444911ABE35524F4943809D01CCFD77CD104A315332188E1C1BF9D75
                                          Malicious:false
                                          Preview:2024/10/28-08:03:05.426 1ce4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/10/28-08:03:05.427 1ce4 Recovering log #3.2024/10/28-08:03:05.427 1ce4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 15, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 15
                                          Category:dropped
                                          Size (bytes):86016
                                          Entropy (8bit):4.445096135519542
                                          Encrypted:false
                                          SSDEEP:384:yezci5tliBA7aDQPsknQ0UNCFOa14ocOUw6zyFzqFkdZ+EUTTcdUZ5yDQhJL:rOs3OazzU89UTTgUL
                                          MD5:8F2966626433267E3206A1F9F47228E0
                                          SHA1:003D691842C02F669DCA289B41336DD28F1F7DE7
                                          SHA-256:DE27F4580DF45B066D99C62201C07F482B9ACDDFF8700ABF2FAF7C1E38CF8A3C
                                          SHA-512:2775AC250BB672FF91B91FFC0C9F9050A4E6B027A897D6DA7A9C2F3B391A232CAB773C24DF8CD2E95B7357229B6D1A070BDF8459334C494BFB46163E06A6DD46
                                          Malicious:false
                                          Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                          File Type:SQLite Rollback Journal
                                          Category:dropped
                                          Size (bytes):8720
                                          Entropy (8bit):3.777239878707144
                                          Encrypted:false
                                          SSDEEP:48:7M2p/E2ioyVj1ioy9oWoy1Cwoy1W+KOioy1noy1AYoy1Wioy1hioybioycPoy1nz:7ppjuj1FZGXKQP9Ub9IVXEBodRBkA
                                          MD5:C901C2C95CCE670D53B1373B6F676062
                                          SHA1:86AE169025BCB69B0287B12131D44338348CA96F
                                          SHA-256:3BF9D4CBB79A46F9EEEACA3468EF6A58DF9FAA2A5811D0AD60CB7A0F71101D61
                                          SHA-512:0F598CAB229103412CCEC9BABAC747280B685FDAFE0B86A04936AB9AD1422047513E3AB2C7D7E013065C75FCECC3805345374F94BD086FB09097B3C1C94949E6
                                          Malicious:false
                                          Preview:.... .c......@.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T...[...b...r...t...}.....L..............................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          File Type:Certificate, Version=3
                                          Category:dropped
                                          Size (bytes):1391
                                          Entropy (8bit):7.705940075877404
                                          Encrypted:false
                                          SSDEEP:24:ooVdTH2NMU+I3E0Ulcrgdaf3sWrATrnkC4EmCUkmGMkfQo1fSZotWzD1:ooVguI3Kcx8WIzNeCUkJMmSuMX1
                                          MD5:0CD2F9E0DA1773E9ED864DA5E370E74E
                                          SHA1:CABD2A79A1076A31F21D253635CB039D4329A5E8
                                          SHA-256:96BCEC06264976F37460779ACF28C5A7CFE8A3C0AAE11A8FFCEE05C0BDDF08C6
                                          SHA-512:3B40F27E828323F5B91F8909883A78A21C86551761F27B38029FAAEC14AF5B7AA96FB9F9CC93EE201B5EB1D0FEF17B290747E8B839D2E49A8F36C5EBF3C7C910
                                          Malicious:false
                                          Preview:0..k0..S............@.YDc.c...0...*.H........0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10...150604110438Z..350604110438Z0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10.."0...*.H.............0..........$s..7.+W(.....8..n<.W.x.u...jn..O(..h.lD...c...k....1.!~.3<.H..y.....!.K...qiJffl.~<p..)"......K...~....G.|.H#S.8.O.o...IW..t../.8.{.p!.u.0<.....c...O..K~.....w...{J.L.%.p..)..S$........J.?..aQ.....cq...o[...\4ylv.;.by.../&.....................6....7..6u...r......I.....*.A..v........5/(.l....dwnG7..Y^h..r...A)>Y>.&.$...Z.L@.F....:Qn.;.}r...xY.>Qx....../..>{J.Ks......P.|C.t..t.....0.[q6....00\H..;..}`...).........A.......|.;F.H*..v.v..j.=...8.d..+..(.....B.".'].y...p..N..:..'Qn..d.3CO......B0@0...U...........0...U.......0....0...U......y.Y.{....s.....X..n0...*.H.............U.X....P.....i ')..au\.n...i/..VK..s.Y.!.~.Lq...`.9....!V..P.Y...Y.............b.E.f..|o..;.....'...}~.."......
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                          Category:dropped
                                          Size (bytes):71954
                                          Entropy (8bit):7.996617769952133
                                          Encrypted:true
                                          SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                          MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                          SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                          SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                          SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                          Malicious:false
                                          Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):192
                                          Entropy (8bit):2.756901573172974
                                          Encrypted:false
                                          SSDEEP:3:kkFklxx069PtfllXlE/HT8kPJ/tNNX8RolJuRdxLlGB9lQRYwpDdt:kKV8eT8IJ7NMa8RdWBwRd
                                          MD5:AF32931264950EE2BFDC6191845B8C95
                                          SHA1:577CDACCD379456DECF3648F7B4360C4AB85196F
                                          SHA-256:CC586AE162D671869BAFA44B7C6C8647F5879049BC165055A5FF42FFFBB64A12
                                          SHA-512:CC6464EDD8414690DB7F0EE03D1FAFF2AE2BE7F30B954D23C15B4FC55F0E443F637EFA4982380915EB7A6AE635F71272F0B24D6F52C2346E7CE23912AE408151
                                          Malicious:false
                                          Preview:p...... ..........._1)..(....................................................... ..........W....................o...h.t.t.p.:././.x.1...i...l.e.n.c.r...o.r.g./...".6.4.c.d.6.6.5.4.-.5.6.f."...
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):328
                                          Entropy (8bit):3.1333860653411176
                                          Encrypted:false
                                          SSDEEP:6:kK7kL9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:DkiDnLNkPlE99SNxAhUe/3
                                          MD5:00F4A22B88A4BA799A71606AD9D98EDF
                                          SHA1:976A1BC0ADD75F859345E332A41F344E662EEA56
                                          SHA-256:5A7221F663A4DAAB7F27874F69B349495DEA08469D6B25A176C0446FA5F66F61
                                          SHA-512:BCE4C98072EF14AEFDA4AC7A9049D421BD6BC9FEBE065C5678AB2CE1883B609CE6EC7586CD3B9BA55CF815014CE776924A08A7740BF08893D7F3A57786F2B7CA
                                          Malicious:false
                                          Preview:p...... ........iB.`1)..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                          File Type:PostScript document text
                                          Category:dropped
                                          Size (bytes):185099
                                          Entropy (8bit):5.182478651346149
                                          Encrypted:false
                                          SSDEEP:1536:JsVoWFMWQNk1KUQII5J5lZRT95tFiQibVJDS+Stu/3IVQBrp3Mv9df0CXLhNHqTM:bViyFXE07ZmandGCyN2mM7IgOP0gC
                                          MD5:94185C5850C26B3C6FC24ABC385CDA58
                                          SHA1:42F042285037B0C35BC4226D387F88C770AB5CAA
                                          SHA-256:1D9979A98F7C4B3073BC03EE9D974CCE9FE265A1E2F8E9EE26A4A5528419E808
                                          SHA-512:652657C00DD6AED1A132E1DFD0B97B8DF233CDC257DA8F75AC9F2428F2F7715186EA8B3B24F8350D409CC3D49AFDD36E904B077E28B4AD3E4D08B4DBD5714344
                                          Malicious:false
                                          Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Reg.FamilyName:Agency FB.StyleName:Regular.MenuName:Agency FB.StyleBits:0.WeightClass:400.WidthClass:3.AngleClass:0.FullName:Agency FB.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB.FileLength:58920.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Bold.FamilyName:Agency FB.StyleName:Bold.MenuName:Agency FB.StyleBits:2.WeightClass:700.WidthClass:3.AngleClass:0.FullName:Agency FB Bold.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB Bold.FileLength:60656.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB Bold.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:Algerian.FamilyName:Algerian.StyleName:Regular.MenuName:Algerian.StyleBits:0.We
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                          File Type:PostScript document text
                                          Category:dropped
                                          Size (bytes):185099
                                          Entropy (8bit):5.182478651346149
                                          Encrypted:false
                                          SSDEEP:1536:JsVoWFMWQNk1KUQII5J5lZRT95tFiQibVJDS+Stu/3IVQBrp3Mv9df0CXLhNHqTM:bViyFXE07ZmandGCyN2mM7IgOP0gC
                                          MD5:94185C5850C26B3C6FC24ABC385CDA58
                                          SHA1:42F042285037B0C35BC4226D387F88C770AB5CAA
                                          SHA-256:1D9979A98F7C4B3073BC03EE9D974CCE9FE265A1E2F8E9EE26A4A5528419E808
                                          SHA-512:652657C00DD6AED1A132E1DFD0B97B8DF233CDC257DA8F75AC9F2428F2F7715186EA8B3B24F8350D409CC3D49AFDD36E904B077E28B4AD3E4D08B4DBD5714344
                                          Malicious:false
                                          Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Reg.FamilyName:Agency FB.StyleName:Regular.MenuName:Agency FB.StyleBits:0.WeightClass:400.WidthClass:3.AngleClass:0.FullName:Agency FB.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB.FileLength:58920.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Bold.FamilyName:Agency FB.StyleName:Bold.MenuName:Agency FB.StyleBits:2.WeightClass:700.WidthClass:3.AngleClass:0.FullName:Agency FB Bold.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB Bold.FileLength:60656.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB Bold.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:Algerian.FamilyName:Algerian.StyleName:Regular.MenuName:Algerian.StyleBits:0.We
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):4
                                          Entropy (8bit):0.8112781244591328
                                          Encrypted:false
                                          SSDEEP:3:e:e
                                          MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                                          SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                                          SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                                          SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                                          Malicious:false
                                          Preview:....
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                          File Type:JSON data
                                          Category:dropped
                                          Size (bytes):2145
                                          Entropy (8bit):5.066534504476633
                                          Encrypted:false
                                          SSDEEP:48:Yx2sL0/EY0bMSlMtCM5mMOpiMAW0MretMSMmkaMY:pv/SYtt55V6AWLre6JmkhY
                                          MD5:154C2E379462487395186278E48BC8F2
                                          SHA1:B21F57BD3E3E394758F1EB8540F9912DF92F79DF
                                          SHA-256:A07139AEA1CCFECAA8D4D9FF60D2E07375EF3C964CEC15F3E1C5CF79A9CA02CF
                                          SHA-512:6CE00A73982C814E2748BC2D976213040AA33D97B5BB52F97BF902A228C6AD489CC9732369892C452319EB42C4BFE808925DD3342797765A5AEA6004F355FABD
                                          Malicious:false
                                          Preview:{"all":[{"id":"TESTING","info":{"dg":"DG","sid":"TESTING"},"mimeType":"file","size":4,"ts":1730116987000},{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"23c88c8acf166d9fda5ae4d83df3db72","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":1250,"ts":1696420889000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"d5fa85f4cf271b5fa75367efd1b392fa","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":295,"ts":1696420884000},{"id":"DC_FirstMile_Right_Sec_Surface","info":{"dg":"7c2ad79e375e3ea39f82a389e8a5841f","sid":"DC_FirstMile_Right_Sec_Surface"},"mimeType":"file","size":294,"ts":1696420882000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"c3af48ba3dee086edbbf20dff46c7ee0","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1255,"ts":1696333862000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"7101e009d8bf8920d0a3dd3f5dc75ebc","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1250,"ts":1696333862000},{"id":"DC_Reader_Edit_LHP_Banner"
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
                                          Category:dropped
                                          Size (bytes):12288
                                          Entropy (8bit):1.1873812018033258
                                          Encrypted:false
                                          SSDEEP:48:TGufl2GL7msEHUUUUUUUUuxuqSvR9H9vxFGiDIAEkGVvpixuM:lNVmswUUUUUUUUfq+FGSItfM
                                          MD5:83EA171C10E13F70C2BCB06E0E5E4CF4
                                          SHA1:0417DA3FC6A26F29A3CF9A550D514FAF79B86B0A
                                          SHA-256:7D9D9CC72885BBC79EB89549514E578A58F86C4C67F05B37E011E7FE33169B6B
                                          SHA-512:A0F9C658F0AAB956B14B9AD2CCB62FC06917FA5EA2B3002551E7DAC4D9E24FA810DE2EA99940448A4613997B8B3E3E26491F5939961513B324309814DDE1EEC9
                                          Malicious:false
                                          Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                          File Type:SQLite Rollback Journal
                                          Category:dropped
                                          Size (bytes):8720
                                          Entropy (8bit):1.6073608217166704
                                          Encrypted:false
                                          SSDEEP:48:7M+KUUUUUUUUUUuxuIvR9H9vxFGiDIAEkGVvWqFl2GL7msx:7yUUUUUUUUUUfgFGSItcKVmsx
                                          MD5:73D5AC5CABBDCC735A6D5F2E2B506A18
                                          SHA1:DCC8870F73FF4BE3CBB248C2C6BA249D887B1FFF
                                          SHA-256:A629B08CCE383B0AF17B04B6D55C245D095F6D5F2BB710F6F69BA060925D919E
                                          SHA-512:701AD9EC679BD664CAFCDA7B8C35636FB7CE9EF854A20BC365E8E2EEEE7FA1EDD438094F2FD93E859F119C2A59F3375479428669E8F82AF3D2810C2EC84B87F7
                                          Malicious:false
                                          Preview:.... .c.....$.!.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................f.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\0438.pdf.exe
                                          File Type:PDF document, version 1.7, 1 pages (zip deflate encoded)
                                          Category:dropped
                                          Size (bytes):125552
                                          Entropy (8bit):7.579988719622451
                                          Encrypted:false
                                          SSDEEP:1536:N0N5xSlECZcbZ42IlWpy67H/AvLpMpBXCF4KMvX6UkMZdEMLHMgifPdEoLIeLA+6:CNPSiJZ4xy8DlivXREMBOlEoMeLjCiQ
                                          MD5:7827620BA2CD12D54B41C006BA4D686C
                                          SHA1:F6B40CB23006AD0E1AFD4C08CA943A75258FAB34
                                          SHA-256:9DAA46F8D84B0E65E2D5FDF7FCD80FF6CA922278C32A2B5C9425C0C5EF7D2096
                                          SHA-512:9782FB4DBA6F62A589BF213AE5CCE3F66514319363F499B584DC854ACC1DCD94221102BDDAC982AA9DB36C5B7696BD1ABACF7C15771CDECC317B2F3421CCA321
                                          Malicious:false
                                          Preview:%PDF-1.7..%......1 0 obj..<</Type/Catalog/Pages 2 0 R/Lang(en) /StructTreeRoot 11 0 R/MarkInfo<</Marked true>>/Metadata 22 0 R/ViewerPreferences 23 0 R>>..endobj..2 0 obj..<</Type/Pages/Count 1/Kids[ 3 0 R] >>..endobj..3 0 obj..<</Type/Page/Parent 2 0 R/Resources<</Font<</F1 5 0 R>>/ExtGState<</GS7 7 0 R/GS8 8 0 R>>/XObject<</Image9 9 0 R>>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<</Type/Group/S/Transparency/CS/DeviceRGB>>/Tabs/S/StructParents 0>>..endobj..4 0 obj..<</Filter/FlateDecode/Length 188>>..stream..x.E.K..@.......R..!.4 .|$FB.."ZH.+............x.h..!/."..f....X.Q.8M.D0aGK..+.J{x.....(.kJ.FBJ&|.7J...H..f..%..Nory..M'...m9%g.......4.(AV&............2...H..B...Z..o.V#.c.....6k..endstream..endobj..5 0 obj..<</Type/Font/Subtype/TrueType/Name/F1/BaseFont/BCDEEE+Calibri/Encoding/WinAnsiEncoding/FontDescriptor 6 0 R/FirstChar 32/LastChar 32/Widths 20 0 R>>..endobj..6 0 obj..<</Type/FontDescriptor/FontName/BCDEEE+Calibri/Flags 3
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                          File Type:ASCII text, with very long lines (393)
                                          Category:dropped
                                          Size (bytes):16525
                                          Entropy (8bit):5.345946398610936
                                          Encrypted:false
                                          SSDEEP:384:zHIq8qrq0qoq/qUILImCIrImI9IWdFdDdoPtPTPtP7ygyAydy0yGV///X/J/VokV:nNW
                                          MD5:8947C10F5AB6CFFFAE64BCA79B5A0BE3
                                          SHA1:70F87EEB71BA1BE43D2ABAB7563F94C73AB5F778
                                          SHA-256:4F3449101521DA7DF6B58A2C856592E1359BA8BD1ACD0688ECF4292BA5388485
                                          SHA-512:B76DB9EF3AE758F00CAF0C1705105C875838C7801F7265B17396466EECDA4BCD915DA4611155C5F2AD1C82A800C1BEC855E52E2203421815F915B77AA7331CA0
                                          Malicious:false
                                          Preview:SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:088+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="SetConfig:
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                          File Type:ASCII text, with very long lines (393), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):15114
                                          Entropy (8bit):5.363442924398914
                                          Encrypted:false
                                          SSDEEP:384:pZNgKabIpfQq6F4ZNyYTPdbaK5SgxDzcYv7DZDPDnD5D0WLdSWtqwmzQomfmzKjG:rdu
                                          MD5:1BB862FC525CCE1E4377367E4990CE85
                                          SHA1:FE4BE9C408803FA2DDDD6F1C13214CFC4F45568F
                                          SHA-256:408F1A7E929738EE6EBAB86F4B132896F3675790CB1665349BAC326C48F7F5E3
                                          SHA-512:B23F31CFEF7D6DD53229C10EA20D0A286ED0B57EA9ACAF236168337FAFD48BDC73D4778120C41ED2EC48F4F4DC29B250B7BA55D59EEC880CBCCA599520B31A5C
                                          Malicious:false
                                          Preview:SessionID=a9f52ce0-0760-4b9d-823d-ffdccc1b49e2.1730116986655 Timestamp=2024-10-28T08:03:06:655-0400 ThreadID=7864 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------"..SessionID=a9f52ce0-0760-4b9d-823d-ffdccc1b49e2.1730116986655 Timestamp=2024-10-28T08:03:06:671-0400 ThreadID=7864 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found"..SessionID=a9f52ce0-0760-4b9d-823d-ffdccc1b49e2.1730116986655 Timestamp=2024-10-28T08:03:06:671-0400 ThreadID=7864 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!"..SessionID=a9f52ce0-0760-4b9d-823d-ffdccc1b49e2.1730116986655 Timestamp=2024-10-28T08:03:06:671-0400 ThreadID=7864 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1"..SessionID=a9f52ce0-0760-4b9d-823d-ffdccc1b49e2.1730116986655 Timestamp=2024-10-28T08:03:06:672-0400 ThreadID=7864 Component=ngl-lib_NglAppLib Description="SetConf
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):29752
                                          Entropy (8bit):5.390804789614036
                                          Encrypted:false
                                          SSDEEP:768:anddBuBYZwcfCnwZCnR8Bu5hx18HoCnLlAY+iCBuzhLCnx1CnPrRRFS10l8gT2rt:x
                                          MD5:4D92A5DE128FFAE540B36DA5F371BA22
                                          SHA1:AEE72E8C42CEA59423AC9EBADE1B5EC326C4C989
                                          SHA-256:83F6FDB56605A703AEE2A8DE3904D939E860C2108F36465F2FEBED5B1E8828AC
                                          SHA-512:166793A06C19FB625A0B58E45E708758603447A0F37745EC856F0C7B01042470A6EC10102B2ADB9A46AC4DA2E6BEBC24A2E899A83B8BDC699D48EDA0E885F414
                                          Malicious:false
                                          Preview:03-10-2023 12:50:40:.---2---..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ***************************************..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ***************************************..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : Starting NGL..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..03-10-2023 12:50:40:.Closing File..03-10-
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
                                          Category:dropped
                                          Size (bytes):386528
                                          Entropy (8bit):7.9736851559892425
                                          Encrypted:false
                                          SSDEEP:6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m
                                          MD5:5C48B0AD2FEF800949466AE872E1F1E2
                                          SHA1:337D617AE142815EDDACB48484628C1F16692A2F
                                          SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
                                          SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
                                          Malicious:false
                                          Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
                                          Category:dropped
                                          Size (bytes):758601
                                          Entropy (8bit):7.98639316555857
                                          Encrypted:false
                                          SSDEEP:12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg
                                          MD5:3A49135134665364308390AC398006F1
                                          SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
                                          SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
                                          SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
                                          Malicious:false
                                          Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
                                          Category:dropped
                                          Size (bytes):1419751
                                          Entropy (8bit):7.976496077007677
                                          Encrypted:false
                                          SSDEEP:24576:/rwYIGNP4mOWL07oBGZ1dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07D:TwZG6bWLxBGZN3mlind9i4ufFXpAXkru
                                          MD5:95F182500FC92778102336D2D5AADCC8
                                          SHA1:BEC510B6B3D595833AF46B04C5843B95D2A0A6C9
                                          SHA-256:9F9C041D7EE1DA404E53022D475B9E6D5924A17C08D5FDEC58C0A1DCDCC4D4C9
                                          SHA-512:D7C022459486D124CC6CDACEAD8D46E16EDC472F4780A27C29D98B35AD01A9BA95F62155433264CC12C32BFF384C7ECAFCE0AC45853326CBC622AE65EE0D90BA
                                          Malicious:false
                                          Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                          Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
                                          Category:dropped
                                          Size (bytes):1407294
                                          Entropy (8bit):7.97605879016224
                                          Encrypted:false
                                          SSDEEP:24576:/xA7o5dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07/WLaGZDwYIGNPJe:JVB3mlind9i4ufFXpAXkrfUs0jWLaGZo
                                          MD5:A0CFC77914D9BFBDD8BC1B1154A7B364
                                          SHA1:54962BFDF3797C95DC2A4C8B29E873743811AD30
                                          SHA-256:81E45F94FE27B1D7D61DBC0DAFC005A1816D238D594B443BF4F0EE3241FB9685
                                          SHA-512:74A8F6D96E004B8AFB4B635C0150355CEF5D7127972EA90683900B60560AA9C7F8DE780D1D5A4A944AF92B63C69F80DCDE09249AB99696932F1955F9EED443BE
                                          Malicious:false
                                          Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                          Process:C:\Users\user\Desktop\0438.pdf.exe
                                          File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: LiteManager - Server 5.0 installation package, Comments: This installer contains the logic and data to install LiteManager Pro - Server 5.0, Keywords: Installer,MSI,Database, Subject: LiteManager Pro - Server, Author: LiteManagerTeam, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2015 - Premier Edition with Virtualization Pack 22, Last Saved Time/Date: Thu Aug 22 15:43:08 2024, Create Time/Date: Thu Aug 22 15:43:08 2024, Last Printed: Thu Aug 22 15:43:08 2024, Revision Number: {9EF586E9-112B-4AAE-B439-5B62B7A0B1DE}, Code page: 0, Template: Intel;0,1033,1049
                                          Category:dropped
                                          Size (bytes):11554816
                                          Entropy (8bit):7.9382387394429115
                                          Encrypted:false
                                          SSDEEP:196608:9Jg0ovdgTGOk/J1yr/A9ODMlWyFISx8/191nYHiT88o8En03yEoH8WkJDFa:bAJoLA9OIlWy58/19J+iYNPEoHg0
                                          MD5:0C88F651EEA7EBD95DF08F6A492FCB38
                                          SHA1:93E622BB18056BB61DD11805D91AB1F9267CBD67
                                          SHA-256:A1FAAE4E2B695C7DF3846179192F4E67BD8DD05E7E5C6D0B4B72DB175F629076
                                          SHA-512:41F69CFCDA6EBB6DD6984D21B19E952BA25C78404B138FF25A8E16283D9080B5E2A85AF4973EC25A4F45F8D402163CCE96906F06F3FBA2068571F1F1ACBEA86C
                                          Malicious:false
                                          Preview:......................>...................................8........6..................}.................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5...6..........<................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...@...M...:...;...=...........?...N...A...B...C...D...E...F...G...H...I...J...O...L...N...D.......P...Q...R...S...T...Z...V...W...X...Y....X..[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: LiteManager - Server 5.0 installation package, Comments: This installer contains the logic and data to install LiteManager Pro - Server 5.0, Keywords: Installer,MSI,Database, Subject: LiteManager Pro - Server, Author: LiteManagerTeam, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2015 - Premier Edition with Virtualization Pack 22, Last Saved Time/Date: Thu Aug 22 15:43:08 2024, Create Time/Date: Thu Aug 22 15:43:08 2024, Last Printed: Thu Aug 22 15:43:08 2024, Revision Number: {9EF586E9-112B-4AAE-B439-5B62B7A0B1DE}, Code page: 0, Template: Intel;0,1033,1049
                                          Category:dropped
                                          Size (bytes):11554816
                                          Entropy (8bit):7.9382387394429115
                                          Encrypted:false
                                          SSDEEP:196608:9Jg0ovdgTGOk/J1yr/A9ODMlWyFISx8/191nYHiT88o8En03yEoH8WkJDFa:bAJoLA9OIlWy58/19J+iYNPEoHg0
                                          MD5:0C88F651EEA7EBD95DF08F6A492FCB38
                                          SHA1:93E622BB18056BB61DD11805D91AB1F9267CBD67
                                          SHA-256:A1FAAE4E2B695C7DF3846179192F4E67BD8DD05E7E5C6D0B4B72DB175F629076
                                          SHA-512:41F69CFCDA6EBB6DD6984D21B19E952BA25C78404B138FF25A8E16283D9080B5E2A85AF4973EC25A4F45F8D402163CCE96906F06F3FBA2068571F1F1ACBEA86C
                                          Malicious:false
                                          Preview:......................>...................................8........6..................}.................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5...6..........<................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...@...M...:...;...=...........?...N...A...B...C...D...E...F...G...H...I...J...O...L...N...D.......P...Q...R...S...T...Z...V...W...X...Y....X..[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: LiteManager - Server 5.0 installation package, Comments: This installer contains the logic and data to install LiteManager Pro - Server 5.0, Keywords: Installer,MSI,Database, Subject: LiteManager Pro - Server, Author: LiteManagerTeam, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2015 - Premier Edition with Virtualization Pack 22, Last Saved Time/Date: Thu Aug 22 15:43:08 2024, Create Time/Date: Thu Aug 22 15:43:08 2024, Last Printed: Thu Aug 22 15:43:08 2024, Revision Number: {9EF586E9-112B-4AAE-B439-5B62B7A0B1DE}, Code page: 0, Template: Intel;0,1033,1049
                                          Category:dropped
                                          Size (bytes):11554816
                                          Entropy (8bit):7.9382387394429115
                                          Encrypted:false
                                          SSDEEP:196608:9Jg0ovdgTGOk/J1yr/A9ODMlWyFISx8/191nYHiT88o8En03yEoH8WkJDFa:bAJoLA9OIlWy58/19J+iYNPEoHg0
                                          MD5:0C88F651EEA7EBD95DF08F6A492FCB38
                                          SHA1:93E622BB18056BB61DD11805D91AB1F9267CBD67
                                          SHA-256:A1FAAE4E2B695C7DF3846179192F4E67BD8DD05E7E5C6D0B4B72DB175F629076
                                          SHA-512:41F69CFCDA6EBB6DD6984D21B19E952BA25C78404B138FF25A8E16283D9080B5E2A85AF4973EC25A4F45F8D402163CCE96906F06F3FBA2068571F1F1ACBEA86C
                                          Malicious:false
                                          Preview:......................>...................................8........6..................}.................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5...6..........<................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...@...M...:...;...=...........?...N...A...B...C...D...E...F...G...H...I...J...O...L...N...D.......P...Q...R...S...T...Z...V...W...X...Y....X..[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):294216
                                          Entropy (8bit):4.850868787679576
                                          Encrypted:false
                                          SSDEEP:3072:Eooy2KjcC2jcmFDX/vjcJGUjcmFDX/rjcmFDX/dZ+oNbynfq:Eooy25DXmNDXLDXX+oNbynfq
                                          MD5:ECF827A6C56F530DF2AE358AA45B39BA
                                          SHA1:8799549BB3CDF84012C2663A69885F7832D6FC57
                                          SHA-256:7C42E6EC697CEDC45D843EBCA3A3B3B177442F9ACA392345EB699E8EB6C8657F
                                          SHA-512:6CAC285C16D9CD54FEBC2EA64CA99EEDF8FD3F94B301ADE57F74B5DC01AA981B1F7B60A80B71F800D52083E5F92991A6F6C3EA7C8240A1A1D29DC42F5ED6D8E0
                                          Malicious:false
                                          Preview:...@IXOS.@.....@c@\Y.@.....@.....@.....@.....@.....@......&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}..LiteManager Pro - Server..pdf.msi.@.....@.....@.....@......ARPPRODUCTICON.exe..&.{9EF586E9-112B-4AAE-B439-5B62B7A0B1DE}.....@.....@.....@.....@.......@.....@.....@.......@......LiteManager Pro - Server......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration...@.....@.....@.]....&.{3244CDE6-6414-4399-B0D5-424562747210}0.C:\Program Files (x86)\LiteManager Pro - Server\.@.......@.....@.....@......&.{4D4D18AA-F74D-4291-B5A9-93C3CC48B75F}5.C:\Program Files (x86)\LiteManager Pro - Server\Lang\.@.......@.....@.....@......&.{641F154A-FEEF-4FA7-B5BF-414DB1DB8390}C.C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exe.@.......@.....@.....@......&.{26EAB54E-4659-47E8-86F9-4CB74F7E03BE}0.C:\Program Files (x86)\LiteManager Pro - Server\.@.......@.....@.....@......&.{596F4636-5D51-49
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:Composite Document File V2 Document, Cannot read section info
                                          Category:dropped
                                          Size (bytes):20480
                                          Entropy (8bit):1.1623296500065194
                                          Encrypted:false
                                          SSDEEP:12:JSbX72FjHaAGiLIlHVRpqh/7777777777777777777777777vDHFGpZl0i8Q:JkQI56dF
                                          MD5:4C94D03FC8BEB4F1DD925B57C9CEAE42
                                          SHA1:B3FAA4DAAE5F39A5C0D3964BC892EE338719C2BC
                                          SHA-256:568F726B532CC68D639B2E5E82930546306FDFAB31F08D2AB7313B7794BD6F91
                                          SHA-512:47153142B64FF90033F6BB59DF9D945F2F5E87131BBF2A7786E3C7783DA64B4757F2A3E8F7CE2221830B450C5D1587A83B996017AC7BD3C215C4E820ACDED4D1
                                          Malicious:false
                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:Composite Document File V2 Document, Cannot read section info
                                          Category:dropped
                                          Size (bytes):20480
                                          Entropy (8bit):1.7853557379270208
                                          Encrypted:false
                                          SSDEEP:48:p8Ph+uRc06WXJMFT5Rd9gz9mSvOd5YpRXd5YNd5YGd5YMd5YP6Ad5Y4o9ISB29l2:kh+1vFTQsm0WlfPuWqC0WlfIF/
                                          MD5:8DA482A5572BF4E410771AAAD260B3B8
                                          SHA1:43AE61E0AE19355004D10BBDBB9004BD5A2F6E2F
                                          SHA-256:317B2017FF3E57E0F18B3ABE52D7F754E5F42156EB0EFD94454B979105806E18
                                          SHA-512:A6C9A609C52D8D850D4EC1C61017E35DBC597FB8AE05C0DCE33943456A34F25D8039728934CB2E63E75A0B456473B98F484CD8A12A6EFD50FD41F4BA168198A5
                                          Malicious:false
                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):53248
                                          Entropy (8bit):4.351781833522881
                                          Encrypted:false
                                          SSDEEP:384:AvFMAyDNOdTdFCxfrwntajXjDWLi9Y+C5vy/Q1nDcZUNeLNek+vDFNe+TNy:+MAyYdTmPJbgqcnDcCNy
                                          MD5:CA680899D9330BEB85E6351E6DC0D27B
                                          SHA1:41E89E582F58FB2A4ED06FA3BF796A1DAAC5CB6C
                                          SHA-256:EAB5DC45781E92CD5CF953016757B1E6F2ED7A0B5A97CC0945B19A8FBC1A85F2
                                          SHA-512:3817BD6EC345F96631E6CBF6C8DD384ACB17D912B1EC69D959F3AA15C05226D5FE3B5E9807D42D0E63589AABCEADFBE8BD5F293D8069DF689D12498E05842286
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L...J&uU.................@...................P....@.........................................................................4T..(........0...........................................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc....0.......@..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):57344
                                          Entropy (8bit):4.774504587732323
                                          Encrypted:false
                                          SSDEEP:768:SMAyYdTmPJbgqcnDcZTw0gpEeO4tZZz+0pQTk/N0:S1U81cmpjDX/N0
                                          MD5:5EBCB54B76FBE24FFF9D3BD74E274234
                                          SHA1:6CD72F044F36B7A3A79B7D77AAE59F274A66CE95
                                          SHA-256:504AEB909BBA186D4298AA97DCD6A09CCDD42217AF1F6210BC5EBD23B3DFCCBF
                                          SHA-512:5FF61D724B77B6EDC67D33B0F1EE1C3CB01F2A03251D0BE83FF10A80A99DBA08E3A0E0F985DEED6358E467B2E9B6A837E894513D1B5E68AF253C0BBDD68539D0
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 5%
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L...J&uU.................@...................P....@.........................................................................4T..(.......xC...........................................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc...xC.......P..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):49152
                                          Entropy (8bit):4.31126714354722
                                          Encrypted:false
                                          SSDEEP:384:EvFMAyDNOdTdFCxfrwntajXjDWLi9Y+C5vy/Q1nDcZMwQE3vGYksuektm6yysZc8:SMAyYdTmPJbgqcnDcmwQE/RkHRRNS
                                          MD5:6A4AFFF2CD33613166B37A0DAB99BD41
                                          SHA1:FBC0F1696213B459D099A5809D79CFC01253880F
                                          SHA-256:53C1AE4962663E82D3AAC7C4A6CBE3D53E05D6948ADAE6391A2748396ACF98FE
                                          SHA-512:7B61D32E4AD38BC21E86559BFFA49A334CCB6184E595CB43F2D60A2A77C86B31D07B1A9D1F8FBE69E9AAD7E096952D765404BEBC494E73BD992642EB6B82E3A7
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L...J&uU.................@...p...............P....@.........................................................................4T..(........+...........................................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc....+.......0..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):57344
                                          Entropy (8bit):4.774504587732323
                                          Encrypted:false
                                          SSDEEP:768:SMAyYdTmPJbgqcnDcZTw0gpEeO4tZZz+0pQTk/N0:S1U81cmpjDX/N0
                                          MD5:5EBCB54B76FBE24FFF9D3BD74E274234
                                          SHA1:6CD72F044F36B7A3A79B7D77AAE59F274A66CE95
                                          SHA-256:504AEB909BBA186D4298AA97DCD6A09CCDD42217AF1F6210BC5EBD23B3DFCCBF
                                          SHA-512:5FF61D724B77B6EDC67D33B0F1EE1C3CB01F2A03251D0BE83FF10A80A99DBA08E3A0E0F985DEED6358E467B2E9B6A837E894513D1B5E68AF253C0BBDD68539D0
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 5%
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L...J&uU.................@...................P....@.........................................................................4T..(.......xC...........................................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc...xC.......P..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):57344
                                          Entropy (8bit):4.774504587732323
                                          Encrypted:false
                                          SSDEEP:768:SMAyYdTmPJbgqcnDcZTw0gpEeO4tZZz+0pQTk/N0:S1U81cmpjDX/N0
                                          MD5:5EBCB54B76FBE24FFF9D3BD74E274234
                                          SHA1:6CD72F044F36B7A3A79B7D77AAE59F274A66CE95
                                          SHA-256:504AEB909BBA186D4298AA97DCD6A09CCDD42217AF1F6210BC5EBD23B3DFCCBF
                                          SHA-512:5FF61D724B77B6EDC67D33B0F1EE1C3CB01F2A03251D0BE83FF10A80A99DBA08E3A0E0F985DEED6358E467B2E9B6A837E894513D1B5E68AF253C0BBDD68539D0
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 5%
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L...J&uU.................@...................P....@.........................................................................4T..(.......xC...........................................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc...xC.......P..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):432221
                                          Entropy (8bit):5.375164509042872
                                          Encrypted:false
                                          SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgaur:zTtbmkExhMJCIpErG
                                          MD5:4A7419C98A88F6E5126DDD1596FF695C
                                          SHA1:5823943875E105823B879C38BE933368F795D2A9
                                          SHA-256:34A91AB64FD8E07802FF8DD37FF7AE46EA94AE41E3A4F1BE7939DA203CF65E1B
                                          SHA-512:C304ED3E809F5017D264E8AFFE25D17BAB636D3C477D1F868D65D43904691B694AA4A79DD1C49BC2B4BA8AB6CD876AB165A47D4059F2BB712DA66791FD689F72
                                          Malicious:false
                                          Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:JSON data
                                          Category:dropped
                                          Size (bytes):55
                                          Entropy (8bit):4.306461250274409
                                          Encrypted:false
                                          SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                          MD5:DCA83F08D448911A14C22EBCACC5AD57
                                          SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                          SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                          SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                          Malicious:false
                                          Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):512
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:3::
                                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                          Malicious:false
                                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:Composite Document File V2 Document, Cannot read section info
                                          Category:dropped
                                          Size (bytes):32768
                                          Entropy (8bit):1.414888628076449
                                          Encrypted:false
                                          SSDEEP:48:JlWuDO+CFXJBT55qid9gz9mSvOd5YpRXd5YNd5YGd5YMd5YP6Ad5Y4o9ISB29lOp:HWfZT3osm0WlfPuWqC0WlfIF/
                                          MD5:AFC19C2D1371EC50FDBA9785DD83D8E3
                                          SHA1:2C86D166FE40625D68DAA3BBE99BC5AD249C64B6
                                          SHA-256:A045AF27F07921AAAF31227EE26040E7B1576DB6F5CD5A59873B44FE0643BE2F
                                          SHA-512:475A0F9394380EBD149B2F2E26745E3DB0582E885D6C5B1F16629ABD2BEFCCE295285F36C462ED5F76B9F68949492AC3544DE17CD6096755F447C20FEE807735
                                          Malicious:false
                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):512
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:3::
                                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                          Malicious:false
                                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:Composite Document File V2 Document, Cannot read section info
                                          Category:dropped
                                          Size (bytes):32768
                                          Entropy (8bit):1.414888628076449
                                          Encrypted:false
                                          SSDEEP:48:JlWuDO+CFXJBT55qid9gz9mSvOd5YpRXd5YNd5YGd5YMd5YP6Ad5Y4o9ISB29lOp:HWfZT3osm0WlfPuWqC0WlfIF/
                                          MD5:AFC19C2D1371EC50FDBA9785DD83D8E3
                                          SHA1:2C86D166FE40625D68DAA3BBE99BC5AD249C64B6
                                          SHA-256:A045AF27F07921AAAF31227EE26040E7B1576DB6F5CD5A59873B44FE0643BE2F
                                          SHA-512:475A0F9394380EBD149B2F2E26745E3DB0582E885D6C5B1F16629ABD2BEFCCE295285F36C462ED5F76B9F68949492AC3544DE17CD6096755F447C20FEE807735
                                          Malicious:false
                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):73728
                                          Entropy (8bit):0.22131176310390613
                                          Encrypted:false
                                          SSDEEP:48:PHwmFSB29lOd5YpRXd5YNd5YGd5YMd5Yu9mSvOd5YpRXd5YNd5YGd5YMd5YP6AdP:PH5FqC0WlfVm0WlfPux
                                          MD5:F7796F2E111E686E7E03660D47F3D38C
                                          SHA1:AEE8238B3F99C37B5A44E9A8689A51C07D41CC92
                                          SHA-256:E0CF915A8138BD494797C311C94BBE0F33428A483B6D79E36C0198487CF81F6C
                                          SHA-512:C384BCD42B39FCD53EF6A6EE5091AAF0C0D5043289B03DD9D17E351E39D038DA56DA84BA90A40BDDC1135C0D7A56367FB558DC180C308A17E4B95397000BF4B9
                                          Malicious:false
                                          Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):32768
                                          Entropy (8bit):0.06823846717123914
                                          Encrypted:false
                                          SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOYYbmc6Vky6lZ:2F0i8n0itFzDHFTZ
                                          MD5:43121AF9C0468049B811D5DE9EE986C6
                                          SHA1:3D65F87A3C467D0DE2BF8F07A60621B947A9CE4C
                                          SHA-256:592C5B6D2ADD44B5EFCE1D5A353279925147188A1C15B56B1189E89FE97374E0
                                          SHA-512:0B09D5648F1374083996F24FF71AE87B22F152D907C91B84567CA27B985F05C447AF27527A3E760F44817300DB8680F73F5D86A36B9DC157AA3E6C5BB6BC6831
                                          Malicious:false
                                          Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):512
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:3::
                                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                          Malicious:false
                                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):512
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:3::
                                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                          Malicious:false
                                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):512
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:3::
                                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                          Malicious:false
                                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:Composite Document File V2 Document, Cannot read section info
                                          Category:dropped
                                          Size (bytes):20480
                                          Entropy (8bit):1.7853557379270208
                                          Encrypted:false
                                          SSDEEP:48:p8Ph+uRc06WXJMFT5Rd9gz9mSvOd5YpRXd5YNd5YGd5YMd5YP6Ad5Y4o9ISB29l2:kh+1vFTQsm0WlfPuWqC0WlfIF/
                                          MD5:8DA482A5572BF4E410771AAAD260B3B8
                                          SHA1:43AE61E0AE19355004D10BBDBB9004BD5A2F6E2F
                                          SHA-256:317B2017FF3E57E0F18B3ABE52D7F754E5F42156EB0EFD94454B979105806E18
                                          SHA-512:A6C9A609C52D8D850D4EC1C61017E35DBC597FB8AE05C0DCE33943456A34F25D8039728934CB2E63E75A0B456473B98F484CD8A12A6EFD50FD41F4BA168198A5
                                          Malicious:false
                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:Composite Document File V2 Document, Cannot read section info
                                          Category:dropped
                                          Size (bytes):32768
                                          Entropy (8bit):1.414888628076449
                                          Encrypted:false
                                          SSDEEP:48:JlWuDO+CFXJBT55qid9gz9mSvOd5YpRXd5YNd5YGd5YMd5YP6Ad5Y4o9ISB29lOp:HWfZT3osm0WlfPuWqC0WlfIF/
                                          MD5:AFC19C2D1371EC50FDBA9785DD83D8E3
                                          SHA1:2C86D166FE40625D68DAA3BBE99BC5AD249C64B6
                                          SHA-256:A045AF27F07921AAAF31227EE26040E7B1576DB6F5CD5A59873B44FE0643BE2F
                                          SHA-512:475A0F9394380EBD149B2F2E26745E3DB0582E885D6C5B1F16629ABD2BEFCCE295285F36C462ED5F76B9F68949492AC3544DE17CD6096755F447C20FEE807735
                                          Malicious:false
                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\System32\msiexec.exe
                                          File Type:Composite Document File V2 Document, Cannot read section info
                                          Category:dropped
                                          Size (bytes):20480
                                          Entropy (8bit):1.7853557379270208
                                          Encrypted:false
                                          SSDEEP:48:p8Ph+uRc06WXJMFT5Rd9gz9mSvOd5YpRXd5YNd5YGd5YMd5YP6Ad5Y4o9ISB29l2:kh+1vFTQsm0WlfPuWqC0WlfIF/
                                          MD5:8DA482A5572BF4E410771AAAD260B3B8
                                          SHA1:43AE61E0AE19355004D10BBDBB9004BD5A2F6E2F
                                          SHA-256:317B2017FF3E57E0F18B3ABE52D7F754E5F42156EB0EFD94454B979105806E18
                                          SHA-512:A6C9A609C52D8D850D4EC1C61017E35DBC597FB8AE05C0DCE33943456A34F25D8039728934CB2E63E75A0B456473B98F484CD8A12A6EFD50FD41F4BA168198A5
                                          Malicious:false
                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          File type:PE32+ executable (GUI) x86-64, for MS Windows
                                          Entropy (8bit):7.9367051756500695
                                          TrID:
                                          • Win64 Executable GUI (202006/5) 92.65%
                                          • Win64 Executable (generic) (12005/4) 5.51%
                                          • Generic Win/DOS Executable (2004/3) 0.92%
                                          • DOS Executable Generic (2002/1) 0.92%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:0438.pdf.exe
                                          File size:11'654'747 bytes
                                          MD5:2d11dba46735af1cb1c0a42e9564e20d
                                          SHA1:b2e17960c6d080f7aba7df87f57c08b4bc2e7051
                                          SHA256:e19477a56b247e6cc435fee367abcf6e0c3db21de91ae2514b4a6b1807233c53
                                          SHA512:f053c18333c256c87492e7e74832f2ba695c1633cc80d59e4d426eda82d27d7402a22803e439bb2453f4fa12f00697de355edd61c300b7624c66723d7e54dad0
                                          SSDEEP:196608:tqwvI8YbsGBCEfbi57P6mCRTMFCxZ9zzvHLbax3QS+hbEPjwDhZzczDlUxMUd:ZIRwGjfbi5DCRoOPzzvfaEAPgOHm5d
                                          TLSH:42C6331BFF5D04EAF1AF99F899415022D7B57CC51720868F23B43E4AED736A1AA35302
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$.2.`.\.`.\.`.\..y..h.\..y....\..y..m.\.....b.\...X.r.\..._.j.\...Y.Y.\.i...i.\.i...b.\.i...g.\.`.].C.\...Y.R.\...\.a.\.....a.\
                                          Icon Hash:3570b080889388e1
                                          Entrypoint:0x140032ee0
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x140000000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x66409723 [Sun May 12 10:17:07 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:5
                                          OS Version Minor:2
                                          File Version Major:5
                                          File Version Minor:2
                                          Subsystem Version Major:5
                                          Subsystem Version Minor:2
                                          Import Hash:b1c5b1beabd90d9fdabd1df0779ea832
                                          Instruction
                                          dec eax
                                          sub esp, 28h
                                          call 00007F4CFCF0F498h
                                          dec eax
                                          add esp, 28h
                                          jmp 00007F4CFCF0EE2Fh
                                          int3
                                          int3
                                          dec eax
                                          mov eax, esp
                                          dec eax
                                          mov dword ptr [eax+08h], ebx
                                          dec eax
                                          mov dword ptr [eax+10h], ebp
                                          dec eax
                                          mov dword ptr [eax+18h], esi
                                          dec eax
                                          mov dword ptr [eax+20h], edi
                                          inc ecx
                                          push esi
                                          dec eax
                                          sub esp, 20h
                                          dec ebp
                                          mov edx, dword ptr [ecx+38h]
                                          dec eax
                                          mov esi, edx
                                          dec ebp
                                          mov esi, eax
                                          dec eax
                                          mov ebp, ecx
                                          dec ecx
                                          mov edx, ecx
                                          dec eax
                                          mov ecx, esi
                                          dec ecx
                                          mov edi, ecx
                                          inc ecx
                                          mov ebx, dword ptr [edx]
                                          dec eax
                                          shl ebx, 04h
                                          dec ecx
                                          add ebx, edx
                                          dec esp
                                          lea eax, dword ptr [ebx+04h]
                                          call 00007F4CFCF0E2B3h
                                          mov eax, dword ptr [ebp+04h]
                                          and al, 66h
                                          neg al
                                          mov eax, 00000001h
                                          sbb edx, edx
                                          neg edx
                                          add edx, eax
                                          test dword ptr [ebx+04h], edx
                                          je 00007F4CFCF0EFC3h
                                          dec esp
                                          mov ecx, edi
                                          dec ebp
                                          mov eax, esi
                                          dec eax
                                          mov edx, esi
                                          dec eax
                                          mov ecx, ebp
                                          call 00007F4CFCF10FD7h
                                          dec eax
                                          mov ebx, dword ptr [esp+30h]
                                          dec eax
                                          mov ebp, dword ptr [esp+38h]
                                          dec eax
                                          mov esi, dword ptr [esp+40h]
                                          dec eax
                                          mov edi, dword ptr [esp+48h]
                                          dec eax
                                          add esp, 20h
                                          inc ecx
                                          pop esi
                                          ret
                                          int3
                                          int3
                                          int3
                                          dec eax
                                          sub esp, 48h
                                          dec eax
                                          lea ecx, dword ptr [esp+20h]
                                          call 00007F4CFCEFD843h
                                          dec eax
                                          lea edx, dword ptr [00025747h]
                                          dec eax
                                          lea ecx, dword ptr [esp+20h]
                                          call 00007F4CFCF10092h
                                          int3
                                          jmp 00007F4CFCF16274h
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          Programming Language:
                                          • [ C ] VS2008 SP1 build 30729
                                          • [IMP] VS2008 SP1 build 30729
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x597a00x34.rdata
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x597d40x50.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000x5f334.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6a0000x306c.pdata
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xd00000x970.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x536c00x54.rdata
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x537800x28.rdata
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4b3f00x140.rdata
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x480000x508.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x588bc0x120.rdata
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x4676e0x46800f06bb06e02377ae8b223122e53be35c2False0.5372340425531915data6.47079645411382IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x480000x128c40x12a002de06d4a6920a6911e64ff20000ea72fFalse0.4499003775167785data5.273999097784603IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x5b0000xe75c0x1a000dbdb901a7d477980097e42e511a94fbFalse0.28275240384615385data3.2571023907881185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .pdata0x6a0000x306c0x3200b0ce0f057741ad2a4ef4717079fa34e9False0.483359375data5.501810413666288IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .didat0x6e0000x3600x4001fcc7b1d7a02443319f8fcc2be4ca936False0.2578125data3.0459938492946015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          _RDATA0x6f0000x15c0x2003f331ec50f09ba861beaf955b33712d5False0.408203125data3.3356393424384843IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .rsrc0x700000x5f3340x5f400ac83509a9abddcfebcee4527be350f1aFalse0.06483503526902887data2.1781366278912278IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0xd00000x9700xa0077a9ddfc47a5650d6eebbcc823e39532False0.52421875data5.336289720085303IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          PNG0x706440xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                                          PNG0x7118c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                                          RT_ICON0x727380x42028Device independent bitmap graphic, 256 x 512 x 32, image size 262144, resolution 2835 x 2835 px/m0.023615261709619195
                                          RT_ICON0xb47600x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m0.3191489361702128
                                          RT_ICON0xb4bc80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/m0.11867219917012448
                                          RT_ICON0xb71700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m0.17284240150093808
                                          RT_ICON0xb82180x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/m0.04436294806577547
                                          RT_ICON0xc8a400x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/m0.08644307982994803
                                          RT_DIALOG0xccc680x286dataEnglishUnited States0.5092879256965944
                                          RT_DIALOG0xccef00x13adataEnglishUnited States0.60828025477707
                                          RT_DIALOG0xcd02c0xecdataEnglishUnited States0.6991525423728814
                                          RT_DIALOG0xcd1180x12edataEnglishUnited States0.5927152317880795
                                          RT_DIALOG0xcd2480x338dataEnglishUnited States0.45145631067961167
                                          RT_DIALOG0xcd5800x252dataEnglishUnited States0.5757575757575758
                                          RT_STRING0xcd7d40x1e2dataEnglishUnited States0.3900414937759336
                                          RT_STRING0xcd9b80x1ccdataEnglishUnited States0.4282608695652174
                                          RT_STRING0xcdb840x1b8dataEnglishUnited States0.45681818181818185
                                          RT_STRING0xcdd3c0x146dataEnglishUnited States0.5153374233128835
                                          RT_STRING0xcde840x46cdataEnglishUnited States0.3454063604240283
                                          RT_STRING0xce2f00x166dataEnglishUnited States0.49162011173184356
                                          RT_STRING0xce4580x152dataEnglishUnited States0.5059171597633136
                                          RT_STRING0xce5ac0x10adataEnglishUnited States0.49624060150375937
                                          RT_STRING0xce6b80xbcdataEnglishUnited States0.6329787234042553
                                          RT_STRING0xce7740x1c0dataEnglishUnited States0.5178571428571429
                                          RT_STRING0xce9340x250dataEnglishUnited States0.44256756756756754
                                          RT_GROUP_ICON0xceb840x5adata0.7555555555555555
                                          RT_MANIFEST0xcebe00x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.39786666666666665
                                          DLLImport
                                          KERNEL32.dllLocalFree, GetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, GetCurrentProcessId, CreateDirectoryW, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetModuleFileNameW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExpandEnvironmentStringsW, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, GlobalMemoryStatusEx, LoadResource, SizeofResource, GetTimeFormatW, GetDateFormatW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindNextFileA, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, WaitForSingleObjectEx, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlPcToFileHeader, RtlUnwindEx, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, GetStringTypeW, HeapReAlloc, LCMapStringW, FindFirstFileExA
                                          OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                          gdiplus.dllGdipCloneImage, GdipFree, GdipDisposeImage, GdipCreateBitmapFromStream, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipAlloc
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 28, 2024 13:04:17.094243050 CET524905651192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.099571943 CET565152490111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:17.099783897 CET524905651192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.121762991 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.126396894 CET5249280192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.127157927 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:17.127268076 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.132590055 CET8052492111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:17.132666111 CET5249280192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.141359091 CET52493465192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.146862984 CET46552493111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:17.147038937 CET52493465192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.156697035 CET5249480192.168.2.465.21.245.7
                                          Oct 28, 2024 13:04:17.162014008 CET805249465.21.245.7192.168.2.4
                                          Oct 28, 2024 13:04:17.162094116 CET5249480192.168.2.465.21.245.7
                                          Oct 28, 2024 13:04:17.173619986 CET524955555192.168.2.465.21.245.7
                                          Oct 28, 2024 13:04:17.179038048 CET55555249565.21.245.7192.168.2.4
                                          Oct 28, 2024 13:04:17.179107904 CET524955555192.168.2.465.21.245.7
                                          Oct 28, 2024 13:04:17.232009888 CET524905651192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.232009888 CET524905651192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.238190889 CET565152490111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:17.238390923 CET565152490111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:17.247670889 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.247781038 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.253376961 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:17.253447056 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:17.263282061 CET5249280192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.263315916 CET5249280192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.268676043 CET8052492111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:17.268774986 CET8052492111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:17.279118061 CET52493465192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.279213905 CET52493465192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.284622908 CET46552493111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:17.284642935 CET46552493111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:17.294516087 CET5249480192.168.2.465.21.245.7
                                          Oct 28, 2024 13:04:17.294543982 CET5249480192.168.2.465.21.245.7
                                          Oct 28, 2024 13:04:17.299983025 CET805249465.21.245.7192.168.2.4
                                          Oct 28, 2024 13:04:17.300216913 CET805249465.21.245.7192.168.2.4
                                          Oct 28, 2024 13:04:17.310162067 CET524955555192.168.2.465.21.245.7
                                          Oct 28, 2024 13:04:17.310179949 CET524955555192.168.2.465.21.245.7
                                          Oct 28, 2024 13:04:17.315587044 CET55555249565.21.245.7192.168.2.4
                                          Oct 28, 2024 13:04:17.315721989 CET55555249565.21.245.7192.168.2.4
                                          Oct 28, 2024 13:04:17.800757885 CET565152490111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:17.800837040 CET524905651192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.801829100 CET524905651192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.807563066 CET565152490111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:17.857990026 CET8052492111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:17.858130932 CET5249280192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.858131886 CET5249280192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:17.863895893 CET8052492111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:18.074270010 CET805249465.21.245.7192.168.2.4
                                          Oct 28, 2024 13:04:18.074690104 CET5249480192.168.2.465.21.245.7
                                          Oct 28, 2024 13:04:18.074771881 CET5249480192.168.2.465.21.245.7
                                          Oct 28, 2024 13:04:18.074771881 CET5249480192.168.2.465.21.245.7
                                          Oct 28, 2024 13:04:18.074771881 CET5249480192.168.2.465.21.245.7
                                          Oct 28, 2024 13:04:18.074771881 CET5249480192.168.2.465.21.245.7
                                          Oct 28, 2024 13:04:18.080353975 CET805249465.21.245.7192.168.2.4
                                          Oct 28, 2024 13:04:18.080374956 CET805249465.21.245.7192.168.2.4
                                          Oct 28, 2024 13:04:18.080483913 CET805249465.21.245.7192.168.2.4
                                          Oct 28, 2024 13:04:18.081166983 CET805249465.21.245.7192.168.2.4
                                          Oct 28, 2024 13:04:18.083861113 CET805249465.21.245.7192.168.2.4
                                          Oct 28, 2024 13:04:18.084253073 CET5249480192.168.2.465.21.245.7
                                          Oct 28, 2024 13:04:18.163978100 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:18.164288044 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:18.164335012 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:18.164335012 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:18.164567947 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:18.169907093 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:18.169918060 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:18.169926882 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:18.169935942 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:18.620912075 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:18.669434071 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:19.622366905 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:19.669378996 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:20.636821985 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:20.684994936 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:21.652997017 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:21.700647116 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:23.014738083 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:23.060051918 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:23.667984009 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:23.716243029 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:24.671868086 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:24.716259956 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:25.626379967 CET46552493111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:25.626445055 CET52493465192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:25.626617908 CET52493465192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:25.632119894 CET46552493111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:25.665520906 CET55555249565.21.245.7192.168.2.4
                                          Oct 28, 2024 13:04:25.665620089 CET524955555192.168.2.465.21.245.7
                                          Oct 28, 2024 13:04:25.666460037 CET524955555192.168.2.465.21.245.7
                                          Oct 28, 2024 13:04:25.671791077 CET55555249565.21.245.7192.168.2.4
                                          Oct 28, 2024 13:04:26.115490913 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:26.169379950 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:26.700434923 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:26.747513056 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:27.713608027 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:27.763132095 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:28.726632118 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:28.778750896 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:29.737915993 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:29.778762102 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:30.751249075 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:30.794401884 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:31.761497974 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:31.888204098 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:32.132455111 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:32.132498980 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:32.777002096 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:32.888200045 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:33.789060116 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:33.888144970 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:34.800589085 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:34.982599020 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:35.988493919 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:36.091259003 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:36.824269056 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:36.888144970 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:39.131823063 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:39.134901047 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:39.134999990 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:39.135536909 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:39.135600090 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:39.135818958 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:39.136039972 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:39.145056009 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:39.145243883 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:39.846585989 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:39.888170004 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:40.910686970 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:40.911442041 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:40.911499977 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:40.981904030 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:41.867408037 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:42.091747999 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:42.881026983 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:43.091294050 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:44.521070957 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:44.521738052 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:44.521811008 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:44.910048962 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:45.091279984 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:45.917553902 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:46.091342926 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:46.937484026 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:47.091360092 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:47.928744078 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:48.091306925 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:48.934154034 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:49.091290951 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:49.948904037 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:50.091289997 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:50.964219093 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:51.091304064 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:51.965250015 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:52.091355085 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:52.964787006 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:53.091291904 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:53.981590986 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:54.028798103 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:54.996093988 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:55.044446945 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:56.007777929 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:56.060065985 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:57.007819891 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:57.060065985 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:58.008553982 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:58.060082912 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:04:59.018881083 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:04:59.060096025 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:00.028269053 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:00.075741053 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:01.043256044 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:01.091336966 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:02.047158957 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:02.091332912 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:03.068152905 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:03.122570992 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:04.078856945 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:04.122589111 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:05.075536966 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:05.122560024 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:06.089363098 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:06.138370037 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:08.112263918 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:08.117508888 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:08.117567062 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:08.118221045 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:08.118263960 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:08.122847080 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:08.122908115 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:09.119069099 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:09.169467926 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:10.126230001 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:10.175537109 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:11.136408091 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:11.187357903 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:12.137862921 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:12.185094118 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:13.153532028 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:13.200738907 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:14.167984009 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:14.216341972 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:15.182928085 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:15.231964111 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:16.194802046 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:16.249376059 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:17.094410896 CET526455651192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:17.099863052 CET565152645111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:17.099945068 CET526455651192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:17.110012054 CET5264680192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:17.115428925 CET8052646111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:17.115503073 CET5264680192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:17.125236988 CET52647465192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:17.130662918 CET46552647111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:17.130728006 CET52647465192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:17.140645981 CET5264880192.168.2.465.21.245.7
                                          Oct 28, 2024 13:05:17.146112919 CET805264865.21.245.7192.168.2.4
                                          Oct 28, 2024 13:05:17.146190882 CET5264880192.168.2.465.21.245.7
                                          Oct 28, 2024 13:05:17.156493902 CET526495555192.168.2.465.21.245.7
                                          Oct 28, 2024 13:05:17.161851883 CET55555264965.21.245.7192.168.2.4
                                          Oct 28, 2024 13:05:17.161953926 CET526495555192.168.2.465.21.245.7
                                          Oct 28, 2024 13:05:17.209681034 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:17.232247114 CET526455651192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:17.232314110 CET526455651192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:17.237662077 CET565152645111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:17.237694025 CET565152645111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:17.247739077 CET5264680192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:17.247773886 CET5264680192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:17.253102064 CET8052646111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:17.253113985 CET8052646111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:17.263207912 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:17.263371944 CET52647465192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:17.263401985 CET52647465192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:17.268642902 CET46552647111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:17.268657923 CET46552647111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:17.279067039 CET5264880192.168.2.465.21.245.7
                                          Oct 28, 2024 13:05:17.279067039 CET5264880192.168.2.465.21.245.7
                                          Oct 28, 2024 13:05:17.284459114 CET805264865.21.245.7192.168.2.4
                                          Oct 28, 2024 13:05:17.284470081 CET805264865.21.245.7192.168.2.4
                                          Oct 28, 2024 13:05:17.294627905 CET526495555192.168.2.465.21.245.7
                                          Oct 28, 2024 13:05:17.294627905 CET526495555192.168.2.465.21.245.7
                                          Oct 28, 2024 13:05:17.299997091 CET55555264965.21.245.7192.168.2.4
                                          Oct 28, 2024 13:05:17.300015926 CET55555264965.21.245.7192.168.2.4
                                          Oct 28, 2024 13:05:17.792422056 CET565152645111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:17.792567968 CET526455651192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:17.792650938 CET526455651192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:17.797919989 CET565152645111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:17.801698923 CET8052646111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:17.801775932 CET5264680192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:17.801878929 CET5264680192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:17.807305098 CET8052646111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:18.026871920 CET805264865.21.245.7192.168.2.4
                                          Oct 28, 2024 13:05:18.027048111 CET5264880192.168.2.465.21.245.7
                                          Oct 28, 2024 13:05:18.027048111 CET5264880192.168.2.465.21.245.7
                                          Oct 28, 2024 13:05:18.027092934 CET5264880192.168.2.465.21.245.7
                                          Oct 28, 2024 13:05:18.027092934 CET5264880192.168.2.465.21.245.7
                                          Oct 28, 2024 13:05:18.027208090 CET5264880192.168.2.465.21.245.7
                                          Oct 28, 2024 13:05:18.034317970 CET805264865.21.245.7192.168.2.4
                                          Oct 28, 2024 13:05:18.034329891 CET805264865.21.245.7192.168.2.4
                                          Oct 28, 2024 13:05:18.034338951 CET805264865.21.245.7192.168.2.4
                                          Oct 28, 2024 13:05:18.035114050 CET805264865.21.245.7192.168.2.4
                                          Oct 28, 2024 13:05:18.035124063 CET805264865.21.245.7192.168.2.4
                                          Oct 28, 2024 13:05:18.035238028 CET5264880192.168.2.465.21.245.7
                                          Oct 28, 2024 13:05:18.219513893 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:18.263242006 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:19.230125904 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:19.278841972 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:20.236087084 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:20.278871059 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:21.245778084 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:21.294477940 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:22.258245945 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:22.310151100 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:23.267693043 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:23.310281038 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:24.278536081 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:24.327219009 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:25.288850069 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:25.341475964 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:25.611968040 CET46552647111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:25.612023115 CET52647465192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:25.612093925 CET52647465192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:25.617965937 CET46552647111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:25.669095039 CET55555264965.21.245.7192.168.2.4
                                          Oct 28, 2024 13:05:25.669315100 CET526495555192.168.2.465.21.245.7
                                          Oct 28, 2024 13:05:25.669315100 CET526495555192.168.2.465.21.245.7
                                          Oct 28, 2024 13:05:25.674700975 CET55555264965.21.245.7192.168.2.4
                                          Oct 28, 2024 13:05:26.292628050 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:26.341353893 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:27.300339937 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:27.341368914 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:28.300540924 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:28.341371059 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:29.316926956 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:29.356988907 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:30.629554987 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:30.685121059 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:31.339144945 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:31.388252974 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:32.350308895 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:32.403881073 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:33.349472046 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:33.403882027 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:34.350080013 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:34.403909922 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:35.351964951 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:35.403884888 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:36.362292051 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:36.404299021 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:37.431360006 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:37.431405067 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:37.431411982 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:37.431437016 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:37.433137894 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:37.482006073 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:38.377535105 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:38.419509888 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:39.389265060 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:39.435158968 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:40.401874065 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:40.450759888 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:41.417315960 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:41.466382027 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:42.421360016 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:42.466403961 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:43.545223951 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:43.591397047 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:44.436609983 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:44.482068062 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:45.449007034 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:45.497656107 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:46.463957071 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:46.513309002 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:47.483206034 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:47.528914928 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:48.486948013 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:48.528911114 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:49.498542070 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:49.544531107 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:50.511214972 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:50.560138941 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:51.524977922 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:51.575908899 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:52.587162018 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:52.638287067 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:53.855253935 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:53.903915882 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:54.556355953 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:54.607037067 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:55.567001104 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:55.607028961 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:56.581702948 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:56.622675896 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:57.595287085 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:57.638308048 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:58.596250057 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:58.638326883 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:05:59.608089924 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:05:59.653985977 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:06:00.922553062 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:06:00.966684103 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:06:01.621368885 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:06:01.669590950 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:06:02.621046066 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:06:02.669768095 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:06:03.625032902 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:06:03.669548988 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:06:04.637660027 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:06:04.700795889 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:06:05.653567076 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:06:05.700809002 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:06:06.667471886 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:06:06.716419935 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:06:07.682764053 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:06:07.732042074 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:06:08.685148001 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:06:08.732054949 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:06:09.701498985 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:06:09.747694969 CET524918080192.168.2.4111.90.140.76
                                          Oct 28, 2024 13:06:10.714524984 CET808052491111.90.140.76192.168.2.4
                                          Oct 28, 2024 13:06:10.763434887 CET524918080192.168.2.4111.90.140.76
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 28, 2024 13:03:17.380655050 CET6384353192.168.2.41.1.1.1
                                          Oct 28, 2024 13:03:46.461036921 CET5361300162.159.36.2192.168.2.4
                                          Oct 28, 2024 13:03:47.108872890 CET53567961.1.1.1192.168.2.4
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Oct 28, 2024 13:03:17.380655050 CET192.168.2.41.1.1.10x1c85Standard query (0)x1.i.lencr.orgA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Oct 28, 2024 13:03:17.388823032 CET1.1.1.1192.168.2.40x1c85No error (0)x1.i.lencr.orgcrl.root-x1.letsencrypt.org.edgekey.netCNAME (Canonical name)IN (0x0001)false
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.452492111.90.140.76804488C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                          TimestampBytes transferredDirectionData
                                          Oct 28, 2024 13:04:17.263282061 CET6OUTData Raw: 00 00 00 01
                                          Data Ascii:
                                          Oct 28, 2024 13:04:17.263315916 CET6OUTData Raw: 00 00 00 03
                                          Data Ascii:


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          1192.168.2.45249465.21.245.7804488C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                          TimestampBytes transferredDirectionData
                                          Oct 28, 2024 13:04:17.294516087 CET6OUTData Raw: 00 00 00 01
                                          Data Ascii:
                                          Oct 28, 2024 13:04:17.294543982 CET6OUTData Raw: 00 00 00 03
                                          Data Ascii:
                                          Oct 28, 2024 13:04:18.074270010 CET505INHTTP/1.1 400 Bad Request
                                          Content-Type: text/html; charset=us-ascii
                                          Server: Microsoft-HTTPAPI/2.0
                                          Date: Mon, 28 Oct 2024 12:04:17 GMT
                                          Connection: close
                                          Content-Length: 326
                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 42 61 64 20 52 65 71 75 65 73 74 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 42 61 64 20 52 65 71 75 65 73 74 20 2d 20 49 6e 76 61 6c 69 64 20 56 65 72 62 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 30 2e 20 54 68 65 20 72 65 71 75 65 73 74 20 76 65 72 62 20 69 73 20 69 6e 76 61 6c 69 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Bad Request</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Bad Request - Invalid Verb</h2><hr><p>HTTP Error 400. The request verb is invalid.</p></BODY></HTML>
                                          Oct 28, 2024 13:04:18.074690104 CET6OUTData Raw: 00 00 10 18
                                          Data Ascii:
                                          Oct 28, 2024 13:04:18.074771881 CET6OUTData Raw: 00 00 00 01
                                          Data Ascii:
                                          Oct 28, 2024 13:04:18.074771881 CET6OUTData Raw: 2d 2d 0d 0a
                                          Data Ascii: --
                                          Oct 28, 2024 13:04:18.074771881 CET6OUTData Raw: 00 00 00 00
                                          Data Ascii:


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          2192.168.2.452646111.90.140.76804488C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                          TimestampBytes transferredDirectionData
                                          Oct 28, 2024 13:05:17.247739077 CET6OUTData Raw: 00 00 00 01
                                          Data Ascii:
                                          Oct 28, 2024 13:05:17.247773886 CET6OUTData Raw: 00 00 00 03
                                          Data Ascii:


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          3192.168.2.45264865.21.245.7804488C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                          TimestampBytes transferredDirectionData
                                          Oct 28, 2024 13:05:17.279067039 CET6OUTData Raw: 00 00 00 01
                                          Data Ascii:
                                          Oct 28, 2024 13:05:17.279067039 CET6OUTData Raw: 00 00 00 03
                                          Data Ascii:
                                          Oct 28, 2024 13:05:18.026871920 CET505INHTTP/1.1 400 Bad Request
                                          Content-Type: text/html; charset=us-ascii
                                          Server: Microsoft-HTTPAPI/2.0
                                          Date: Mon, 28 Oct 2024 12:05:17 GMT
                                          Connection: close
                                          Content-Length: 326
                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 42 61 64 20 52 65 71 75 65 73 74 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 42 61 64 20 52 65 71 75 65 73 74 20 2d 20 49 6e 76 61 6c 69 64 20 56 65 72 62 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 30 2e 20 54 68 65 20 72 65 71 75 65 73 74 20 76 65 72 62 20 69 73 20 69 6e 76 61 6c 69 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                                          Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Bad Request</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Bad Request - Invalid Verb</h2><hr><p>HTTP Error 400. The request verb is invalid.</p></BODY></HTML>
                                          Oct 28, 2024 13:05:18.027048111 CET6OUTData Raw: 00 00 10 18
                                          Data Ascii:
                                          Oct 28, 2024 13:05:18.027048111 CET6OUTData Raw: 00 00 00 01
                                          Data Ascii:
                                          Oct 28, 2024 13:05:18.027092934 CET6OUTData Raw: 2d 2d 0d 0a
                                          Data Ascii: --
                                          Oct 28, 2024 13:05:18.027092934 CET6OUTData Raw: 00 00 00 00
                                          Data Ascii:


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:08:03:00
                                          Start date:28/10/2024
                                          Path:C:\Users\user\Desktop\0438.pdf.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\Desktop\0438.pdf.exe"
                                          Imagebase:0x7ff665fd0000
                                          File size:11'654'747 bytes
                                          MD5 hash:2D11DBA46735AF1CB1C0A42E9564E20D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Target ID:1
                                          Start time:08:03:01
                                          Start date:28/10/2024
                                          Path:C:\Windows\System32\msiexec.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\pdf.msi" /qn
                                          Imagebase:0x7ff7583f0000
                                          File size:69'632 bytes
                                          MD5 hash:E5DA170027542E25EDE42FC54C929077
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:2
                                          Start time:08:03:02
                                          Start date:28/10/2024
                                          Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\Doc.pdf"
                                          Imagebase:0x7ff6bc1b0000
                                          File size:5'641'176 bytes
                                          MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:false

                                          Target ID:3
                                          Start time:08:03:02
                                          Start date:28/10/2024
                                          Path:C:\Windows\System32\msiexec.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\msiexec.exe /V
                                          Imagebase:0x7ff7583f0000
                                          File size:69'632 bytes
                                          MD5 hash:E5DA170027542E25EDE42FC54C929077
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:false

                                          Target ID:4
                                          Start time:08:03:03
                                          Start date:28/10/2024
                                          Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                                          Imagebase:0x7ff74bb60000
                                          File size:3'581'912 bytes
                                          MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:false

                                          Target ID:5
                                          Start time:08:03:04
                                          Start date:28/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:6
                                          Start time:08:03:04
                                          Start date:28/10/2024
                                          Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2228 --field-trial-handle=1508,i,11782010648643187908,10597558926359828636,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                                          Imagebase:0x7ff74bb60000
                                          File size:3'581'912 bytes
                                          MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:false

                                          Target ID:8
                                          Start time:08:03:10
                                          Start date:28/10/2024
                                          Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /siex /silentinstall
                                          Imagebase:0x800000
                                          File size:6'307'408 bytes
                                          MD5 hash:63D0964168B927D00064AA684E79A300
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:Borland Delphi
                                          Yara matches:
                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000008.00000000.1814024336.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe, Author: Joe Security
                                          Antivirus matches:
                                          • Detection: 3%, ReversingLabs
                                          Reputation:low
                                          Has exited:true

                                          Target ID:9
                                          Start time:08:03:10
                                          Start date:28/10/2024
                                          Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /siex /silentinstall
                                          Imagebase:0x400000
                                          File size:7'753'808 bytes
                                          MD5 hash:F3D74B072B9697CF64B0B8445FDC8128
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:Borland Delphi
                                          Yara matches:
                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000009.00000000.1822596622.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe, Author: Joe Security
                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe, Author: Joe Security
                                          Antivirus matches:
                                          • Detection: 3%, ReversingLabs
                                          Reputation:low
                                          Has exited:true

                                          Target ID:10
                                          Start time:08:03:12
                                          Start date:28/10/2024
                                          Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /firewall
                                          Imagebase:0x400000
                                          File size:6'307'408 bytes
                                          MD5 hash:63D0964168B927D00064AA684E79A300
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:Borland Delphi
                                          Reputation:low
                                          Has exited:true

                                          Target ID:11
                                          Start time:08:03:12
                                          Start date:28/10/2024
                                          Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /firewall
                                          Imagebase:0x400000
                                          File size:7'753'808 bytes
                                          MD5 hash:F3D74B072B9697CF64B0B8445FDC8128
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:Borland Delphi
                                          Reputation:low
                                          Has exited:true

                                          Target ID:12
                                          Start time:08:03:13
                                          Start date:28/10/2024
                                          Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /start
                                          Imagebase:0x400000
                                          File size:6'307'408 bytes
                                          MD5 hash:63D0964168B927D00064AA684E79A300
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:Borland Delphi
                                          Has exited:true

                                          Target ID:13
                                          Start time:08:03:14
                                          Start date:28/10/2024
                                          Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /start
                                          Imagebase:0x400000
                                          File size:7'753'808 bytes
                                          MD5 hash:F3D74B072B9697CF64B0B8445FDC8128
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:Borland Delphi
                                          Has exited:true

                                          Target ID:14
                                          Start time:08:03:14
                                          Start date:28/10/2024
                                          Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe"
                                          Imagebase:0x400000
                                          File size:7'753'808 bytes
                                          MD5 hash:F3D74B072B9697CF64B0B8445FDC8128
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:Borland Delphi
                                          Has exited:false

                                          Target ID:16
                                          Start time:08:03:17
                                          Start date:28/10/2024
                                          Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe"
                                          Imagebase:0x400000
                                          File size:6'307'408 bytes
                                          MD5 hash:63D0964168B927D00064AA684E79A300
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:Borland Delphi
                                          Has exited:false

                                          Target ID:17
                                          Start time:08:03:17
                                          Start date:28/10/2024
                                          Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /tray
                                          Imagebase:0x400000
                                          File size:6'307'408 bytes
                                          MD5 hash:63D0964168B927D00064AA684E79A300
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:Borland Delphi
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:11.7%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:27.2%
                                            Total number of Nodes:2000
                                            Total number of Limit Nodes:26
                                            execution_graph 26073 7ff66600d94c 26074 7ff66600d997 26073->26074 26078 7ff66600d95b memcpy_s 26073->26078 26083 7ff66600d69c 15 API calls memcpy_s 26074->26083 26076 7ff66600d97e HeapAlloc 26077 7ff66600d995 26076->26077 26076->26078 26078->26074 26078->26076 26080 7ff66600bbc0 26078->26080 26084 7ff66600bc00 26080->26084 26083->26077 26089 7ff66600f398 EnterCriticalSection 26084->26089 28588 7ff66600154b 28590 7ff6660014a2 28588->28590 28589 7ff666001900 _com_raise_error 14 API calls 28589->28590 28590->28589 28647 7ff666000df5 14 API calls _com_raise_error 28648 7ff666002d6c 28673 7ff6660027fc 28648->28673 28651 7ff666002eb8 28772 7ff666003170 7 API calls 2 library calls 28651->28772 28652 7ff666002d88 __scrt_acquire_startup_lock 28654 7ff666002ec2 28652->28654 28657 7ff666002da6 28652->28657 28773 7ff666003170 7 API calls 2 library calls 28654->28773 28656 7ff666002ecd abort 28658 7ff666002dcb 28657->28658 28663 7ff666002de8 __scrt_release_startup_lock 28657->28663 28681 7ff66600cd90 28657->28681 28660 7ff666002e51 28685 7ff6660032bc 28660->28685 28662 7ff666002e56 28688 7ff66600cd20 28662->28688 28663->28660 28769 7ff66600c050 35 API calls __GSHandlerCheck_EH 28663->28769 28774 7ff666002fb0 28673->28774 28676 7ff66600282b 28776 7ff66600cc50 28676->28776 28677 7ff666002827 28677->28651 28677->28652 28682 7ff66600cdeb 28681->28682 28683 7ff66600cdcc 28681->28683 28682->28663 28683->28682 28793 7ff665fd1120 28683->28793 28686 7ff666003cf0 memcpy_s 28685->28686 28687 7ff6660032d3 GetStartupInfoW 28686->28687 28687->28662 28799 7ff666010730 28688->28799 28690 7ff66600cd2f 28691 7ff666002e5e 28690->28691 28803 7ff666010ac0 35 API calls swprintf 28690->28803 28693 7ff666000754 28691->28693 28805 7ff665fedfd0 28693->28805 28696 7ff665fe62dc 35 API calls 28697 7ff66600079a 28696->28697 28882 7ff665ff946c 28697->28882 28699 7ff6660007a4 memcpy_s 28887 7ff665ff9a14 28699->28887 28701 7ff66600096e GetCommandLineW 28705 7ff666000980 28701->28705 28744 7ff666000b42 28701->28744 28702 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 28704 7ff666000de2 28702->28704 28703 7ff666000819 28703->28701 28751 7ff666000ddc 28703->28751 28708 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 28704->28708 28710 7ff665fd129c 33 API calls 28705->28710 28706 7ff665fe6454 34 API calls 28707 7ff666000b51 28706->28707 28711 7ff665fd1fa0 31 API calls 28707->28711 28717 7ff666000b68 memcpy_s 28707->28717 28709 7ff666000de8 28708->28709 28715 7ff666001900 _com_raise_error 14 API calls 28709->28715 28713 7ff6660009a5 28710->28713 28711->28717 28712 7ff665fd1fa0 31 API calls 28714 7ff666000b93 SetEnvironmentVariableW GetLocalTime 28712->28714 28928 7ff665ffcad0 102 API calls 3 library calls 28713->28928 28718 7ff665fe3e28 swprintf 46 API calls 28714->28718 28719 7ff666000e34 28715->28719 28717->28712 28721 7ff666000c18 SetEnvironmentVariableW GetModuleHandleW LoadIconW 28718->28721 28720 7ff6660009af 28720->28704 28722 7ff666000adb 28720->28722 28723 7ff6660009f9 OpenFileMappingW 28720->28723 28897 7ff665ffb014 LoadBitmapW 28721->28897 28730 7ff665fd129c 33 API calls 28722->28730 28725 7ff666000ad0 CloseHandle 28723->28725 28726 7ff666000a19 MapViewOfFile 28723->28726 28725->28744 28726->28725 28728 7ff666000a3f UnmapViewOfFile MapViewOfFile 28726->28728 28728->28725 28731 7ff666000a71 28728->28731 28734 7ff666000b00 28730->28734 28929 7ff665ffa190 33 API calls 2 library calls 28731->28929 28732 7ff666000c75 28921 7ff665ff67b4 28732->28921 28933 7ff665fffd0c 35 API calls 2 library calls 28734->28933 28738 7ff666000a81 28930 7ff665fffd0c 35 API calls 2 library calls 28738->28930 28739 7ff665ff67b4 33 API calls 28742 7ff666000c87 DialogBoxParamW 28739->28742 28740 7ff666000b0a 28740->28744 28746 7ff666000dd7 28740->28746 28752 7ff666000cd3 28742->28752 28743 7ff666000a90 28931 7ff665feb9b4 102 API calls 28743->28931 28744->28706 28748 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 28746->28748 28747 7ff666000aa5 28932 7ff665febb00 102 API calls 28747->28932 28748->28751 28750 7ff666000ab8 28755 7ff666000ac7 UnmapViewOfFile 28750->28755 28751->28702 28753 7ff666000cec 28752->28753 28754 7ff666000ce6 Sleep 28752->28754 28756 7ff666000cfa 28753->28756 28934 7ff665ff9f4c 49 API calls 2 library calls 28753->28934 28754->28753 28755->28725 28758 7ff666000d06 DeleteObject 28756->28758 28759 7ff666000d25 28758->28759 28760 7ff666000d1f DeleteObject 28758->28760 28761 7ff666000d6d 28759->28761 28762 7ff666000d5b 28759->28762 28760->28759 28924 7ff665ff94e4 28761->28924 28935 7ff665fffe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 28762->28935 28764 7ff666000d60 CloseHandle 28764->28761 28769->28660 28772->28654 28773->28656 28775 7ff66600281e __scrt_dllmain_crt_thread_attach 28774->28775 28775->28676 28775->28677 28777 7ff666010d4c 28776->28777 28778 7ff666002830 28777->28778 28781 7ff66600ec00 28777->28781 28778->28677 28780 7ff6660051a0 7 API calls 2 library calls 28778->28780 28780->28677 28792 7ff66600f398 EnterCriticalSection 28781->28792 28794 7ff665fd91c8 35 API calls 28793->28794 28795 7ff665fd1130 28794->28795 28798 7ff6660029bc 34 API calls 28795->28798 28797 7ff666002a01 28797->28683 28798->28797 28800 7ff66601073d 28799->28800 28801 7ff666010749 28799->28801 28804 7ff666010570 48 API calls 4 library calls 28800->28804 28801->28690 28803->28690 28804->28801 28936 7ff666002450 28805->28936 28808 7ff665fee07b 28812 7ff665fee503 28808->28812 28943 7ff66600b788 39 API calls 2 library calls 28808->28943 28809 7ff665fee026 GetProcAddress 28810 7ff665fee053 GetProcAddress 28809->28810 28811 7ff665fee03b 28809->28811 28810->28808 28814 7ff665fee068 28810->28814 28811->28810 28813 7ff665fe6454 34 API calls 28812->28813 28816 7ff665fee50c 28813->28816 28814->28808 28818 7ff665fe7df4 47 API calls 28816->28818 28817 7ff665fee3b0 28817->28812 28819 7ff665fee3ba 28817->28819 28846 7ff665fee51a 28818->28846 28820 7ff665fe6454 34 API calls 28819->28820 28821 7ff665fee3c3 CreateFileW 28820->28821 28823 7ff665fee403 SetFilePointer 28821->28823 28824 7ff665fee4f0 CloseHandle 28821->28824 28823->28824 28825 7ff665fee41c ReadFile 28823->28825 28826 7ff665fd1fa0 31 API calls 28824->28826 28825->28824 28827 7ff665fee444 28825->28827 28826->28812 28828 7ff665fee800 28827->28828 28829 7ff665fee458 28827->28829 28949 7ff666002624 8 API calls 28828->28949 28834 7ff665fd129c 33 API calls 28829->28834 28831 7ff665fee805 28832 7ff665fee53e CompareStringW 28832->28846 28833 7ff665fd129c 33 API calls 28833->28846 28838 7ff665fee48f 28834->28838 28835 7ff665fe8090 47 API calls 28835->28846 28836 7ff665fd1fa0 31 API calls 28836->28846 28842 7ff665fee4db 28838->28842 28944 7ff665fed0a0 33 API calls 28838->28944 28839 7ff665fee7c2 28844 7ff665fd1fa0 31 API calls 28839->28844 28840 7ff665fee648 28945 7ff665fe7eb0 47 API calls 28840->28945 28841 7ff665fe32bc 51 API calls 28841->28846 28847 7ff665fd1fa0 31 API calls 28842->28847 28845 7ff665fee7cb 28844->28845 28851 7ff665fd1fa0 31 API calls 28845->28851 28846->28832 28846->28833 28846->28835 28846->28836 28846->28841 28849 7ff665fee5cc 28846->28849 28938 7ff665fe51a4 28846->28938 28852 7ff665fee4e5 28847->28852 28848 7ff665fee651 28853 7ff665fe51a4 9 API calls 28848->28853 28850 7ff665fd129c 33 API calls 28849->28850 28859 7ff665fe8090 47 API calls 28849->28859 28864 7ff665fd1fa0 31 API calls 28849->28864 28868 7ff665fe32bc 51 API calls 28849->28868 28872 7ff665fee63a 28849->28872 28850->28849 28855 7ff665fee7d5 28851->28855 28856 7ff665fd1fa0 31 API calls 28852->28856 28854 7ff665fee656 28853->28854 28857 7ff665fee661 28854->28857 28858 7ff665fee706 28854->28858 28860 7ff666002320 _handle_error 8 API calls 28855->28860 28856->28824 28869 7ff665feaae0 48 API calls 28857->28869 28861 7ff665feda98 48 API calls 28858->28861 28859->28849 28862 7ff665fee7e4 28860->28862 28863 7ff665fee74b AllocConsole 28861->28863 28862->28696 28865 7ff665fee755 GetCurrentProcessId AttachConsole 28863->28865 28866 7ff665fee6fb 28863->28866 28864->28849 28867 7ff665fee76c 28865->28867 28948 7ff665fd19e0 31 API calls _invalid_parameter_noinfo_noreturn 28866->28948 28875 7ff665fee778 GetStdHandle WriteConsoleW Sleep FreeConsole 28867->28875 28868->28849 28871 7ff665fee6a5 28869->28871 28874 7ff665feda98 48 API calls 28871->28874 28872->28839 28872->28840 28873 7ff665fee7b9 ExitProcess 28876 7ff665fee6c3 28874->28876 28875->28866 28877 7ff665feaae0 48 API calls 28876->28877 28878 7ff665fee6ce 28877->28878 28946 7ff665fedc2c 33 API calls 28878->28946 28880 7ff665fee6da 28947 7ff665fd19e0 31 API calls _invalid_parameter_noinfo_noreturn 28880->28947 28883 7ff665fedd88 28882->28883 28884 7ff665ff9481 OleInitialize 28883->28884 28885 7ff665ff94a7 28884->28885 28886 7ff665ff94cd SHGetMalloc 28885->28886 28886->28699 28888 7ff665ff9a49 28887->28888 28890 7ff665ff9a4e memcpy_s 28887->28890 28889 7ff665fd1fa0 31 API calls 28888->28889 28889->28890 28891 7ff665fd1fa0 31 API calls 28890->28891 28895 7ff665ff9a7d memcpy_s 28890->28895 28891->28895 28892 7ff665fd1fa0 31 API calls 28896 7ff665ff9aac memcpy_s 28892->28896 28893 7ff665fd1fa0 31 API calls 28894 7ff665ff9adb memcpy_s 28893->28894 28894->28703 28894->28894 28895->28892 28895->28896 28896->28893 28896->28894 28898 7ff665ffb03e 28897->28898 28899 7ff665ffb046 28897->28899 28950 7ff665ff8624 FindResourceW 28898->28950 28901 7ff665ffb063 28899->28901 28902 7ff665ffb04e GetObjectW 28899->28902 28903 7ff665ff849c 4 API calls 28901->28903 28902->28901 28904 7ff665ffb078 28903->28904 28905 7ff665ffb0ce 28904->28905 28906 7ff665ffb09e 28904->28906 28907 7ff665ff8624 11 API calls 28904->28907 28916 7ff665fe98ac 28905->28916 28965 7ff665ff8504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28906->28965 28909 7ff665ffb08a 28907->28909 28909->28906 28912 7ff665ffb092 DeleteObject 28909->28912 28910 7ff665ffb0a7 28911 7ff665ff84cc 4 API calls 28910->28911 28913 7ff665ffb0b2 28911->28913 28912->28906 28966 7ff665ff8df4 16 API calls _handle_error 28913->28966 28915 7ff665ffb0bf DeleteObject 28915->28905 28967 7ff665fe98dc 28916->28967 28918 7ff665fe98ba 29034 7ff665fea43c GetModuleHandleW FindResourceW 28918->29034 28920 7ff665fe98c2 28920->28732 28922 7ff6660021d0 33 API calls 28921->28922 28923 7ff665ff67fa 28922->28923 28923->28739 28925 7ff665ff9501 28924->28925 28926 7ff665ff950a OleUninitialize 28925->28926 28927 7ff66603e330 28926->28927 28928->28720 28929->28738 28930->28743 28931->28747 28932->28750 28933->28740 28934->28756 28935->28764 28937 7ff665fedff4 GetModuleHandleW 28936->28937 28937->28808 28937->28809 28939 7ff665fe51c8 GetVersionExW 28938->28939 28940 7ff665fe51fb 28938->28940 28939->28940 28941 7ff666002320 _handle_error 8 API calls 28940->28941 28942 7ff665fe5228 28941->28942 28942->28846 28943->28817 28944->28838 28945->28848 28946->28880 28947->28866 28948->28873 28949->28831 28951 7ff665ff864f SizeofResource 28950->28951 28953 7ff665ff879b 28950->28953 28952 7ff665ff8669 LoadResource 28951->28952 28951->28953 28952->28953 28954 7ff665ff8682 LockResource 28952->28954 28953->28899 28954->28953 28955 7ff665ff8697 GlobalAlloc 28954->28955 28955->28953 28956 7ff665ff86b8 GlobalLock 28955->28956 28957 7ff665ff8792 GlobalFree 28956->28957 28958 7ff665ff86ca memcpy_s 28956->28958 28957->28953 28959 7ff665ff86d8 CreateStreamOnHGlobal 28958->28959 28960 7ff665ff8789 GlobalUnlock 28959->28960 28961 7ff665ff86f6 GdipAlloc 28959->28961 28960->28957 28962 7ff665ff870b 28961->28962 28962->28960 28963 7ff665ff8772 28962->28963 28964 7ff665ff875a GdipCreateHBITMAPFromBitmap 28962->28964 28963->28960 28964->28963 28965->28910 28966->28915 28970 7ff665fe98fe _snwprintf 28967->28970 28968 7ff665fe9973 29044 7ff665fe68b0 48 API calls 28968->29044 28970->28968 28971 7ff665fe9a89 28970->28971 28974 7ff665fe99fd 28971->28974 28976 7ff665fd20b0 33 API calls 28971->28976 28972 7ff665fd1fa0 31 API calls 28972->28974 28973 7ff665fe997d memcpy_s 28973->28972 29031 7ff665fea42e 28973->29031 28978 7ff665fe24c0 54 API calls 28974->28978 28975 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 28977 7ff665fea434 28975->28977 28976->28974 28980 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 28977->28980 28979 7ff665fe9a1a 28978->28979 28981 7ff665fe9a22 28979->28981 28988 7ff665fe9aad 28979->28988 28982 7ff665fea43a 28980->28982 28983 7ff665fe204c 100 API calls 28981->28983 28985 7ff665fe9a2b 28983->28985 28984 7ff665fe9b17 29036 7ff66600a450 28984->29036 28985->28977 28987 7ff665fe9a66 28985->28987 28992 7ff666002320 _handle_error 8 API calls 28987->28992 28988->28984 28989 7ff665fe8e58 33 API calls 28988->28989 28989->28988 28991 7ff66600a450 31 API calls 29004 7ff665fe9b57 __vcrt_InitializeCriticalSectionEx 28991->29004 28993 7ff665fea40e 28992->28993 28993->28918 28994 7ff665fe9c89 28995 7ff665fe2aa0 101 API calls 28994->28995 29008 7ff665fe9d5c 28994->29008 28998 7ff665fe9ca1 28995->28998 28996 7ff665fe2bb0 101 API calls 28996->29004 28997 7ff665fe28d0 104 API calls 28997->29004 28999 7ff665fe28d0 104 API calls 28998->28999 28998->29008 29005 7ff665fe9cc9 28999->29005 29000 7ff665fe204c 100 API calls 29002 7ff665fea3f5 29000->29002 29001 7ff665fe2aa0 101 API calls 29001->29004 29003 7ff665fd1fa0 31 API calls 29002->29003 29003->28987 29004->28994 29004->28996 29004->28997 29004->29001 29004->29008 29007 7ff665fe9cd7 __vcrt_InitializeCriticalSectionEx 29005->29007 29005->29008 29045 7ff665ff0bbc MultiByteToWideChar 29005->29045 29007->29008 29009 7ff665fea1ec 29007->29009 29011 7ff665fea157 29007->29011 29012 7ff665fea14b 29007->29012 29027 7ff665ff0f68 WideCharToMultiByte 29007->29027 29029 7ff665fea429 29007->29029 29046 7ff665feaa88 45 API calls _snwprintf 29007->29046 29047 7ff66600a270 31 API calls 2 library calls 29007->29047 29008->29000 29016 7ff665fea2c2 29009->29016 29051 7ff66600cf90 31 API calls 2 library calls 29009->29051 29011->29009 29048 7ff66600cf90 31 API calls 2 library calls 29011->29048 29012->28918 29015 7ff665fea3a2 29018 7ff66600a450 31 API calls 29015->29018 29016->29015 29025 7ff665fe8e58 33 API calls 29016->29025 29017 7ff665fea2ae 29017->29016 29053 7ff665fe8cd0 33 API calls 2 library calls 29017->29053 29020 7ff665fea3cb 29018->29020 29022 7ff66600a450 31 API calls 29020->29022 29021 7ff665fea16d 29049 7ff66600b7bc 31 API calls _invalid_parameter_noinfo_noreturn 29021->29049 29022->29008 29024 7ff665fea249 29052 7ff66600b7bc 31 API calls _invalid_parameter_noinfo_noreturn 29024->29052 29025->29016 29026 7ff665fea1d8 29026->29009 29050 7ff665fe8cd0 33 API calls 2 library calls 29026->29050 29027->29007 29054 7ff666002624 8 API calls 29029->29054 29031->28975 29035 7ff665fea468 29034->29035 29035->28920 29037 7ff66600a47d 29036->29037 29043 7ff66600a492 29037->29043 29055 7ff66600d69c 15 API calls memcpy_s 29037->29055 29039 7ff66600a487 29056 7ff6660078e4 31 API calls _invalid_parameter_noinfo 29039->29056 29040 7ff666002320 _handle_error 8 API calls 29042 7ff665fe9b37 29040->29042 29042->28991 29043->29040 29044->28973 29045->29007 29046->29007 29047->29007 29048->29021 29049->29026 29050->29009 29051->29024 29052->29017 29053->29016 29054->29031 29055->29039 29056->29043 26102 7ff666001491 26103 7ff6660013c9 26102->26103 26106 7ff666001900 26103->26106 26105 7ff666001408 26105->26105 26132 7ff666001558 26106->26132 26109 7ff66600198b 26110 7ff666001868 DloadReleaseSectionWriteAccess 6 API calls 26109->26110 26111 7ff666001998 RaiseException 26110->26111 26125 7ff666001bb5 26111->26125 26112 7ff666001abd 26115 7ff666001b85 26112->26115 26119 7ff666001b1b GetProcAddress 26112->26119 26113 7ff6660019b4 26113->26112 26114 7ff666001a3d LoadLibraryExA 26113->26114 26113->26115 26117 7ff666001aa9 26113->26117 26116 7ff666001a54 GetLastError 26114->26116 26114->26117 26140 7ff666001868 26115->26140 26120 7ff666001a7e 26116->26120 26124 7ff666001a69 26116->26124 26117->26112 26118 7ff666001ab4 FreeLibrary 26117->26118 26118->26112 26119->26115 26123 7ff666001b30 GetLastError 26119->26123 26122 7ff666001868 DloadReleaseSectionWriteAccess 6 API calls 26120->26122 26126 7ff666001a8b RaiseException 26122->26126 26127 7ff666001b45 26123->26127 26124->26117 26124->26120 26125->26105 26126->26125 26127->26115 26128 7ff666001868 DloadReleaseSectionWriteAccess 6 API calls 26127->26128 26129 7ff666001b67 RaiseException 26128->26129 26130 7ff666001558 _com_raise_error 6 API calls 26129->26130 26131 7ff666001b81 26130->26131 26131->26115 26133 7ff66600156e 26132->26133 26134 7ff6660015d3 26132->26134 26148 7ff666001604 26133->26148 26134->26109 26134->26113 26137 7ff6660015ce 26139 7ff666001604 DloadReleaseSectionWriteAccess 3 API calls 26137->26139 26139->26134 26141 7ff666001878 26140->26141 26147 7ff6660018d1 26140->26147 26142 7ff666001604 DloadReleaseSectionWriteAccess 3 API calls 26141->26142 26143 7ff66600187d 26142->26143 26144 7ff6660018cc 26143->26144 26145 7ff6660017d8 DloadProtectSection 3 API calls 26143->26145 26146 7ff666001604 DloadReleaseSectionWriteAccess 3 API calls 26144->26146 26145->26144 26146->26147 26147->26125 26149 7ff666001573 26148->26149 26150 7ff66600161f 26148->26150 26149->26137 26155 7ff6660017d8 26149->26155 26150->26149 26151 7ff666001624 GetModuleHandleW 26150->26151 26152 7ff66600163e GetProcAddress 26151->26152 26154 7ff666001639 26151->26154 26153 7ff666001653 GetProcAddress 26152->26153 26152->26154 26153->26154 26154->26149 26156 7ff6660017fa DloadProtectSection 26155->26156 26157 7ff666001802 26156->26157 26158 7ff66600183a VirtualProtect 26156->26158 26160 7ff6660016a4 VirtualQuery GetSystemInfo 26156->26160 26157->26137 26158->26157 26160->26158 26161 7ff665ffb190 26504 7ff665fd255c 26161->26504 26163 7ff665ffb1db 26164 7ff665ffbe93 26163->26164 26165 7ff665ffb1ef 26163->26165 26310 7ff665ffb20c 26163->26310 26789 7ff665fff390 26164->26789 26167 7ff665ffb1ff 26165->26167 26168 7ff665ffb2db 26165->26168 26165->26310 26171 7ff665ffb2a9 26167->26171 26172 7ff665ffb207 26167->26172 26174 7ff665ffb391 26168->26174 26180 7ff665ffb2f5 26168->26180 26179 7ff665ffb2cb EndDialog 26171->26179 26171->26310 26184 7ff665feaae0 48 API calls 26172->26184 26172->26310 26512 7ff665fd22bc GetDlgItem 26174->26512 26175 7ff665ffbeba SendMessageW 26176 7ff665ffbec9 26175->26176 26177 7ff665ffbed5 SendDlgItemMessageW 26176->26177 26178 7ff665ffbef0 GetDlgItem SendMessageW 26176->26178 26177->26178 26808 7ff665fe62dc GetCurrentDirectoryW 26178->26808 26179->26310 26185 7ff665feaae0 48 API calls 26180->26185 26188 7ff665ffb236 26184->26188 26189 7ff665ffb313 SetDlgItemTextW 26185->26189 26186 7ff665ffb3b1 EndDialog 26369 7ff665ffb3da 26186->26369 26187 7ff665ffbf47 GetDlgItem 26818 7ff665fd2520 26187->26818 26822 7ff665fd1ec4 34 API calls _handle_error 26188->26822 26193 7ff665ffb326 26189->26193 26192 7ff665ffb408 GetDlgItem 26197 7ff665ffb422 SendMessageW SendMessageW 26192->26197 26198 7ff665ffb44f SetFocus 26192->26198 26200 7ff665ffb340 GetMessageW 26193->26200 26193->26310 26196 7ff665ffb246 26207 7ff665ffb25c 26196->26207 26823 7ff665fd250c 26196->26823 26197->26198 26201 7ff665ffb465 26198->26201 26202 7ff665ffb4f2 26198->26202 26208 7ff665ffb35e IsDialogMessageW 26200->26208 26200->26310 26209 7ff665feaae0 48 API calls 26201->26209 26526 7ff665fd8d04 26202->26526 26203 7ff665fd1fa0 31 API calls 26203->26310 26219 7ff665ffc363 26207->26219 26207->26310 26208->26193 26214 7ff665ffb373 TranslateMessage DispatchMessageW 26208->26214 26215 7ff665ffb46f 26209->26215 26210 7ff665ffbcc5 26211 7ff665feaae0 48 API calls 26210->26211 26216 7ff665ffbcd6 SetDlgItemTextW 26211->26216 26213 7ff665ffb52c 26536 7ff665ffef80 26213->26536 26214->26193 26826 7ff665fd129c 26215->26826 26220 7ff665feaae0 48 API calls 26216->26220 26883 7ff666007904 26219->26883 26225 7ff665ffbd08 26220->26225 26242 7ff665fd129c 33 API calls 26225->26242 26226 7ff665ffc368 26237 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26226->26237 26231 7ff665ffb498 26235 7ff665fff0a4 24 API calls 26231->26235 26241 7ff665ffb4a5 26235->26241 26244 7ff665ffc36e 26237->26244 26241->26226 26257 7ff665ffb4e8 26241->26257 26273 7ff665ffbd31 26242->26273 26254 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26244->26254 26252 7ff665ffbdda 26258 7ff665feaae0 48 API calls 26252->26258 26259 7ff665ffc374 26254->26259 26266 7ff665ffb5ec 26257->26266 26836 7ff665fffa80 33 API calls 2 library calls 26257->26836 26268 7ff665ffbde4 26258->26268 26279 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26259->26279 26263 7ff665fd1fa0 31 API calls 26271 7ff665ffb586 26263->26271 26276 7ff665ffb61a 26266->26276 26837 7ff665fe32a8 26266->26837 26291 7ff665fd129c 33 API calls 26268->26291 26271->26244 26271->26257 26273->26252 26285 7ff665fd129c 33 API calls 26273->26285 26574 7ff665fe2f58 26276->26574 26284 7ff665ffc37a 26279->26284 26296 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26284->26296 26292 7ff665ffbd7f 26285->26292 26289 7ff665ffb634 GetLastError 26290 7ff665ffb64c 26289->26290 26586 7ff665fe7fc4 26290->26586 26295 7ff665ffbe0d 26291->26295 26298 7ff665feaae0 48 API calls 26292->26298 26294 7ff665ffb60e 26840 7ff665ff9d90 12 API calls _handle_error 26294->26840 26313 7ff665fd129c 33 API calls 26295->26313 26302 7ff665ffc380 26296->26302 26303 7ff665ffbd8a 26298->26303 26314 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26302->26314 26304 7ff665fd1150 33 API calls 26303->26304 26308 7ff665ffbda2 26304->26308 26306 7ff665ffb65e 26311 7ff665ffb665 GetLastError 26306->26311 26312 7ff665ffb674 26306->26312 26870 7ff665fd2034 26308->26870 26874 7ff666002320 26310->26874 26311->26312 26315 7ff665ffb71c 26312->26315 26319 7ff665ffb72b 26312->26319 26321 7ff665ffb68b GetTickCount 26312->26321 26316 7ff665ffbe4e 26313->26316 26317 7ff665ffc386 26314->26317 26315->26319 26338 7ff665ffbb79 26315->26338 26331 7ff665fd1fa0 31 API calls 26316->26331 26322 7ff665fd255c 61 API calls 26317->26322 26323 7ff665ffba50 26319->26323 26841 7ff665fe6454 26319->26841 26589 7ff665fd4228 26321->26589 26326 7ff665ffc3e4 26322->26326 26323->26186 26865 7ff665fdbd0c 33 API calls 26323->26865 26324 7ff665ffbdbe 26328 7ff665fd1fa0 31 API calls 26324->26328 26332 7ff665ffc3e8 26326->26332 26341 7ff665ffc489 GetDlgItem SetFocus 26326->26341 26370 7ff665ffc3fd 26326->26370 26336 7ff665ffbdcc 26328->26336 26340 7ff665ffbe78 26331->26340 26349 7ff666002320 _handle_error 8 API calls 26332->26349 26335 7ff665ffb74e 26853 7ff665feb914 102 API calls 26335->26853 26344 7ff665fd1fa0 31 API calls 26336->26344 26353 7ff665feaae0 48 API calls 26338->26353 26339 7ff665ffba75 26866 7ff665fd1150 26339->26866 26348 7ff665fd1fa0 31 API calls 26340->26348 26345 7ff665ffc4ba 26341->26345 26344->26252 26358 7ff665fd129c 33 API calls 26345->26358 26346 7ff665ffb6ba 26599 7ff665fd1fa0 26346->26599 26355 7ff665ffbe83 26348->26355 26350 7ff665ffca97 26349->26350 26351 7ff665ffb768 26357 7ff665feda98 48 API calls 26351->26357 26360 7ff665ffbba7 SetDlgItemTextW 26353->26360 26354 7ff665ffba8a 26361 7ff665feaae0 48 API calls 26354->26361 26362 7ff665fd1fa0 31 API calls 26355->26362 26356 7ff665ffc434 SendDlgItemMessageW 26363 7ff665ffc454 26356->26363 26364 7ff665ffc45d EndDialog 26356->26364 26365 7ff665ffb7aa GetCommandLineW 26357->26365 26366 7ff665ffc4cc 26358->26366 26359 7ff665ffb6c8 26604 7ff665fe2134 26359->26604 26367 7ff665fd2534 26360->26367 26368 7ff665ffba97 26361->26368 26362->26369 26363->26364 26364->26332 26371 7ff665ffb84f 26365->26371 26372 7ff665ffb869 26365->26372 26888 7ff665fe80d8 33 API calls 26366->26888 26374 7ff665ffbbc5 SetDlgItemTextW GetDlgItem 26367->26374 26375 7ff665fd1150 33 API calls 26368->26375 26369->26203 26370->26332 26370->26356 26854 7ff665fd20b0 26371->26854 26858 7ff665ffab54 33 API calls _handle_error 26372->26858 26379 7ff665ffbc13 26374->26379 26380 7ff665ffbbf0 GetWindowLongPtrW SetWindowLongPtrW 26374->26380 26381 7ff665ffbaaa 26375->26381 26376 7ff665ffc4e0 26382 7ff665fd250c SetDlgItemTextW 26376->26382 26624 7ff665ffce88 26379->26624 26380->26379 26386 7ff665fd1fa0 31 API calls 26381->26386 26388 7ff665ffc4f4 26382->26388 26383 7ff665ffb87a 26859 7ff665ffab54 33 API calls _handle_error 26383->26859 26393 7ff665ffbab5 26386->26393 26400 7ff665ffc526 SendDlgItemMessageW FindFirstFileW 26388->26400 26390 7ff665ffb6f5 GetLastError 26391 7ff665ffb704 26390->26391 26620 7ff665fe204c 26391->26620 26395 7ff665fd1fa0 31 API calls 26393->26395 26394 7ff665ffce88 160 API calls 26398 7ff665ffbc3c 26394->26398 26399 7ff665ffbac3 26395->26399 26396 7ff665ffb88b 26860 7ff665ffab54 33 API calls _handle_error 26396->26860 26774 7ff665fff974 26398->26774 26410 7ff665feaae0 48 API calls 26399->26410 26404 7ff665ffc57b 26400->26404 26497 7ff665ffca04 26400->26497 26414 7ff665feaae0 48 API calls 26404->26414 26405 7ff665ffb89c 26861 7ff665feb9b4 102 API calls 26405->26861 26409 7ff665ffce88 160 API calls 26425 7ff665ffbc6a 26409->26425 26413 7ff665ffbadb 26410->26413 26411 7ff665ffb8b3 26862 7ff665fffbdc 33 API calls 26411->26862 26412 7ff665ffca81 26412->26332 26426 7ff665fd129c 33 API calls 26413->26426 26419 7ff665ffc59e 26414->26419 26416 7ff665ffcaa9 26417 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26416->26417 26421 7ff665ffcaae 26417->26421 26418 7ff665ffbc96 26788 7ff665fd2298 GetDlgItem EnableWindow 26418->26788 26431 7ff665fd129c 33 API calls 26419->26431 26420 7ff665ffb8d2 CreateFileMappingW 26423 7ff665ffb953 ShellExecuteExW 26420->26423 26424 7ff665ffb911 MapViewOfFile 26420->26424 26429 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26421->26429 26444 7ff665ffb974 26423->26444 26863 7ff666003640 26424->26863 26425->26418 26430 7ff665ffce88 160 API calls 26425->26430 26438 7ff665ffbb04 26426->26438 26427 7ff665ffb3f5 26427->26186 26427->26210 26432 7ff665ffcab4 26429->26432 26430->26418 26433 7ff665ffc5cd 26431->26433 26436 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26432->26436 26434 7ff665fd1150 33 API calls 26433->26434 26439 7ff665ffc5e8 26434->26439 26435 7ff665ffb9c3 26445 7ff665ffb9ef 26435->26445 26446 7ff665ffb9dc UnmapViewOfFile CloseHandle 26435->26446 26440 7ff665ffcaba 26436->26440 26437 7ff665ffbb5a 26441 7ff665fd1fa0 31 API calls 26437->26441 26438->26284 26438->26437 26889 7ff665fde164 33 API calls 2 library calls 26439->26889 26449 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26440->26449 26441->26186 26443 7ff665ffc5ff 26447 7ff665fd1fa0 31 API calls 26443->26447 26444->26435 26451 7ff665ffb9b1 Sleep 26444->26451 26445->26259 26448 7ff665ffba25 26445->26448 26446->26445 26450 7ff665ffc60c 26447->26450 26453 7ff665fd1fa0 31 API calls 26448->26453 26452 7ff665ffcac0 26449->26452 26450->26421 26455 7ff665fd1fa0 31 API calls 26450->26455 26451->26435 26451->26444 26456 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26452->26456 26454 7ff665ffba42 26453->26454 26457 7ff665fd1fa0 31 API calls 26454->26457 26458 7ff665ffc673 26455->26458 26459 7ff665ffcac6 26456->26459 26457->26323 26460 7ff665fd250c SetDlgItemTextW 26458->26460 26462 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26459->26462 26461 7ff665ffc687 FindClose 26460->26461 26463 7ff665ffc6a3 26461->26463 26464 7ff665ffc797 SendDlgItemMessageW 26461->26464 26465 7ff665ffcacc 26462->26465 26890 7ff665ffa2cc 10 API calls _handle_error 26463->26890 26466 7ff665ffc7cb 26464->26466 26469 7ff665feaae0 48 API calls 26466->26469 26468 7ff665ffc6c6 26470 7ff665feaae0 48 API calls 26468->26470 26471 7ff665ffc7d8 26469->26471 26472 7ff665ffc6cf 26470->26472 26474 7ff665fd129c 33 API calls 26471->26474 26473 7ff665feda98 48 API calls 26472->26473 26478 7ff665ffc6ec memcpy_s 26473->26478 26475 7ff665ffc807 26474->26475 26477 7ff665fd1150 33 API calls 26475->26477 26476 7ff665fd1fa0 31 API calls 26479 7ff665ffc783 26476->26479 26480 7ff665ffc822 26477->26480 26478->26432 26478->26476 26481 7ff665fd250c SetDlgItemTextW 26479->26481 26891 7ff665fde164 33 API calls 2 library calls 26480->26891 26481->26464 26483 7ff665ffc839 26484 7ff665fd1fa0 31 API calls 26483->26484 26485 7ff665ffc845 memcpy_s 26484->26485 26486 7ff665fd1fa0 31 API calls 26485->26486 26487 7ff665ffc87f 26486->26487 26488 7ff665fd1fa0 31 API calls 26487->26488 26489 7ff665ffc88c 26488->26489 26489->26440 26490 7ff665fd1fa0 31 API calls 26489->26490 26491 7ff665ffc8f3 26490->26491 26492 7ff665fd250c SetDlgItemTextW 26491->26492 26493 7ff665ffc907 26492->26493 26493->26497 26892 7ff665ffa2cc 10 API calls _handle_error 26493->26892 26495 7ff665ffc932 26496 7ff665feaae0 48 API calls 26495->26496 26498 7ff665ffc93c 26496->26498 26497->26332 26497->26412 26497->26416 26497->26459 26499 7ff665feda98 48 API calls 26498->26499 26501 7ff665ffc959 memcpy_s 26499->26501 26500 7ff665fd1fa0 31 API calls 26502 7ff665ffc9f0 26500->26502 26501->26452 26501->26500 26503 7ff665fd250c SetDlgItemTextW 26502->26503 26503->26497 26505 7ff665fd25d0 26504->26505 26506 7ff665fd256a 26504->26506 26505->26163 26506->26505 26893 7ff665fea4ac 26506->26893 26508 7ff665fd258f 26508->26505 26509 7ff665fd25a4 GetDlgItem 26508->26509 26509->26505 26510 7ff665fd25b7 26509->26510 26510->26505 26511 7ff665fd25be SetWindowTextW 26510->26511 26511->26505 26513 7ff665fd2334 26512->26513 26514 7ff665fd22fc 26512->26514 26992 7ff665fd23f8 GetWindowTextLengthW 26513->26992 26516 7ff665fd129c 33 API calls 26514->26516 26517 7ff665fd232a memcpy_s 26516->26517 26519 7ff665fd1fa0 31 API calls 26517->26519 26520 7ff665fd2389 26517->26520 26518 7ff665fd23c8 26521 7ff666002320 _handle_error 8 API calls 26518->26521 26519->26520 26520->26518 26523 7ff665fd23f0 26520->26523 26522 7ff665fd23dd 26521->26522 26522->26186 26522->26192 26522->26427 26524 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26523->26524 26525 7ff665fd23f5 26524->26525 26527 7ff665fd8d34 26526->26527 26533 7ff665fd8de8 26526->26533 26530 7ff665fd8de3 26527->26530 26531 7ff665fd8d91 26527->26531 26534 7ff665fd8d42 memcpy_s 26527->26534 27027 7ff665fd1f80 33 API calls 3 library calls 26530->27027 26531->26534 26535 7ff6660021d0 33 API calls 26531->26535 27028 7ff665fd2004 33 API calls std::_Xinvalid_argument 26533->27028 26534->26213 26535->26534 26540 7ff665ffefb0 26536->26540 26537 7ff665ffefd7 26538 7ff666002320 _handle_error 8 API calls 26537->26538 26539 7ff665ffb537 26538->26539 26550 7ff665feaae0 26539->26550 26540->26537 27029 7ff665fdbd0c 33 API calls 26540->27029 26542 7ff665fff02a 26543 7ff665fd1150 33 API calls 26542->26543 26544 7ff665fff03f 26543->26544 26546 7ff665fd1fa0 31 API calls 26544->26546 26548 7ff665fff04f memcpy_s 26544->26548 26545 7ff665fd1fa0 31 API calls 26547 7ff665fff076 26545->26547 26546->26548 26549 7ff665fd1fa0 31 API calls 26547->26549 26548->26545 26549->26537 26551 7ff665feaaf3 26550->26551 27030 7ff665fe9774 26551->27030 26554 7ff665feab58 LoadStringW 26555 7ff665feab86 26554->26555 26556 7ff665feab71 LoadStringW 26554->26556 26557 7ff665feda98 26555->26557 26556->26555 27049 7ff665fed874 26557->27049 26560 7ff665fff0a4 27083 7ff665ffae1c PeekMessageW 26560->27083 26563 7ff665fff0f5 26567 7ff665fff101 ShowWindow SendMessageW SendMessageW 26563->26567 26564 7ff665fff143 SendMessageW SendMessageW 26565 7ff665fff1a4 SendMessageW 26564->26565 26566 7ff665fff189 26564->26566 26568 7ff665fff1c3 26565->26568 26569 7ff665fff1c6 SendMessageW SendMessageW 26565->26569 26566->26565 26567->26564 26568->26569 26570 7ff665fff1f3 SendMessageW 26569->26570 26571 7ff665fff218 SendMessageW 26569->26571 26570->26571 26572 7ff666002320 _handle_error 8 API calls 26571->26572 26573 7ff665ffb578 26572->26573 26573->26263 26578 7ff665fe2f8e 26574->26578 26581 7ff665fe309d 26574->26581 26575 7ff666002320 _handle_error 8 API calls 26576 7ff665fe30b3 26575->26576 26576->26289 26576->26290 26577 7ff665fe3077 26579 7ff665fe3684 56 API calls 26577->26579 26577->26581 26578->26577 26580 7ff665fd129c 33 API calls 26578->26580 26583 7ff665fe30c8 26578->26583 27088 7ff665fe3684 26578->27088 26579->26581 26580->26578 26581->26575 26584 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26583->26584 26585 7ff665fe30cd 26584->26585 26587 7ff665fe7fd2 SetCurrentDirectoryW 26586->26587 26588 7ff665fe7fcf 26586->26588 26587->26306 26588->26587 26590 7ff665fd4255 26589->26590 26591 7ff665fd426a 26590->26591 26592 7ff665fd129c 33 API calls 26590->26592 26593 7ff666002320 _handle_error 8 API calls 26591->26593 26592->26591 26594 7ff665fd42a1 26593->26594 26595 7ff665fd3c84 26594->26595 26596 7ff665fd3cab 26595->26596 27221 7ff665fd710c 26596->27221 26598 7ff665fd3cbb memcpy_s 26598->26346 26600 7ff665fd1fb3 26599->26600 26601 7ff665fd1fdc 26599->26601 26600->26601 26602 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26600->26602 26601->26359 26603 7ff665fd2000 26602->26603 26606 7ff665fe216a 26604->26606 26605 7ff665fe219e 26608 7ff665fe227f 26605->26608 26609 7ff665fe6a0c 49 API calls 26605->26609 26606->26605 26607 7ff665fe21b1 CreateFileW 26606->26607 26607->26605 26610 7ff665fe22af 26608->26610 26615 7ff665fd20b0 33 API calls 26608->26615 26611 7ff665fe2209 26609->26611 26612 7ff666002320 _handle_error 8 API calls 26610->26612 26613 7ff665fe220d CreateFileW 26611->26613 26614 7ff665fe2246 26611->26614 26616 7ff665fe22c4 26612->26616 26613->26614 26614->26608 26617 7ff665fe22d8 26614->26617 26615->26610 26616->26390 26616->26391 26618 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26617->26618 26619 7ff665fe22dd 26618->26619 26621 7ff665fe2066 26620->26621 26622 7ff665fe2072 26620->26622 26621->26622 27233 7ff665fe20d0 26621->27233 27240 7ff665ffaa08 26624->27240 26626 7ff665ffd1ee 26627 7ff665fd1fa0 31 API calls 26626->26627 26628 7ff665ffd1f7 26627->26628 26630 7ff666002320 _handle_error 8 API calls 26628->26630 26629 7ff665fed22c 33 API calls 26766 7ff665ffcf03 memcpy_s 26629->26766 26631 7ff665ffbc2b 26630->26631 26631->26394 26632 7ff665ffeefa 27373 7ff665fd704c 47 API calls memcpy_s 26632->27373 26635 7ff665ffef00 27374 7ff665fd704c 47 API calls memcpy_s 26635->27374 26637 7ff665ffef06 26641 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26637->26641 26639 7ff665ffeeee 26640 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26639->26640 26642 7ff665ffeef4 26640->26642 26644 7ff665ffef0c 26641->26644 27372 7ff665fd704c 47 API calls memcpy_s 26642->27372 26646 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26644->26646 26648 7ff665ffef12 26646->26648 26647 7ff665ffee4a 26649 7ff665ffeed2 26647->26649 26650 7ff665fd20b0 33 API calls 26647->26650 26653 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26648->26653 27370 7ff665fd1f80 33 API calls 3 library calls 26649->27370 26654 7ff665ffee77 26650->26654 26651 7ff665ffeee8 27371 7ff665fd2004 33 API calls std::_Xinvalid_argument 26651->27371 26652 7ff665fd13a4 33 API calls 26655 7ff665ffdc3a GetTempPathW 26652->26655 26657 7ff665ffef18 26653->26657 27369 7ff665ffabe8 33 API calls 3 library calls 26654->27369 26655->26766 26656 7ff665fe62dc 35 API calls 26656->26766 26665 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26657->26665 26662 7ff665ffee8d 26670 7ff665fd1fa0 31 API calls 26662->26670 26674 7ff665ffeea4 memcpy_s 26662->26674 26663 7ff665fd2520 SetWindowTextW 26663->26766 26667 7ff665ffef1e 26665->26667 26666 7ff66600bb8c 43 API calls 26666->26766 26675 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26667->26675 26669 7ff665ffe7f3 26669->26649 26669->26651 26673 7ff6660021d0 33 API calls 26669->26673 26686 7ff665ffe83b memcpy_s 26669->26686 26670->26674 26671 7ff665fd1fa0 31 API calls 26671->26649 26672 7ff665fd2034 33 API calls 26672->26766 26673->26686 26674->26671 26678 7ff665ffef24 26675->26678 26676 7ff665ffaa08 33 API calls 26676->26766 26685 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26678->26685 26679 7ff665ffef6c 27377 7ff665fd2004 33 API calls std::_Xinvalid_argument 26679->27377 26680 7ff665fd20b0 33 API calls 26680->26766 26681 7ff665fd1fa0 31 API calls 26681->26647 26682 7ff665ffef78 27379 7ff665fd2004 33 API calls std::_Xinvalid_argument 26682->27379 26683 7ff665fd4228 33 API calls 26683->26766 26684 7ff665fe3f30 54 API calls 26684->26766 26689 7ff665ffef2a 26685->26689 26693 7ff665fd20b0 33 API calls 26686->26693 26736 7ff665ffeb8f 26686->26736 26698 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26689->26698 26690 7ff665ffef72 27378 7ff665fd1f80 33 API calls 3 library calls 26690->27378 26692 7ff665ffef66 27376 7ff665fd1f80 33 API calls 3 library calls 26692->27376 26699 7ff665ffe963 26693->26699 26695 7ff665ffed40 26695->26682 26695->26690 26714 7ff665ffed3b memcpy_s 26695->26714 26718 7ff6660021d0 33 API calls 26695->26718 26697 7ff665ffec2a 26697->26679 26697->26692 26709 7ff665ffec72 memcpy_s 26697->26709 26697->26714 26716 7ff6660021d0 33 API calls 26697->26716 26707 7ff665ffef30 26698->26707 26708 7ff665ffef60 26699->26708 26715 7ff665fd129c 33 API calls 26699->26715 26702 7ff665ffd5e9 GetDlgItem 26711 7ff665fd2520 SetWindowTextW 26702->26711 26703 7ff665fedc2c 33 API calls 26703->26766 26705 7ff665ff99c8 31 API calls 26705->26766 26706 7ff665fe3d34 51 API calls 26706->26766 26719 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26707->26719 27375 7ff665fd704c 47 API calls memcpy_s 26708->27375 27283 7ff665fff4e0 26709->27283 26717 7ff665ffd608 SendMessageW 26711->26717 26714->26681 26720 7ff665ffe9a6 26715->26720 26716->26709 26717->26766 26718->26714 26723 7ff665ffef36 26719->26723 27365 7ff665fed22c 26720->27365 26721 7ff665fd2674 31 API calls 26721->26766 26727 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26723->26727 26725 7ff665fe5b60 53 API calls 26725->26766 26726 7ff665ffd63c SendMessageW 26726->26766 26728 7ff665ffef3c 26727->26728 26733 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26728->26733 26732 7ff665ffe9d1 26735 7ff665fd129c 33 API calls 26732->26735 26732->26736 26744 7ff665ffef48 26732->26744 26751 7ff665ffef4e 26732->26751 26759 7ff665fd1fa0 31 API calls 26732->26759 26762 7ff665ff13c4 CompareStringW 26732->26762 26767 7ff665fed22c 33 API calls 26732->26767 26737 7ff665ffef42 26733->26737 26735->26732 26736->26695 26736->26697 26738 7ff665ffef5a 26736->26738 26757 7ff665ffef54 26736->26757 26742 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26737->26742 26741 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26738->26741 26739 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26739->26738 26741->26708 26742->26744 26743 7ff665fe32a8 51 API calls 26743->26766 26747 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26744->26747 26745 7ff665fe5820 33 API calls 26745->26766 26746 7ff665fe5aa8 33 API calls 26746->26766 26747->26751 26748 7ff665fd8d04 33 API calls 26748->26766 26749 7ff665fde164 33 API calls 26749->26766 26750 7ff665fd250c SetDlgItemTextW 26750->26766 26755 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26751->26755 26754 7ff665fd1150 33 API calls 26754->26766 26755->26757 26757->26739 26758 7ff665fd1fa0 31 API calls 26758->26766 26759->26732 26760 7ff665fd129c 33 API calls 26760->26766 26762->26732 26763 7ff665ffdf99 EndDialog 26763->26766 26765 7ff665fe32bc 51 API calls 26765->26766 26766->26626 26766->26629 26766->26632 26766->26635 26766->26637 26766->26639 26766->26642 26766->26644 26766->26647 26766->26648 26766->26652 26766->26656 26766->26657 26766->26663 26766->26666 26766->26667 26766->26669 26766->26672 26766->26676 26766->26678 26766->26680 26766->26683 26766->26684 26766->26689 26766->26703 26766->26705 26766->26706 26766->26707 26766->26721 26766->26723 26766->26725 26766->26726 26766->26728 26766->26737 26766->26743 26766->26745 26766->26746 26766->26748 26766->26749 26766->26750 26766->26754 26766->26758 26766->26760 26766->26763 26766->26765 26768 7ff665ffdb21 MoveFileW 26766->26768 26772 7ff665fe2f58 56 API calls 26766->26772 27244 7ff665ff13c4 CompareStringW 26766->27244 27245 7ff665ffa440 26766->27245 27321 7ff665fecfa4 35 API calls _invalid_parameter_noinfo_noreturn 26766->27321 27322 7ff665ff95b4 33 API calls Concurrency::cancel_current_task 26766->27322 27323 7ff666000684 31 API calls _invalid_parameter_noinfo_noreturn 26766->27323 27324 7ff665fddf4c 47 API calls memcpy_s 26766->27324 27325 7ff665ffa834 33 API calls _invalid_parameter_noinfo_noreturn 26766->27325 27326 7ff665ff9518 33 API calls 26766->27326 27327 7ff665ffabe8 33 API calls 3 library calls 26766->27327 27328 7ff665fe7368 33 API calls 2 library calls 26766->27328 27329 7ff665fe4088 33 API calls 26766->27329 27330 7ff665fe65b0 33 API calls 3 library calls 26766->27330 27331 7ff665fe72cc 26766->27331 27335 7ff665fd1744 33 API calls 4 library calls 26766->27335 27336 7ff665fe31bc 26766->27336 27350 7ff665fe3ea0 FindClose 26766->27350 27351 7ff665ff13f4 CompareStringW 26766->27351 27352 7ff665ff9cd0 47 API calls 26766->27352 27353 7ff665ff87d8 51 API calls 3 library calls 26766->27353 27354 7ff665ffab54 33 API calls _handle_error 26766->27354 27355 7ff665fe7df4 26766->27355 27363 7ff665fe5b08 CompareStringW 26766->27363 27364 7ff665fe7eb0 47 API calls 26766->27364 26767->26732 26769 7ff665ffdb55 MoveFileExW 26768->26769 26770 7ff665ffdb70 26768->26770 26769->26770 26770->26766 26771 7ff665fd1fa0 31 API calls 26770->26771 26771->26770 26772->26766 26775 7ff665fff9a3 26774->26775 26776 7ff665fd20b0 33 API calls 26775->26776 26778 7ff665fff9b9 26776->26778 26777 7ff665fff9ee 27393 7ff665fde34c 26777->27393 26778->26777 26779 7ff665fd20b0 33 API calls 26778->26779 26779->26777 26781 7ff665fffa4b 27413 7ff665fde7a8 26781->27413 26785 7ff665fffa61 26786 7ff666002320 _handle_error 8 API calls 26785->26786 26787 7ff665ffbc52 26786->26787 26787->26409 28561 7ff665ff849c 26789->28561 26792 7ff665fff4b7 26795 7ff666002320 _handle_error 8 API calls 26792->26795 26793 7ff665fff3c7 GetWindow 26794 7ff665fff3e2 26793->26794 26794->26792 26797 7ff665fff3ee GetClassNameW 26794->26797 26799 7ff665fff417 GetWindowLongPtrW 26794->26799 26800 7ff665fff496 GetWindow 26794->26800 26796 7ff665ffbe9b 26795->26796 26796->26175 26796->26176 28566 7ff665ff13c4 CompareStringW 26797->28566 26799->26800 26801 7ff665fff429 SendMessageW 26799->26801 26800->26792 26800->26794 26801->26800 26802 7ff665fff445 GetObjectW 26801->26802 28567 7ff665ff8504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26802->28567 26804 7ff665fff461 28568 7ff665ff84cc 26804->28568 28572 7ff665ff8df4 16 API calls _handle_error 26804->28572 26807 7ff665fff479 SendMessageW DeleteObject 26807->26800 26809 7ff665fe6300 26808->26809 26815 7ff665fe638d 26808->26815 26810 7ff665fd13a4 33 API calls 26809->26810 26811 7ff665fe631b GetCurrentDirectoryW 26810->26811 26812 7ff665fe6341 26811->26812 26813 7ff665fd20b0 33 API calls 26812->26813 26814 7ff665fe634f 26813->26814 26814->26815 26816 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26814->26816 26815->26187 26817 7ff665fe63a9 26816->26817 26819 7ff665fd252a SetWindowTextW 26818->26819 26820 7ff665fd2527 26818->26820 26821 7ff66603e2e0 26819->26821 26820->26819 26822->26196 26824 7ff665fd2513 26823->26824 26825 7ff665fd2516 SetDlgItemTextW 26823->26825 26824->26825 26827 7ff665fd12d0 26826->26827 26828 7ff665fd139b 26826->26828 26831 7ff665fd1396 26827->26831 26832 7ff665fd1338 26827->26832 26835 7ff665fd12de memcpy_s 26827->26835 28576 7ff665fd2004 33 API calls std::_Xinvalid_argument 26828->28576 28575 7ff665fd1f80 33 API calls 3 library calls 26831->28575 26834 7ff6660021d0 33 API calls 26832->26834 26832->26835 26834->26835 26835->26231 26836->26266 26838 7ff665fe32bc 51 API calls 26837->26838 26839 7ff665fe32b1 26838->26839 26839->26276 26839->26294 26840->26276 26842 7ff665fd13a4 33 API calls 26841->26842 26843 7ff665fe6489 26842->26843 26844 7ff665fe648c GetModuleFileNameW 26843->26844 26847 7ff665fe64dc 26843->26847 26845 7ff665fe64de 26844->26845 26846 7ff665fe64a7 26844->26846 26845->26847 26846->26843 26848 7ff665fd129c 33 API calls 26847->26848 26850 7ff665fe6506 26848->26850 26849 7ff665fe653e 26849->26335 26850->26849 26851 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26850->26851 26852 7ff665fe6560 26851->26852 26853->26351 26855 7ff665fd20f6 26854->26855 26857 7ff665fd20cb memcpy_s 26854->26857 28577 7ff665fd1474 33 API calls 3 library calls 26855->28577 26857->26372 26858->26383 26859->26396 26860->26405 26861->26411 26862->26420 26864 7ff666003620 26863->26864 26864->26423 26865->26339 26867 7ff665fd1177 26866->26867 26868 7ff665fd2034 33 API calls 26867->26868 26869 7ff665fd1185 memcpy_s 26868->26869 26869->26354 26871 7ff665fd2085 26870->26871 26873 7ff665fd2059 memcpy_s 26870->26873 28578 7ff665fd15b8 33 API calls 3 library calls 26871->28578 26873->26324 26875 7ff666002329 26874->26875 26876 7ff665ffc350 26875->26876 26877 7ff666002550 IsProcessorFeaturePresent 26875->26877 26878 7ff666002568 26877->26878 28579 7ff666002744 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 26878->28579 26880 7ff66600257b 28580 7ff666002510 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 26880->28580 28581 7ff66600783c 31 API calls 3 library calls 26883->28581 26885 7ff66600791d 28582 7ff666007934 16 API calls abort 26885->28582 26888->26376 26889->26443 26890->26468 26891->26483 26892->26495 26918 7ff665fe3e28 26893->26918 26897 7ff665fea519 26898 7ff665fea589 26897->26898 26916 7ff665fea56a SetDlgItemTextW 26897->26916 26939 7ff665fe9800 26897->26939 26924 7ff665fe9408 26898->26924 26901 7ff665fea6f2 GetSystemMetrics GetWindow 26903 7ff665fea821 26901->26903 26904 7ff665fea71d 26901->26904 26902 7ff665fea603 26905 7ff665fea6c2 26902->26905 26906 7ff665fea60c GetWindowLongPtrW 26902->26906 26908 7ff666002320 _handle_error 8 API calls 26903->26908 26904->26903 26915 7ff665fea73e GetWindowRect 26904->26915 26917 7ff665fea800 GetWindow 26904->26917 26943 7ff665fe95a8 26905->26943 26909 7ff66603e2c0 26906->26909 26913 7ff665fea830 26908->26913 26910 7ff665fea6aa GetWindowRect 26909->26910 26910->26905 26913->26508 26914 7ff665fea6e5 SetWindowTextW 26914->26901 26915->26904 26916->26897 26917->26903 26917->26904 26919 7ff665fe3e4d _snwprintf 26918->26919 26952 7ff666009ef0 26919->26952 26922 7ff665ff0f68 WideCharToMultiByte 26923 7ff665ff0faa 26922->26923 26923->26897 26925 7ff665fe95a8 47 API calls 26924->26925 26928 7ff665fe944f 26925->26928 26926 7ff666002320 _handle_error 8 API calls 26927 7ff665fe958e GetWindowRect GetClientRect 26926->26927 26927->26901 26927->26902 26929 7ff665fd129c 33 API calls 26928->26929 26935 7ff665fe955a 26928->26935 26930 7ff665fe949c 26929->26930 26931 7ff665fd129c 33 API calls 26930->26931 26938 7ff665fe95a1 26930->26938 26934 7ff665fe9514 26931->26934 26932 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26933 7ff665fe95a7 26932->26933 26934->26935 26936 7ff665fe959c 26934->26936 26935->26926 26937 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 26936->26937 26937->26938 26938->26932 26940 7ff665fe9840 26939->26940 26942 7ff665fe9869 26939->26942 26991 7ff66600a270 31 API calls 2 library calls 26940->26991 26942->26897 26944 7ff665fe3e28 swprintf 46 API calls 26943->26944 26945 7ff665fe95eb 26944->26945 26946 7ff665ff0f68 WideCharToMultiByte 26945->26946 26947 7ff665fe9603 26946->26947 26948 7ff665fe9800 31 API calls 26947->26948 26949 7ff665fe961b 26948->26949 26950 7ff666002320 _handle_error 8 API calls 26949->26950 26951 7ff665fe962b 26950->26951 26951->26901 26951->26914 26953 7ff666009f36 26952->26953 26954 7ff666009f4e 26952->26954 26979 7ff66600d69c 15 API calls memcpy_s 26953->26979 26954->26953 26955 7ff666009f58 26954->26955 26981 7ff666007ef0 35 API calls 2 library calls 26955->26981 26958 7ff666009f3b 26980 7ff6660078e4 31 API calls _invalid_parameter_noinfo 26958->26980 26960 7ff666002320 _handle_error 8 API calls 26962 7ff665fe3e69 26960->26962 26961 7ff666009f69 memcpy_s 26982 7ff666007e70 15 API calls memcpy_s 26961->26982 26962->26922 26964 7ff666009fd4 26983 7ff6660082f8 46 API calls 3 library calls 26964->26983 26966 7ff666009fdd 26967 7ff666009fe5 26966->26967 26970 7ff66600a014 26966->26970 26984 7ff66600d90c 26967->26984 26969 7ff66600a06c 26976 7ff66600d90c __free_lconv_mon 15 API calls 26969->26976 26970->26969 26971 7ff66600a092 26970->26971 26972 7ff66600a023 26970->26972 26975 7ff66600a01a 26970->26975 26971->26969 26973 7ff66600a09c 26971->26973 26974 7ff66600d90c __free_lconv_mon 15 API calls 26972->26974 26977 7ff66600d90c __free_lconv_mon 15 API calls 26973->26977 26978 7ff666009f46 26974->26978 26975->26969 26975->26972 26976->26978 26977->26978 26978->26960 26979->26958 26980->26978 26981->26961 26982->26964 26983->26966 26985 7ff66600d911 RtlFreeHeap 26984->26985 26989 7ff66600d941 __free_lconv_mon 26984->26989 26986 7ff66600d92c 26985->26986 26985->26989 26990 7ff66600d69c 15 API calls memcpy_s 26986->26990 26988 7ff66600d931 GetLastError 26988->26989 26989->26978 26990->26988 26991->26942 27004 7ff665fd13a4 26992->27004 26995 7ff665fd2494 26996 7ff665fd129c 33 API calls 26995->26996 26997 7ff665fd24a2 26996->26997 26998 7ff665fd24dd 26997->26998 27001 7ff665fd2505 26997->27001 26999 7ff666002320 _handle_error 8 API calls 26998->26999 27000 7ff665fd24f3 26999->27000 27000->26517 27002 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27001->27002 27003 7ff665fd250a 27002->27003 27005 7ff665fd13ad 27004->27005 27013 7ff665fd142d GetWindowTextW 27004->27013 27006 7ff665fd143d 27005->27006 27008 7ff665fd13ce 27005->27008 27024 7ff665fd2018 33 API calls std::_Xinvalid_argument 27006->27024 27011 7ff665fd13db memcpy_s 27008->27011 27014 7ff6660021d0 27008->27014 27023 7ff665fd197c 31 API calls _invalid_parameter_noinfo_noreturn 27011->27023 27013->26995 27016 7ff6660021db 27014->27016 27015 7ff6660021f4 27015->27011 27016->27015 27017 7ff66600bbc0 memcpy_s 2 API calls 27016->27017 27018 7ff6660021fa 27016->27018 27017->27016 27021 7ff666002205 27018->27021 27025 7ff666002f7c RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc std::_Xinvalid_argument 27018->27025 27026 7ff665fd1f80 33 API calls 3 library calls 27021->27026 27022 7ff66600220b 27023->27013 27025->27021 27026->27022 27027->26533 27029->26542 27037 7ff665fe9638 27030->27037 27033 7ff665fe97d9 27035 7ff666002320 _handle_error 8 API calls 27033->27035 27034 7ff665fe9800 31 API calls 27034->27033 27036 7ff665fe97f2 27035->27036 27036->26554 27036->26555 27038 7ff665fe9692 27037->27038 27046 7ff665fe9730 27037->27046 27039 7ff665ff0f68 WideCharToMultiByte 27038->27039 27042 7ff665fe96c0 27038->27042 27039->27042 27040 7ff666002320 _handle_error 8 API calls 27041 7ff665fe9764 27040->27041 27041->27033 27041->27034 27045 7ff665fe96ef 27042->27045 27047 7ff665feaa88 45 API calls _snwprintf 27042->27047 27048 7ff66600a270 31 API calls 2 library calls 27045->27048 27046->27040 27047->27045 27048->27046 27065 7ff665fed4d0 27049->27065 27053 7ff666009ef0 swprintf 46 API calls 27054 7ff665fed8e5 _snwprintf 27053->27054 27054->27053 27061 7ff665fed974 27054->27061 27079 7ff665fd9d78 33 API calls 27054->27079 27055 7ff665fed9a3 27057 7ff665feda17 27055->27057 27060 7ff665feda3f 27055->27060 27058 7ff666002320 _handle_error 8 API calls 27057->27058 27059 7ff665feda2b 27058->27059 27059->26560 27062 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27060->27062 27061->27055 27080 7ff665fd9d78 33 API calls 27061->27080 27063 7ff665feda44 27062->27063 27066 7ff665fed665 27065->27066 27068 7ff665fed502 27065->27068 27069 7ff665fecb80 27066->27069 27067 7ff665fd1744 33 API calls 27067->27068 27068->27066 27068->27067 27070 7ff665fecc80 27069->27070 27071 7ff665fecbb6 27069->27071 27082 7ff665fd2004 33 API calls std::_Xinvalid_argument 27070->27082 27074 7ff665fecc20 27071->27074 27075 7ff665fecc7b 27071->27075 27077 7ff665fecbc6 27071->27077 27074->27077 27078 7ff6660021d0 33 API calls 27074->27078 27081 7ff665fd1f80 33 API calls 3 library calls 27075->27081 27077->27054 27078->27077 27079->27054 27080->27055 27081->27070 27084 7ff665ffae80 GetDlgItem 27083->27084 27085 7ff665ffae3c GetMessageW 27083->27085 27084->26563 27084->26564 27086 7ff665ffae5b IsDialogMessageW 27085->27086 27087 7ff665ffae6a TranslateMessage DispatchMessageW 27085->27087 27086->27084 27086->27087 27087->27084 27090 7ff665fe36b3 27088->27090 27089 7ff665fe36e0 27108 7ff665fe32bc 27089->27108 27090->27089 27092 7ff665fe36cc CreateDirectoryW 27090->27092 27092->27089 27094 7ff665fe377d 27092->27094 27096 7ff665fe378d 27094->27096 27195 7ff665fe3d34 27094->27195 27095 7ff665fe3791 GetLastError 27095->27096 27099 7ff666002320 _handle_error 8 API calls 27096->27099 27101 7ff665fe37b9 27099->27101 27101->26578 27102 7ff665fe3720 CreateDirectoryW 27103 7ff665fe373b 27102->27103 27104 7ff665fe3774 27103->27104 27105 7ff665fe37ce 27103->27105 27104->27094 27104->27095 27106 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27105->27106 27107 7ff665fe37d3 27106->27107 27109 7ff665fe32e4 27108->27109 27110 7ff665fe32e7 GetFileAttributesW 27108->27110 27109->27110 27111 7ff665fe3375 27110->27111 27112 7ff665fe32f8 27110->27112 27113 7ff666002320 _handle_error 8 API calls 27111->27113 27114 7ff665fe6a0c 49 API calls 27112->27114 27115 7ff665fe3389 27113->27115 27116 7ff665fe331f 27114->27116 27115->27095 27122 7ff665fe6a0c 27115->27122 27117 7ff665fe3323 GetFileAttributesW 27116->27117 27118 7ff665fe333c 27116->27118 27117->27118 27118->27111 27119 7ff665fe3399 27118->27119 27120 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27119->27120 27121 7ff665fe339e 27120->27121 27123 7ff665fe6a4b 27122->27123 27137 7ff665fe6a44 27122->27137 27126 7ff665fd129c 33 API calls 27123->27126 27124 7ff666002320 _handle_error 8 API calls 27125 7ff665fe371c 27124->27125 27125->27102 27125->27103 27127 7ff665fe6a76 27126->27127 27128 7ff665fe6cc7 27127->27128 27129 7ff665fe6a96 27127->27129 27130 7ff665fe62dc 35 API calls 27128->27130 27131 7ff665fe6ab0 27129->27131 27157 7ff665fe6b49 27129->27157 27135 7ff665fe6ce6 27130->27135 27132 7ff665fe70ab 27131->27132 27209 7ff665fdc098 33 API calls 2 library calls 27131->27209 27217 7ff665fd2004 33 API calls std::_Xinvalid_argument 27132->27217 27134 7ff665fe6eef 27139 7ff665fe70cf 27134->27139 27214 7ff665fdc098 33 API calls 2 library calls 27134->27214 27135->27134 27140 7ff665fe6d1b 27135->27140 27192 7ff665fe6b44 27135->27192 27136 7ff665fe70b1 27147 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27136->27147 27137->27124 27220 7ff665fd2004 33 API calls std::_Xinvalid_argument 27139->27220 27141 7ff665fe70bd 27140->27141 27212 7ff665fdc098 33 API calls 2 library calls 27140->27212 27218 7ff665fd2004 33 API calls std::_Xinvalid_argument 27141->27218 27142 7ff665fe70d5 27148 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27142->27148 27144 7ff665fe6b03 27158 7ff665fd1fa0 31 API calls 27144->27158 27161 7ff665fe6b15 memcpy_s 27144->27161 27155 7ff665fe70b7 27147->27155 27156 7ff665fe70db 27148->27156 27149 7ff665fe70a6 27154 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27149->27154 27150 7ff665fe6f56 27215 7ff665fd11cc 33 API calls memcpy_s 27150->27215 27152 7ff665fe70c3 27164 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27152->27164 27153 7ff665fd1fa0 31 API calls 27153->27192 27154->27132 27165 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27155->27165 27167 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27156->27167 27160 7ff665fd129c 33 API calls 27157->27160 27157->27192 27158->27161 27168 7ff665fe6bbe 27160->27168 27161->27153 27162 7ff665fe6f69 27216 7ff665fe57ac 33 API calls memcpy_s 27162->27216 27170 7ff665fe70c9 27164->27170 27165->27141 27166 7ff665fd1fa0 31 API calls 27177 7ff665fe6df5 27166->27177 27172 7ff665fe70e1 27167->27172 27210 7ff665fe5820 33 API calls 27168->27210 27219 7ff665fd704c 47 API calls memcpy_s 27170->27219 27171 7ff665fe6d76 memcpy_s 27171->27152 27171->27166 27173 7ff665fe6bd3 27211 7ff665fde164 33 API calls 2 library calls 27173->27211 27176 7ff665fd1fa0 31 API calls 27179 7ff665fe6fec 27176->27179 27180 7ff665fe6e21 27177->27180 27213 7ff665fd1744 33 API calls 4 library calls 27177->27213 27178 7ff665fe6f79 memcpy_s 27178->27156 27178->27176 27181 7ff665fd1fa0 31 API calls 27179->27181 27180->27170 27186 7ff665fd129c 33 API calls 27180->27186 27184 7ff665fe6ff6 27181->27184 27183 7ff665fd1fa0 31 API calls 27188 7ff665fe6c6d 27183->27188 27185 7ff665fd1fa0 31 API calls 27184->27185 27185->27192 27190 7ff665fe6ec2 27186->27190 27187 7ff665fe6be9 memcpy_s 27187->27155 27187->27183 27189 7ff665fd1fa0 31 API calls 27188->27189 27189->27192 27191 7ff665fd2034 33 API calls 27190->27191 27193 7ff665fe6edf 27191->27193 27192->27136 27192->27137 27192->27142 27192->27149 27194 7ff665fd1fa0 31 API calls 27193->27194 27194->27192 27196 7ff665fe3d5e SetFileAttributesW 27195->27196 27197 7ff665fe3d5b 27195->27197 27198 7ff665fe3d74 27196->27198 27199 7ff665fe3df5 27196->27199 27197->27196 27201 7ff665fe6a0c 49 API calls 27198->27201 27200 7ff666002320 _handle_error 8 API calls 27199->27200 27203 7ff665fe3e0a 27200->27203 27202 7ff665fe3d99 27201->27202 27204 7ff665fe3d9d SetFileAttributesW 27202->27204 27205 7ff665fe3dbc 27202->27205 27203->27096 27204->27205 27205->27199 27206 7ff665fe3e1a 27205->27206 27207 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27206->27207 27208 7ff665fe3e1f 27207->27208 27209->27144 27210->27173 27211->27187 27212->27171 27213->27180 27214->27150 27215->27162 27216->27178 27219->27139 27222 7ff665fd713b 27221->27222 27223 7ff665fd7206 27221->27223 27229 7ff665fd714b memcpy_s 27222->27229 27230 7ff665fd3f48 33 API calls 2 library calls 27222->27230 27231 7ff665fd704c 47 API calls memcpy_s 27223->27231 27226 7ff665fd7273 27226->26598 27227 7ff665fd720b 27227->27226 27232 7ff665fd889c 8 API calls memcpy_s 27227->27232 27229->26598 27230->27229 27231->27227 27232->27227 27234 7ff665fe20ea 27233->27234 27235 7ff665fe2102 27233->27235 27234->27235 27237 7ff665fe20f6 CloseHandle 27234->27237 27236 7ff665fe2126 27235->27236 27239 7ff665fdb544 99 API calls 27235->27239 27236->26622 27237->27235 27239->27236 27241 7ff665ffaa2f 27240->27241 27243 7ff665ffaa36 27240->27243 27241->26766 27243->27241 27380 7ff665fd1744 33 API calls 4 library calls 27243->27380 27244->26766 27246 7ff665ffa47f 27245->27246 27268 7ff665ffa706 27245->27268 27381 7ff665ffcdf8 33 API calls 27246->27381 27248 7ff666002320 _handle_error 8 API calls 27250 7ff665ffa717 27248->27250 27249 7ff665ffa49e 27251 7ff665fd129c 33 API calls 27249->27251 27250->26702 27252 7ff665ffa4de 27251->27252 27253 7ff665fd129c 33 API calls 27252->27253 27254 7ff665ffa517 27253->27254 27255 7ff665fd129c 33 API calls 27254->27255 27256 7ff665ffa54a 27255->27256 27382 7ff665ffa834 33 API calls _invalid_parameter_noinfo_noreturn 27256->27382 27258 7ff665ffa734 27259 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27258->27259 27260 7ff665ffa73a 27259->27260 27262 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27260->27262 27261 7ff665ffa573 27261->27258 27261->27260 27263 7ff665ffa740 27261->27263 27264 7ff665fd20b0 33 API calls 27261->27264 27267 7ff665ffa685 27261->27267 27262->27263 27265 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27263->27265 27264->27267 27266 7ff665ffa746 27265->27266 27270 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27266->27270 27267->27266 27267->27268 27269 7ff665ffa72f 27267->27269 27268->27248 27271 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27269->27271 27272 7ff665ffa74c 27270->27272 27271->27258 27273 7ff665fd255c 61 API calls 27272->27273 27274 7ff665ffa795 27273->27274 27275 7ff665ffa7b1 27274->27275 27276 7ff665ffa801 SetDlgItemTextW 27274->27276 27280 7ff665ffa7a1 27274->27280 27277 7ff666002320 _handle_error 8 API calls 27275->27277 27276->27275 27278 7ff665ffa827 27277->27278 27278->26702 27279 7ff665ffa7ad 27279->27275 27281 7ff665ffa7b7 EndDialog 27279->27281 27280->27275 27280->27279 27383 7ff665febb00 102 API calls 27280->27383 27281->27275 27288 7ff665fff529 memcpy_s 27283->27288 27300 7ff665fff87d 27283->27300 27284 7ff665fd1fa0 31 API calls 27285 7ff665fff89c 27284->27285 27286 7ff666002320 _handle_error 8 API calls 27285->27286 27287 7ff665fff8a8 27286->27287 27287->26714 27289 7ff665fff684 27288->27289 27384 7ff665ff13c4 CompareStringW 27288->27384 27291 7ff665fd129c 33 API calls 27289->27291 27292 7ff665fff6c0 27291->27292 27293 7ff665fe32a8 51 API calls 27292->27293 27294 7ff665fff6ca 27293->27294 27295 7ff665fd1fa0 31 API calls 27294->27295 27298 7ff665fff6d5 27295->27298 27296 7ff665fff742 ShellExecuteExW 27297 7ff665fff846 27296->27297 27302 7ff665fff755 27296->27302 27297->27300 27304 7ff665fff8fb 27297->27304 27298->27296 27299 7ff665fd129c 33 API calls 27298->27299 27303 7ff665fff717 27299->27303 27300->27284 27301 7ff665fff78e 27386 7ff665fffe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 27301->27386 27302->27301 27305 7ff665fff7e3 CloseHandle 27302->27305 27309 7ff665fff781 ShowWindow 27302->27309 27385 7ff665fe5b60 53 API calls 2 library calls 27303->27385 27307 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27304->27307 27308 7ff665fff7f2 27305->27308 27314 7ff665fff801 27305->27314 27312 7ff665fff900 27307->27312 27387 7ff665ff13c4 CompareStringW 27308->27387 27309->27301 27311 7ff665fff725 27316 7ff665fd1fa0 31 API calls 27311->27316 27314->27297 27317 7ff665fff837 ShowWindow 27314->27317 27315 7ff665fff7a6 27315->27305 27319 7ff665fff7b4 GetExitCodeProcess 27315->27319 27318 7ff665fff72f 27316->27318 27317->27297 27318->27296 27319->27305 27320 7ff665fff7c7 27319->27320 27320->27305 27321->26766 27322->26766 27323->26766 27324->26766 27325->26766 27326->26766 27327->26766 27328->26766 27329->26766 27330->26766 27332 7ff665fe72ea 27331->27332 27388 7ff665fdb3a8 27332->27388 27335->26766 27337 7ff665fe31e4 27336->27337 27338 7ff665fe31e7 DeleteFileW 27336->27338 27337->27338 27339 7ff665fe327c 27338->27339 27340 7ff665fe31fd 27338->27340 27342 7ff666002320 _handle_error 8 API calls 27339->27342 27341 7ff665fe6a0c 49 API calls 27340->27341 27343 7ff665fe3222 27341->27343 27344 7ff665fe3291 27342->27344 27345 7ff665fe3243 27343->27345 27346 7ff665fe3226 DeleteFileW 27343->27346 27344->26766 27345->27339 27347 7ff665fe32a1 27345->27347 27346->27345 27348 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27347->27348 27349 7ff665fe32a6 27348->27349 27351->26766 27352->26766 27353->26766 27354->26766 27356 7ff665fe7e0c 27355->27356 27357 7ff665fe7e23 27356->27357 27358 7ff665fe7e55 27356->27358 27361 7ff665fd129c 33 API calls 27357->27361 27392 7ff665fd704c 47 API calls memcpy_s 27358->27392 27360 7ff665fe7e5a 27362 7ff665fe7e47 27361->27362 27362->26766 27363->26766 27364->26766 27367 7ff665fed25e 27365->27367 27366 7ff665fed292 27366->26732 27367->27366 27368 7ff665fd1744 33 API calls 27367->27368 27368->27367 27369->26662 27370->26651 27372->26632 27373->26635 27374->26637 27375->26692 27376->26679 27378->26682 27380->27243 27381->27249 27382->27261 27383->27279 27384->27289 27385->27311 27386->27315 27387->27314 27391 7ff665fdb3f2 memcpy_s 27388->27391 27389 7ff666002320 _handle_error 8 API calls 27390 7ff665fdb4b6 27389->27390 27390->26766 27391->27389 27392->27360 27449 7ff665fe86ec 27393->27449 27395 7ff665fde3c4 27455 7ff665fde600 27395->27455 27397 7ff665fde454 27398 7ff665fde4d4 27397->27398 27399 7ff665fde549 27397->27399 27400 7ff6660021d0 33 API calls 27398->27400 27401 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27399->27401 27402 7ff665fde4f0 27400->27402 27409 7ff665fde54e 27401->27409 27461 7ff665ff3148 102 API calls 27402->27461 27404 7ff665fde51d 27405 7ff666002320 _handle_error 8 API calls 27404->27405 27406 7ff665fde52d 27405->27406 27406->26781 27407 7ff665fe18c2 27408 7ff665fe190d 27407->27408 27411 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27407->27411 27408->26781 27409->27407 27409->27408 27410 7ff665fd1fa0 31 API calls 27409->27410 27410->27409 27412 7ff665fe193b 27411->27412 27414 7ff665fde7ea 27413->27414 27415 7ff665fde864 27414->27415 27417 7ff665fde8a1 27414->27417 27462 7ff665fe3ec8 27414->27462 27415->27417 27418 7ff665fde993 27415->27418 27423 7ff665fde900 27417->27423 27469 7ff665fdf578 27417->27469 27419 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27418->27419 27422 7ff665fde998 27419->27422 27421 7ff666002320 _handle_error 8 API calls 27424 7ff665fde97e 27421->27424 27426 7ff665fde955 27423->27426 27505 7ff665fd28a4 82 API calls 2 library calls 27423->27505 27427 7ff665fde578 27424->27427 27426->27421 28547 7ff665fe15d8 27427->28547 27430 7ff665fde59e 27432 7ff665fd1fa0 31 API calls 27430->27432 27431 7ff665ff1870 108 API calls 27431->27430 27433 7ff665fde5b7 27432->27433 27434 7ff665fd1fa0 31 API calls 27433->27434 27435 7ff665fde5c3 27434->27435 27436 7ff665fd1fa0 31 API calls 27435->27436 27437 7ff665fde5cf 27436->27437 27438 7ff665fe878c 108 API calls 27437->27438 27439 7ff665fde5db 27438->27439 27440 7ff665fd1fa0 31 API calls 27439->27440 27441 7ff665fde5e4 27440->27441 27442 7ff665fd1fa0 31 API calls 27441->27442 27445 7ff665fde5ed 27442->27445 27443 7ff665fe18c2 27444 7ff665fe190d 27443->27444 27447 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27443->27447 27444->26785 27445->27443 27445->27444 27446 7ff665fd1fa0 31 API calls 27445->27446 27446->27445 27448 7ff665fe193b 27447->27448 27450 7ff665fe870a 27449->27450 27451 7ff6660021d0 33 API calls 27450->27451 27452 7ff665fe872f 27451->27452 27453 7ff6660021d0 33 API calls 27452->27453 27454 7ff665fe8759 27453->27454 27454->27395 27456 7ff665fde627 27455->27456 27459 7ff665fde62c memcpy_s 27455->27459 27457 7ff665fd1fa0 31 API calls 27456->27457 27457->27459 27458 7ff665fd1fa0 31 API calls 27460 7ff665fde668 memcpy_s 27458->27460 27459->27458 27459->27460 27460->27397 27461->27404 27463 7ff665fe72cc 8 API calls 27462->27463 27464 7ff665fe3ee1 27463->27464 27465 7ff665fe3f0f 27464->27465 27506 7ff665fe40bc 27464->27506 27465->27414 27468 7ff665fe3efa FindClose 27468->27465 27470 7ff665fdf598 _snwprintf 27469->27470 27545 7ff665fd2950 27470->27545 27473 7ff665fdf5cc 27477 7ff665fdf5fc 27473->27477 27560 7ff665fd33e4 27473->27560 27476 7ff665fdf5f8 27476->27477 27592 7ff665fd3ad8 27476->27592 27811 7ff665fd2c54 27477->27811 27484 7ff665fd8d04 33 API calls 27486 7ff665fdf662 27484->27486 27831 7ff665fe7918 48 API calls 2 library calls 27486->27831 27488 7ff665fdf677 27490 7ff665fe3ec8 55 API calls 27488->27490 27494 7ff665fdf6ad 27490->27494 27491 7ff665fdf842 27491->27477 27623 7ff665fd69f8 27491->27623 27634 7ff665fdf930 27491->27634 27497 7ff665fdf89a 27494->27497 27498 7ff665fdf74d 27494->27498 27502 7ff665fe3ec8 55 API calls 27494->27502 27832 7ff665fe7918 48 API calls 2 library calls 27494->27832 27500 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27497->27500 27498->27497 27499 7ff665fdf7cb 27498->27499 27501 7ff665fdf895 27498->27501 27602 7ff665fdf8a4 27499->27602 27504 7ff665fdf8a0 27500->27504 27503 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27501->27503 27502->27494 27503->27497 27505->27426 27507 7ff665fe41d2 FindNextFileW 27506->27507 27508 7ff665fe40f9 FindFirstFileW 27506->27508 27510 7ff665fe41f3 27507->27510 27511 7ff665fe41e1 GetLastError 27507->27511 27508->27510 27512 7ff665fe411e 27508->27512 27513 7ff665fe4211 27510->27513 27516 7ff665fd20b0 33 API calls 27510->27516 27530 7ff665fe41c0 27511->27530 27514 7ff665fe6a0c 49 API calls 27512->27514 27521 7ff665fd129c 33 API calls 27513->27521 27515 7ff665fe4144 27514->27515 27518 7ff665fe4167 27515->27518 27519 7ff665fe4148 FindFirstFileW 27515->27519 27516->27513 27517 7ff666002320 _handle_error 8 API calls 27520 7ff665fe3ef4 27517->27520 27518->27510 27523 7ff665fe41af GetLastError 27518->27523 27525 7ff665fe4314 27518->27525 27519->27518 27520->27465 27520->27468 27522 7ff665fe423b 27521->27522 27532 7ff665fe8090 27522->27532 27523->27530 27527 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27525->27527 27528 7ff665fe431a 27527->27528 27529 7ff665fe430f 27531 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27529->27531 27530->27517 27531->27525 27533 7ff665fe80a5 27532->27533 27536 7ff665fe8188 27533->27536 27535 7ff665fe4249 27535->27529 27535->27530 27537 7ff665fe8326 27536->27537 27540 7ff665fe81ba 27536->27540 27544 7ff665fd704c 47 API calls memcpy_s 27537->27544 27539 7ff665fe832b 27542 7ff665fe81d4 memcpy_s 27540->27542 27543 7ff665fe58a4 33 API calls 2 library calls 27540->27543 27542->27535 27543->27542 27544->27539 27546 7ff665fd296c 27545->27546 27547 7ff665fe86ec 33 API calls 27546->27547 27548 7ff665fd298d 27547->27548 27549 7ff6660021d0 33 API calls 27548->27549 27552 7ff665fd2ac2 27548->27552 27550 7ff665fd2ab0 27549->27550 27550->27552 27833 7ff665fd91c8 27550->27833 27840 7ff665fe4d04 27552->27840 27555 7ff665fe2ca8 27872 7ff665fe24c0 27555->27872 27557 7ff665fe2cc5 27557->27473 27891 7ff665fe28d0 27560->27891 27561 7ff665fd3674 27910 7ff665fd28a4 82 API calls 2 library calls 27561->27910 27562 7ff665fd3431 memcpy_s 27570 7ff665fd344e 27562->27570 27573 7ff665fd3601 27562->27573 27896 7ff665fe2bb0 27562->27896 27564 7ff665fd69f8 141 API calls 27566 7ff665fd3682 27564->27566 27566->27564 27567 7ff665fd370c 27566->27567 27566->27573 27584 7ff665fe2aa0 101 API calls 27566->27584 27571 7ff665fd3740 27567->27571 27567->27573 27911 7ff665fd28a4 82 API calls 2 library calls 27567->27911 27569 7ff665fd35cb 27569->27570 27572 7ff665fd35d7 27569->27572 27570->27561 27570->27566 27571->27573 27574 7ff665fd384d 27571->27574 27586 7ff665fe2bb0 101 API calls 27571->27586 27572->27573 27575 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27572->27575 27573->27476 27574->27573 27577 7ff665fd20b0 33 API calls 27574->27577 27578 7ff665fd3891 27575->27578 27576 7ff665fd34eb 27576->27569 27905 7ff665fe2aa0 27576->27905 27577->27573 27578->27476 27580 7ff665fd69f8 141 API calls 27581 7ff665fd378e 27580->27581 27581->27580 27582 7ff665fd3803 27581->27582 27587 7ff665fe2aa0 101 API calls 27581->27587 27591 7ff665fe2aa0 101 API calls 27582->27591 27583 7ff665fe28d0 104 API calls 27583->27576 27584->27566 27585 7ff665fe28d0 104 API calls 27585->27569 27586->27581 27587->27581 27591->27574 27593 7ff665fd3b55 27592->27593 27594 7ff665fd3af9 27592->27594 27595 7ff666002320 _handle_error 8 API calls 27593->27595 27923 7ff665fd3378 27594->27923 27597 7ff665fd3b67 27595->27597 27597->27484 27597->27499 27599 7ff665fd3b6c 27600 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27599->27600 27601 7ff665fd3b71 27600->27601 28159 7ff665fe886c 27602->28159 27604 7ff665fdf8ba 28163 7ff665feef60 GetSystemTime SystemTimeToFileTime 27604->28163 27607 7ff665ff0994 27608 7ff666000340 27607->27608 27609 7ff665fe7df4 47 API calls 27608->27609 27610 7ff666000373 27609->27610 27611 7ff665feaae0 48 API calls 27610->27611 27612 7ff666000387 27611->27612 27613 7ff665feda98 48 API calls 27612->27613 27614 7ff666000397 27613->27614 27615 7ff665fd1fa0 31 API calls 27614->27615 27616 7ff6660003a2 27615->27616 28172 7ff665fffc68 27616->28172 27624 7ff665fd6a0e 27623->27624 27625 7ff665fd6a0a 27623->27625 27633 7ff665fe2bb0 101 API calls 27624->27633 27625->27491 27626 7ff665fd6a1b 27627 7ff665fd6a3e 27626->27627 27628 7ff665fd6a2f 27626->27628 28267 7ff665fd5130 139 API calls 2 library calls 27627->28267 27628->27625 28184 7ff665fd5e24 27628->28184 27631 7ff665fd6a3c 27631->27625 28268 7ff665fd466c 82 API calls 27631->28268 27633->27626 27635 7ff665fdf978 27634->27635 27641 7ff665fdf9b0 27635->27641 27647 7ff665fdfa34 27635->27647 28390 7ff665ff612c 146 API calls 3 library calls 27635->28390 27636 7ff665fe1189 27639 7ff665fe118e 27636->27639 27640 7ff665fe11e1 27636->27640 27638 7ff666002320 _handle_error 8 API calls 27642 7ff665fe11c4 27638->27642 27639->27647 28438 7ff665fddd08 179 API calls 27639->28438 27640->27647 28439 7ff665ff612c 146 API calls 3 library calls 27640->28439 27641->27636 27644 7ff665fdf9d0 27641->27644 27641->27647 27642->27491 27644->27647 28305 7ff665fd9bb0 27644->28305 27647->27638 27648 7ff665fdfad6 28318 7ff665fe5ef8 27648->28318 27652 7ff665fdfb7a 27812 7ff665fd2c74 27811->27812 27815 7ff665fd2c88 27811->27815 27812->27815 28526 7ff665fd2d80 108 API calls _invalid_parameter_noinfo_noreturn 27812->28526 27813 7ff665fd1fa0 31 API calls 27817 7ff665fd2ca1 27813->27817 27815->27813 27819 7ff665fd2d64 27817->27819 28527 7ff665fd3090 31 API calls _invalid_parameter_noinfo_noreturn 27817->28527 27818 7ff665fd2d08 28528 7ff665fd3090 31 API calls _invalid_parameter_noinfo_noreturn 27818->28528 27820 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27819->27820 27822 7ff665fd2d7c 27820->27822 27823 7ff665fd2d14 27824 7ff665fd1fa0 31 API calls 27823->27824 27825 7ff665fd2d20 27824->27825 28529 7ff665fe878c 27825->28529 27831->27488 27832->27494 27850 7ff665fe56a4 27833->27850 27835 7ff665fd91df 27853 7ff665feb788 27835->27853 27839 7ff665fd9383 27839->27552 27841 7ff665fe4d32 memcpy_s 27840->27841 27868 7ff665fe4bac 27841->27868 27843 7ff665fe4d54 27844 7ff665fe4d90 27843->27844 27846 7ff665fe4dae 27843->27846 27845 7ff666002320 _handle_error 8 API calls 27844->27845 27847 7ff665fd2b32 27845->27847 27848 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27846->27848 27847->27473 27847->27555 27849 7ff665fe4db3 27848->27849 27859 7ff665fe56e8 27850->27859 27854 7ff665fd13a4 33 API calls 27853->27854 27855 7ff665fd9365 27854->27855 27856 7ff665fd9a28 27855->27856 27857 7ff665fe56e8 2 API calls 27856->27857 27858 7ff665fd9a36 27857->27858 27858->27839 27860 7ff665fe56fe memcpy_s 27859->27860 27863 7ff665feeba4 27860->27863 27866 7ff665feeb58 GetCurrentProcess GetProcessAffinityMask 27863->27866 27867 7ff665fe56de 27866->27867 27867->27835 27869 7ff665fe4c27 27868->27869 27871 7ff665fe4c2f memcpy_s 27868->27871 27870 7ff665fd1fa0 31 API calls 27869->27870 27870->27871 27871->27843 27873 7ff665fe24fd CreateFileW 27872->27873 27875 7ff665fe25ae GetLastError 27873->27875 27884 7ff665fe266e 27873->27884 27876 7ff665fe6a0c 49 API calls 27875->27876 27877 7ff665fe25dc 27876->27877 27878 7ff665fe25e0 CreateFileW GetLastError 27877->27878 27883 7ff665fe262c 27877->27883 27878->27883 27879 7ff665fe26b1 SetFileTime 27882 7ff665fe26cf 27879->27882 27880 7ff665fe2708 27881 7ff666002320 _handle_error 8 API calls 27880->27881 27885 7ff665fe271b 27881->27885 27882->27880 27886 7ff665fd20b0 33 API calls 27882->27886 27883->27884 27887 7ff665fe2736 27883->27887 27884->27879 27884->27882 27885->27557 27890 7ff665fdb7e8 99 API calls 2 library calls 27885->27890 27886->27880 27888 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27887->27888 27889 7ff665fe273b 27888->27889 27890->27557 27892 7ff665fe28fd 27891->27892 27893 7ff665fe28f6 27891->27893 27892->27893 27895 7ff665fe2320 GetStdHandle ReadFile GetLastError GetLastError GetFileType 27892->27895 27912 7ff665fdb8a4 99 API calls std::_Xinvalid_argument 27892->27912 27893->27562 27895->27892 27897 7ff665fe2be9 27896->27897 27898 7ff665fe2bcd 27896->27898 27900 7ff665fe2c01 SetFilePointer 27897->27900 27902 7ff665fd34cc 27897->27902 27898->27902 27913 7ff665fdb9c4 99 API calls std::_Xinvalid_argument 27898->27913 27901 7ff665fe2c1e GetLastError 27900->27901 27900->27902 27901->27902 27903 7ff665fe2c28 27901->27903 27902->27583 27903->27902 27914 7ff665fdb9c4 99 API calls std::_Xinvalid_argument 27903->27914 27915 7ff665fe2778 27905->27915 27908 7ff665fd35a7 27908->27569 27908->27585 27910->27573 27911->27571 27921 7ff665fe2789 _snwprintf 27915->27921 27916 7ff666002320 _handle_error 8 API calls 27919 7ff665fe281d 27916->27919 27917 7ff665fe27b5 27917->27916 27918 7ff665fe2890 SetFilePointer 27918->27917 27920 7ff665fe28b8 GetLastError 27918->27920 27919->27908 27922 7ff665fdb9c4 99 API calls std::_Xinvalid_argument 27919->27922 27920->27917 27921->27917 27921->27918 27924 7ff665fd339a 27923->27924 27925 7ff665fd3396 27923->27925 27929 7ff665fd3294 27924->27929 27925->27593 27925->27599 27928 7ff665fe2aa0 101 API calls 27928->27925 27930 7ff665fd32bb 27929->27930 27931 7ff665fd32f6 27929->27931 27932 7ff665fd69f8 141 API calls 27930->27932 27937 7ff665fd6e74 27931->27937 27935 7ff665fd32db 27932->27935 27935->27928 27941 7ff665fd6e95 27937->27941 27938 7ff665fd69f8 141 API calls 27938->27941 27939 7ff665fd331d 27939->27935 27942 7ff665fd3904 27939->27942 27941->27938 27941->27939 27969 7ff665fee808 27941->27969 27977 7ff665fd6a7c 27942->27977 27945 7ff665fd396a 27948 7ff665fd399a 27945->27948 27949 7ff665fd3989 27945->27949 27946 7ff665fd3a8a 27950 7ff666002320 _handle_error 8 API calls 27946->27950 27954 7ff665fd39a3 27948->27954 27957 7ff665fd39ec 27948->27957 28010 7ff665ff0d54 33 API calls 27949->28010 27953 7ff665fd3a9e 27950->27953 27951 7ff665fd3ab3 27955 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27951->27955 27953->27935 28011 7ff665ff0c80 33 API calls 27954->28011 27958 7ff665fd3ab8 27955->27958 28012 7ff665fd26b4 33 API calls memcpy_s 27957->28012 27961 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 27958->27961 27959 7ff665fd39b0 27962 7ff665fd1fa0 31 API calls 27959->27962 27966 7ff665fd39c0 memcpy_s 27959->27966 27965 7ff665fd3abe 27961->27965 27962->27966 27963 7ff665fd1fa0 31 API calls 27968 7ff665fd394f 27963->27968 27964 7ff665fd3a13 28013 7ff665ff0ae8 34 API calls _invalid_parameter_noinfo_noreturn 27964->28013 27966->27963 27968->27946 27968->27951 27968->27958 27970 7ff665fee811 27969->27970 27971 7ff665fee82b 27970->27971 27975 7ff665fdb664 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 27970->27975 27973 7ff665fee845 SetThreadExecutionState 27971->27973 27976 7ff665fdb664 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 27971->27976 27975->27971 27976->27973 27978 7ff665fd6a96 _snwprintf 27977->27978 27979 7ff665fd6ae4 27978->27979 27980 7ff665fd6ac4 27978->27980 27981 7ff665fd6d4d 27979->27981 27985 7ff665fd6b0f 27979->27985 28052 7ff665fd28a4 82 API calls 2 library calls 27980->28052 28081 7ff665fd28a4 82 API calls 2 library calls 27981->28081 27983 7ff665fd6ad0 27986 7ff666002320 _handle_error 8 API calls 27983->27986 27985->27983 28014 7ff665ff1f94 27985->28014 27987 7ff665fd394b 27986->27987 27987->27945 27987->27968 28009 7ff665fd2794 33 API calls __std_swap_ranges_trivially_swappable 27987->28009 27990 7ff665fd6b6e 28053 7ff665fd28a4 82 API calls 2 library calls 27990->28053 27991 7ff665fd6b80 27993 7ff665fd6b85 27991->27993 28054 7ff665fd40b0 27991->28054 27994 7ff665fd6c2a 27993->27994 28008 7ff665fd6b7b 27993->28008 28058 7ff665fe8968 109 API calls 27993->28058 28023 7ff665fe4760 27994->28023 27999 7ff665fd6c52 28000 7ff665fd6cd1 27999->28000 28001 7ff665fd6cc7 27999->28001 28059 7ff665ff1f20 28000->28059 28027 7ff665fe1794 28001->28027 28004 7ff665fd6ccf 28079 7ff665fe4700 8 API calls _handle_error 28004->28079 28006 7ff665fd6cfd 28006->28008 28042 7ff665ff1870 28008->28042 28009->27945 28010->27968 28011->27959 28012->27964 28013->27968 28015 7ff665ff2056 std::bad_alloc::bad_alloc 28014->28015 28018 7ff665ff1fc5 std::bad_alloc::bad_alloc 28014->28018 28082 7ff666004078 28015->28082 28016 7ff665fd6b59 28016->27990 28016->27991 28016->27993 28018->28016 28019 7ff666004078 std::_Xinvalid_argument 2 API calls 28018->28019 28020 7ff665ff200f std::bad_alloc::bad_alloc 28018->28020 28019->28020 28020->28016 28021 7ff666004078 std::_Xinvalid_argument 2 API calls 28020->28021 28022 7ff665ff20a9 28021->28022 28024 7ff665fe4780 28023->28024 28026 7ff665fe478a 28023->28026 28025 7ff6660021d0 33 API calls 28024->28025 28025->28026 28026->27999 28028 7ff665fe17be memcpy_s 28027->28028 28087 7ff665fe8a48 28028->28087 28043 7ff665ff188e 28042->28043 28045 7ff665ff18a1 28043->28045 28112 7ff665fee948 28043->28112 28049 7ff665ff18d8 28045->28049 28103 7ff66600236c 28045->28103 28047 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 28048 7ff665ff1ad0 28047->28048 28051 7ff665ff1a37 28049->28051 28107 7ff665fea984 28049->28107 28051->28047 28052->27983 28053->28008 28055 7ff665fd40dd 28054->28055 28056 7ff665fd40d7 memcpy_s 28054->28056 28055->28056 28119 7ff665fd4120 28055->28119 28056->27993 28058->27994 28060 7ff665ff1f29 28059->28060 28061 7ff665ff1f5d 28060->28061 28062 7ff665ff1f55 28060->28062 28063 7ff665ff1f49 28060->28063 28061->28004 28155 7ff665ff3964 156 API calls 28062->28155 28125 7ff665ff20ac 28063->28125 28079->28006 28081->27983 28083 7ff6660040b4 RtlPcToFileHeader 28082->28083 28084 7ff666004097 28082->28084 28085 7ff6660040cc 28083->28085 28086 7ff6660040db RaiseException 28083->28086 28084->28083 28085->28086 28086->28018 28089 7ff665fe8bcd 28087->28089 28092 7ff665fe8a91 memcpy_s 28087->28092 28088 7ff665fe8c1a 28090 7ff665fee808 SetThreadExecutionState RtlPcToFileHeader RaiseException 28088->28090 28089->28088 28091 7ff665fda174 8 API calls 28089->28091 28094 7ff665fe8c1f 28090->28094 28091->28088 28092->28089 28093 7ff665ff612c 146 API calls 28092->28093 28092->28094 28095 7ff665fe4888 108 API calls 28092->28095 28096 7ff665fe28d0 104 API calls 28092->28096 28093->28092 28095->28092 28096->28092 28104 7ff66600239f 28103->28104 28105 7ff6660023c8 28104->28105 28106 7ff665ff1870 108 API calls 28104->28106 28105->28049 28106->28104 28108 7ff665fea9dd 28107->28108 28109 7ff665fea995 28107->28109 28108->28051 28109->28108 28110 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 28109->28110 28111 7ff665fea9fe 28110->28111 28113 7ff665feecd8 103 API calls 28112->28113 28114 7ff665fee95f ReleaseSemaphore 28113->28114 28115 7ff665fee984 28114->28115 28116 7ff665fee9a3 DeleteCriticalSection CloseHandle CloseHandle 28114->28116 28117 7ff665feea5c 101 API calls 28115->28117 28118 7ff665fee98e CloseHandle 28117->28118 28118->28115 28118->28116 28120 7ff665fd4168 memcpy_s __std_swap_ranges_trivially_swappable 28119->28120 28122 7ff665fd4149 28119->28122 28121 7ff665fd2018 33 API calls 28120->28121 28123 7ff665fd41eb 28121->28123 28122->28120 28124 7ff6660021d0 33 API calls 28122->28124 28124->28120 28127 7ff665ff20c8 memcpy_s 28125->28127 28155->28061 28160 7ff665fe8882 28159->28160 28161 7ff665fe8892 28159->28161 28166 7ff665fe23f0 28160->28166 28161->27604 28164 7ff666002320 _handle_error 8 API calls 28163->28164 28165 7ff665fdf7dc 28164->28165 28165->27491 28165->27607 28167 7ff665fe240f 28166->28167 28170 7ff665fe2aa0 101 API calls 28167->28170 28168 7ff665fe2428 28171 7ff665fe2bb0 101 API calls 28168->28171 28169 7ff665fe2438 28169->28161 28170->28168 28171->28169 28173 7ff665fffc94 28172->28173 28174 7ff665fd129c 33 API calls 28173->28174 28175 7ff665fffca4 28174->28175 28176 7ff665fff0a4 24 API calls 28175->28176 28177 7ff665fffcb1 28176->28177 28179 7ff665fffd03 28177->28179 28180 7ff665fffceb 28177->28180 28185 7ff665fd5e67 28184->28185 28187 7ff665fd5ea5 28185->28187 28191 7ff665fd5eb7 28185->28191 28215 7ff665fd6084 28185->28215 28279 7ff665fd28a4 82 API calls 2 library calls 28187->28279 28189 7ff665fd6134 28286 7ff665fd6fcc 82 API calls 28189->28286 28191->28189 28192 7ff665fd5f44 28191->28192 28280 7ff665fd6f38 33 API calls memcpy_s 28191->28280 28281 7ff665fd6d88 82 API calls 28192->28281 28193 7ff665fd69af 28194 7ff666002320 _handle_error 8 API calls 28193->28194 28196 7ff665fd69c3 28194->28196 28196->27631 28198 7ff665fd69e4 28200 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 28198->28200 28199 7ff665fd6973 28263 7ff665fd5eb2 28199->28263 28299 7ff665fd466c 82 API calls 28199->28299 28202 7ff665fd69e9 28200->28202 28201 7ff665fd612e 28201->28189 28201->28199 28207 7ff665fe85f0 104 API calls 28201->28207 28205 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 28202->28205 28208 7ff665fd69ef 28205->28208 28206 7ff665fd6034 28209 7ff66600236c 108 API calls 28206->28209 28206->28215 28210 7ff665fd61a4 28207->28210 28212 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 28208->28212 28211 7ff665fd606e 28209->28211 28210->28189 28220 7ff665fd61ac 28210->28220 28213 7ff66600236c 108 API calls 28211->28213 28214 7ff665fd69f5 28212->28214 28213->28215 28269 7ff665fe85f0 28215->28269 28216 7ff665fd6097 28285 7ff665fd433c 82 API calls 2 library calls 28216->28285 28219 7ff665fd5f5d 28219->28206 28219->28216 28282 7ff665fd433c 82 API calls 2 library calls 28219->28282 28283 7ff665fd6d88 82 API calls 28219->28283 28284 7ff665fda1a0 109 API calls _handle_error 28219->28284 28223 7ff665fd60a1 28225 7ff66600236c 108 API calls 28223->28225 28223->28263 28226 7ff665fd60f4 28225->28226 28263->28193 28263->28198 28263->28208 28267->27631 28270 7ff665fe8614 28269->28270 28271 7ff665fe869a 28269->28271 28272 7ff665fe867c 28270->28272 28274 7ff665fd40b0 33 API calls 28270->28274 28271->28272 28273 7ff665fd40b0 33 API calls 28271->28273 28272->28201 28275 7ff665fe86b3 28273->28275 28276 7ff665fe864d 28274->28276 28278 7ff665fe28d0 104 API calls 28275->28278 28300 7ff665fda174 28276->28300 28278->28272 28279->28263 28281->28219 28282->28219 28283->28219 28284->28219 28285->28223 28286->28263 28301 7ff665fda185 28300->28301 28302 7ff665fda19a 28301->28302 28304 7ff665feaf18 8 API calls 2 library calls 28301->28304 28302->28272 28304->28302 28310 7ff665fd9be7 28305->28310 28306 7ff665fd9c1b 28307 7ff666002320 _handle_error 8 API calls 28306->28307 28308 7ff665fd9c9d 28307->28308 28308->27648 28310->28306 28313 7ff665fd9cae 28310->28313 28317 7ff665fd9c83 28310->28317 28440 7ff665fe5294 28310->28440 28458 7ff665fedb60 28310->28458 28312 7ff665fd1fa0 31 API calls 28312->28306 28314 7ff665fd9cbf 28313->28314 28462 7ff665feda48 CompareStringW 28313->28462 28316 7ff665fd20b0 33 API calls 28314->28316 28314->28317 28316->28317 28317->28312 28331 7ff665fe5f3a 28318->28331 28319 7ff665fe619b 28320 7ff666002320 _handle_error 8 API calls 28319->28320 28322 7ff665fdfb29 28320->28322 28321 7ff665fe61ce 28466 7ff665fd704c 47 API calls memcpy_s 28321->28466 28322->27652 28391 7ff665fe7c94 47 API calls 2 library calls 28322->28391 28324 7ff665fd129c 33 API calls 28326 7ff665fe6129 28324->28326 28325 7ff665fe61d4 28327 7ff665fd1fa0 31 API calls 28326->28327 28328 7ff665fe613b memcpy_s 28326->28328 28327->28328 28328->28319 28329 7ff665fe61c9 28328->28329 28331->28319 28331->28321 28331->28324 28390->27641 28438->27647 28439->27647 28441 7ff665fe52d4 28440->28441 28445 7ff665fe5312 __vcrt_InitializeCriticalSectionEx 28441->28445 28454 7ff665fe5339 __vcrt_InitializeCriticalSectionEx 28441->28454 28463 7ff665ff13f4 CompareStringW 28441->28463 28442 7ff666002320 _handle_error 8 API calls 28443 7ff665fe5503 28442->28443 28443->28310 28447 7ff665fe5382 __vcrt_InitializeCriticalSectionEx 28445->28447 28445->28454 28464 7ff665ff13f4 CompareStringW 28445->28464 28448 7ff665fe5439 28447->28448 28449 7ff665fd129c 33 API calls 28447->28449 28447->28454 28452 7ff665fe551b 28448->28452 28453 7ff665fe5489 28448->28453 28450 7ff665fe5426 28449->28450 28451 7ff665fe72cc 8 API calls 28450->28451 28451->28448 28456 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 28452->28456 28453->28454 28465 7ff665ff13f4 CompareStringW 28453->28465 28454->28442 28457 7ff665fe5520 28456->28457 28460 7ff665fedb73 28458->28460 28459 7ff665fedb91 28459->28310 28460->28459 28461 7ff665fd20b0 33 API calls 28460->28461 28461->28459 28462->28314 28463->28445 28464->28447 28465->28454 28466->28325 28526->27815 28527->27818 28528->27823 28530 7ff665fe87af 28529->28530 28531 7ff665fe87df 28529->28531 28532 7ff66600236c 108 API calls 28530->28532 28533 7ff66600236c 108 API calls 28531->28533 28541 7ff665fe882b 28531->28541 28535 7ff665fe87ca 28532->28535 28536 7ff665fe8814 28533->28536 28538 7ff66600236c 108 API calls 28535->28538 28539 7ff66600236c 108 API calls 28536->28539 28537 7ff665fe8845 28540 7ff665fe461c 108 API calls 28537->28540 28538->28531 28539->28541 28542 7ff665fe8851 28540->28542 28543 7ff665fe461c 28541->28543 28544 7ff665fe4632 28543->28544 28546 7ff665fe463a 28543->28546 28545 7ff665fee948 108 API calls 28544->28545 28545->28546 28546->28537 28548 7ff665fe163e 28547->28548 28552 7ff665fe1681 28547->28552 28548->28552 28553 7ff665fe31bc 51 API calls 28548->28553 28549 7ff665fe16a0 28550 7ff665fde600 31 API calls 28549->28550 28557 7ff665fe16de 28550->28557 28551 7ff665fd1fa0 31 API calls 28551->28552 28552->28549 28552->28551 28553->28548 28554 7ff665fe175b 28555 7ff666002320 _handle_error 8 API calls 28554->28555 28558 7ff665fde58a 28555->28558 28556 7ff665fe178d 28559 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 28556->28559 28557->28554 28557->28556 28558->27430 28558->27431 28560 7ff665fe1792 28559->28560 28562 7ff665ff84cc 4 API calls 28561->28562 28564 7ff665ff84aa 28562->28564 28563 7ff665ff84b9 28563->26792 28563->26793 28564->28563 28573 7ff665ff8504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28564->28573 28566->26794 28567->26804 28569 7ff665ff84de 28568->28569 28570 7ff665ff84e3 28568->28570 28574 7ff665ff8590 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28569->28574 28570->26804 28572->26807 28573->28563 28574->28570 28575->26828 28577->26857 28578->26873 28579->26880 28581->26885 28583 7ff6660011cf 28584 7ff666001102 28583->28584 28585 7ff666001900 _com_raise_error 14 API calls 28584->28585 28586 7ff666001141 28585->28586 28597 7ff6660003e0 28598 7ff666000497 28597->28598 28599 7ff66600041f 28597->28599 28600 7ff665feaae0 48 API calls 28598->28600 28601 7ff665feaae0 48 API calls 28599->28601 28602 7ff6660004ab 28600->28602 28603 7ff666000433 28601->28603 28604 7ff665feda98 48 API calls 28602->28604 28605 7ff665feda98 48 API calls 28603->28605 28608 7ff666000442 memcpy_s 28604->28608 28605->28608 28606 7ff665fd1fa0 31 API calls 28607 7ff666000541 28606->28607 28610 7ff665fd250c SetDlgItemTextW 28607->28610 28608->28606 28609 7ff6660005c6 28608->28609 28611 7ff6660005cc 28608->28611 28612 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 28609->28612 28614 7ff666000556 SetWindowTextW 28610->28614 28613 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 28611->28613 28612->28611 28615 7ff6660005d2 28613->28615 28616 7ff66600059c 28614->28616 28617 7ff66600056f 28614->28617 28618 7ff666002320 _handle_error 8 API calls 28616->28618 28617->28616 28619 7ff6660005c1 28617->28619 28620 7ff6660005af 28618->28620 28621 7ff666007904 _invalid_parameter_noinfo_noreturn 31 API calls 28619->28621 28621->28609 28641 7ff6660020f0 28642 7ff666002106 _com_error::_com_error 28641->28642 28643 7ff666004078 std::_Xinvalid_argument 2 API calls 28642->28643 28644 7ff666002117 28643->28644 28645 7ff666001900 _com_raise_error 14 API calls 28644->28645 28646 7ff666002163 28645->28646 28623 7ff66600bf2c 28630 7ff66600bc34 28623->28630 28635 7ff66600d440 35 API calls 3 library calls 28630->28635 28632 7ff66600bc3f 28636 7ff66600d068 35 API calls abort 28632->28636 28635->28632
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Item$Message$_invalid_parameter_noinfo_noreturn$Send$DialogText$File$ErrorLast$CloseFindFocusLoadStringViewWindow$CommandConcurrency::cancel_current_taskCountCreateDispatchEnableExecuteFirstHandleLineMappingParamShellSleepTickTranslateUnmap
                                            • String ID: %s %s$-el -s2 "-d%s" "-sp%s"$@$LICENSEDLG$REPLACEFILEDLG$STARTDLG$__tmp_rar_sfx_access_check_$p$runas$winrarsfxmappingfile.tmp
                                            • API String ID: 255727823-2702805183
                                            • Opcode ID: 9c70f0b35f8b818cf05a540bf998b1b6e6830b68d527d89ebab9bbb3188c6e28
                                            • Instruction ID: 1b8bf787a1dc84333f1ff268012f7b7e036a20504eef4decc27b29c3be7d3406
                                            • Opcode Fuzzy Hash: 9c70f0b35f8b818cf05a540bf998b1b6e6830b68d527d89ebab9bbb3188c6e28
                                            • Instruction Fuzzy Hash: 77D2C122A0C683C1EA20DB65E9566F96371EFC5B80F404635DA4D9FAA6DF3DED44CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task$FileMessageMoveSend$DialogItemPathTemp
                                            • String ID: .lnk$.tmp$<br>$@set:user$HIDE$MAX$MIN$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$lnk
                                            • API String ID: 3007431893-3916287355
                                            • Opcode ID: 1241cfa18febdcdc9a834181efa7dfde55121a1a2cf177372a305c9907fdf718
                                            • Instruction ID: 5500ee82588eec7d1074472a5e66e0db484b61a394af71d78c9f6a1dcf1cf544
                                            • Opcode Fuzzy Hash: 1241cfa18febdcdc9a834181efa7dfde55121a1a2cf177372a305c9907fdf718
                                            • Instruction Fuzzy Hash: 7C138F72A04B82D9EB10DF64D8412EC27B1EB84B98F501635DA5D9FEE9DF38E984C740

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1466 7ff666000754-7ff666000829 call 7ff665fedfd0 call 7ff665fe62dc call 7ff665ff946c call 7ff666003cf0 call 7ff665ff9a14 1477 7ff666000860-7ff666000883 1466->1477 1478 7ff66600082b-7ff666000840 1466->1478 1481 7ff666000885-7ff66600089a 1477->1481 1482 7ff6660008ba-7ff6660008dd 1477->1482 1479 7ff666000842-7ff666000855 1478->1479 1480 7ff66600085b call 7ff66600220c 1478->1480 1479->1480 1483 7ff666000ddd-7ff666000de2 call 7ff666007904 1479->1483 1480->1477 1485 7ff6660008b5 call 7ff66600220c 1481->1485 1486 7ff66600089c-7ff6660008af 1481->1486 1487 7ff666000914-7ff666000937 1482->1487 1488 7ff6660008df-7ff6660008f4 1482->1488 1503 7ff666000de3-7ff666000e2f call 7ff666007904 call 7ff666001900 1483->1503 1485->1482 1486->1483 1486->1485 1491 7ff66600096e-7ff66600097a GetCommandLineW 1487->1491 1492 7ff666000939-7ff66600094e 1487->1492 1489 7ff66600090f call 7ff66600220c 1488->1489 1490 7ff6660008f6-7ff666000909 1488->1490 1489->1487 1490->1483 1490->1489 1499 7ff666000980-7ff6660009b7 call 7ff66600797c call 7ff665fd129c call 7ff665ffcad0 1491->1499 1500 7ff666000b47-7ff666000b5e call 7ff665fe6454 1491->1500 1496 7ff666000950-7ff666000963 1492->1496 1497 7ff666000969 call 7ff66600220c 1492->1497 1496->1483 1496->1497 1497->1491 1524 7ff6660009ec-7ff6660009f3 1499->1524 1525 7ff6660009b9-7ff6660009cc 1499->1525 1508 7ff666000b60-7ff666000b85 call 7ff665fd1fa0 call 7ff666003640 1500->1508 1509 7ff666000b89-7ff666000ce4 call 7ff665fd1fa0 SetEnvironmentVariableW GetLocalTime call 7ff665fe3e28 SetEnvironmentVariableW GetModuleHandleW LoadIconW call 7ff665ffb014 call 7ff665fe98ac call 7ff665ff67b4 * 2 DialogBoxParamW call 7ff665ff68a8 * 2 1500->1509 1522 7ff666000e34-7ff666000e6a 1503->1522 1508->1509 1572 7ff666000cec-7ff666000cf3 1509->1572 1573 7ff666000ce6 Sleep 1509->1573 1528 7ff666000e6c 1522->1528 1531 7ff666000adb-7ff666000b12 call 7ff66600797c call 7ff665fd129c call 7ff665fffd0c 1524->1531 1532 7ff6660009f9-7ff666000a13 OpenFileMappingW 1524->1532 1529 7ff6660009ce-7ff6660009e1 1525->1529 1530 7ff6660009e7 call 7ff66600220c 1525->1530 1528->1528 1529->1503 1529->1530 1530->1524 1531->1500 1555 7ff666000b14-7ff666000b27 1531->1555 1536 7ff666000ad0-7ff666000ad9 CloseHandle 1532->1536 1537 7ff666000a19-7ff666000a39 MapViewOfFile 1532->1537 1536->1500 1537->1536 1540 7ff666000a3f-7ff666000a6f UnmapViewOfFile MapViewOfFile 1537->1540 1540->1536 1543 7ff666000a71-7ff666000aca call 7ff665ffa190 call 7ff665fffd0c call 7ff665feb9b4 call 7ff665febb00 call 7ff665febb70 UnmapViewOfFile 1540->1543 1543->1536 1558 7ff666000b42 call 7ff66600220c 1555->1558 1559 7ff666000b29-7ff666000b3c 1555->1559 1558->1500 1559->1558 1562 7ff666000dd7-7ff666000ddc call 7ff666007904 1559->1562 1562->1483 1575 7ff666000cf5 call 7ff665ff9f4c 1572->1575 1576 7ff666000cfa-7ff666000d1d call 7ff665feb8e0 DeleteObject 1572->1576 1573->1572 1575->1576 1580 7ff666000d25-7ff666000d2c 1576->1580 1581 7ff666000d1f DeleteObject 1576->1581 1582 7ff666000d2e-7ff666000d35 1580->1582 1583 7ff666000d48-7ff666000d59 1580->1583 1581->1580 1582->1583 1584 7ff666000d37-7ff666000d43 call 7ff665fdba0c 1582->1584 1585 7ff666000d6d-7ff666000d7a 1583->1585 1586 7ff666000d5b-7ff666000d67 call 7ff665fffe24 CloseHandle 1583->1586 1584->1583 1589 7ff666000d9f-7ff666000da4 call 7ff665ff94e4 1585->1589 1590 7ff666000d7c-7ff666000d89 1585->1590 1586->1585 1595 7ff666000da9-7ff666000dd6 call 7ff666002320 1589->1595 1592 7ff666000d8b-7ff666000d93 1590->1592 1593 7ff666000d99-7ff666000d9b 1590->1593 1592->1589 1596 7ff666000d95-7ff666000d97 1592->1596 1593->1589 1597 7ff666000d9d 1593->1597 1596->1589 1597->1589
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: File$EnvironmentHandleVariableView$_invalid_parameter_noinfo_noreturn$AddressCloseCurrentDeleteDirectoryModuleObjectProcUnmap$CommandDialogIconInitializeLineLoadLocalMallocMappingOpenParamSleepTimeswprintf
                                            • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                            • API String ID: 1048086575-3710569615
                                            • Opcode ID: c329a48066309f809b0ed759e5440bf592438963a56de83793cfb2c4d91a7b0a
                                            • Instruction ID: a43a11d19583b39918f86ec14be79f4a158a338bb1d65b6a1cfc9a284571a8db
                                            • Opcode Fuzzy Hash: c329a48066309f809b0ed759e5440bf592438963a56de83793cfb2c4d91a7b0a
                                            • Instruction Fuzzy Hash: 4A128F21A18B87D1EB109F24FA412B96371FF85784F404232DA9D9FAA5DF3EE540CB80

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWideswprintf
                                            • String ID: $%s:$CAPTION
                                            • API String ID: 2100155373-404845831
                                            • Opcode ID: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                                            • Instruction ID: c499bb459d3b9a63ab9d936c377f599795baeddb10ff98a93b2ef72fcb1a3161
                                            • Opcode Fuzzy Hash: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                                            • Instruction Fuzzy Hash: 5B91D532A18682C6E7148F29F50566AA7B1FB84B84F505535EE8D9BB58CF3DEC05CF00

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                            • String ID: PNG
                                            • API String ID: 211097158-364855578
                                            • Opcode ID: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                                            • Instruction ID: 9802bb6e0ffa07f1b3c96991a4ca2421185a0c5c377b40154625d244253eb702
                                            • Opcode Fuzzy Hash: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                                            • Instruction Fuzzy Hash: 4E411B26A09A02C2EE059F56E954379A3B0AF88F94F144435CE0D9F7A4EF7DE948CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn
                                            • String ID: __tmp_reference_source_
                                            • API String ID: 3668304517-685763994
                                            • Opcode ID: 6220495e4172753c66c17a82b14fc6020abb9ebc9c13382217fd03717c5bed06
                                            • Instruction ID: 21de03d9b0fc2a5d59e62f3a1470833b5fe369ba987271e5ebfe5fb82ca2aa13
                                            • Opcode Fuzzy Hash: 6220495e4172753c66c17a82b14fc6020abb9ebc9c13382217fd03717c5bed06
                                            • Instruction Fuzzy Hash: C8E2C862A086C2E2EA64CB65E5427FE7775FB81B40F404132DB9D9B6A5CF7CE854CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn
                                            • String ID: CMT
                                            • API String ID: 3668304517-2756464174
                                            • Opcode ID: 65a12c24cd07289b3c2060d3ae393729c05723a97e4fe5390825c697d67274c8
                                            • Instruction ID: 981c42f7c312dd30219fc5d694cb986e07276cd9200a95b05f2337354fb349f5
                                            • Opcode Fuzzy Hash: 65a12c24cd07289b3c2060d3ae393729c05723a97e4fe5390825c697d67274c8
                                            • Instruction Fuzzy Hash: 13E21F22B08682D6EB18DB74D5562FE63B1FB44B84F400236DA5E8B6D6DF7CE855CB00

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 3767 7ff665fe40bc-7ff665fe40f3 3768 7ff665fe41d2-7ff665fe41df FindNextFileW 3767->3768 3769 7ff665fe40f9-7ff665fe4101 3767->3769 3772 7ff665fe41f3-7ff665fe41f6 3768->3772 3773 7ff665fe41e1-7ff665fe41f1 GetLastError 3768->3773 3770 7ff665fe4103 3769->3770 3771 7ff665fe4106-7ff665fe4118 FindFirstFileW 3769->3771 3770->3771 3771->3772 3774 7ff665fe411e-7ff665fe4146 call 7ff665fe6a0c 3771->3774 3776 7ff665fe4211-7ff665fe4253 call 7ff66600797c call 7ff665fd129c call 7ff665fe8090 3772->3776 3777 7ff665fe41f8-7ff665fe4200 3772->3777 3775 7ff665fe41ca-7ff665fe41cd 3773->3775 3787 7ff665fe4167-7ff665fe4170 3774->3787 3788 7ff665fe4148-7ff665fe4164 FindFirstFileW 3774->3788 3778 7ff665fe42eb-7ff665fe430e call 7ff666002320 3775->3778 3803 7ff665fe4255-7ff665fe426c 3776->3803 3804 7ff665fe428c-7ff665fe42e6 call 7ff665fef168 * 3 3776->3804 3780 7ff665fe4202 3777->3780 3781 7ff665fe4205-7ff665fe420c call 7ff665fd20b0 3777->3781 3780->3781 3781->3776 3791 7ff665fe4172-7ff665fe4189 3787->3791 3792 7ff665fe41a9-7ff665fe41ad 3787->3792 3788->3787 3794 7ff665fe41a4 call 7ff66600220c 3791->3794 3795 7ff665fe418b-7ff665fe419e 3791->3795 3792->3772 3796 7ff665fe41af-7ff665fe41be GetLastError 3792->3796 3794->3792 3795->3794 3798 7ff665fe4315-7ff665fe431b call 7ff666007904 3795->3798 3800 7ff665fe41c0-7ff665fe41c6 3796->3800 3801 7ff665fe41c8 3796->3801 3800->3775 3800->3801 3801->3775 3806 7ff665fe426e-7ff665fe4281 3803->3806 3807 7ff665fe4287 call 7ff66600220c 3803->3807 3804->3778 3806->3807 3810 7ff665fe430f-7ff665fe4314 call 7ff666007904 3806->3810 3807->3804 3810->3798
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: FileFind$ErrorFirstLast_invalid_parameter_noinfo_noreturn$Next
                                            • String ID:
                                            • API String ID: 474548282-0
                                            • Opcode ID: 302a779ab95c7aaca0ba1f13af6e7309770b234b011da9b93882c2eb88fdf2be
                                            • Instruction ID: d4b5fcc6697878e61127b3cb7f95e432e44772594b88f3423965810767a6ad80
                                            • Opcode Fuzzy Hash: 302a779ab95c7aaca0ba1f13af6e7309770b234b011da9b93882c2eb88fdf2be
                                            • Instruction Fuzzy Hash: A761C462A08A86D1EE11DF64E84527D6371FB85BA4F104335EABD8BAD9DF3CD944CB00
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: CMT
                                            • API String ID: 0-2756464174
                                            • Opcode ID: 97f672311c4cb3c89f7e9efd8cbd1396ba699c50a267e76ee520df64f812c89d
                                            • Instruction ID: d414301b3585f9ddd6a71c5474205cfaa18cbcde58e0ab0197d66ff6a6786725
                                            • Opcode Fuzzy Hash: 97f672311c4cb3c89f7e9efd8cbd1396ba699c50a267e76ee520df64f812c89d
                                            • Instruction Fuzzy Hash: 7C42D022B08682D6EB18DB74D1522FD77B1EB51B44F400236EB5E9B6D6DF38E919CB00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6a2ba48437b82e373fac81338819d40f47a0019a50d197aab006f7cc31990992
                                            • Instruction ID: 2dc95fa3cad7d0aa2165b7ff0da1c1b7e7a3e0cf3de67ba1cc168f65e1e74a31
                                            • Opcode Fuzzy Hash: 6a2ba48437b82e373fac81338819d40f47a0019a50d197aab006f7cc31990992
                                            • Instruction Fuzzy Hash: 64E1C762A08282C7EB74CF29E54A27D77A1FB84B48F054135DB8D8BB85DE3CE945CB04
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 342467450e98b7b75b466d1eafea627c07b1293b3fd099ee508e1bce11d9ebd7
                                            • Instruction ID: 3b31ce672420a87a0c892243c6656acbab15fc9092cffa429892ca3b717da8ee
                                            • Opcode Fuzzy Hash: 342467450e98b7b75b466d1eafea627c07b1293b3fd099ee508e1bce11d9ebd7
                                            • Instruction Fuzzy Hash: 88B1E2A3B097C992DE58DA66D509AE973A1B784FC4F448032DE0D4BB84DF3CE955C701
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Create$CriticalEventInitializeSectionSemaphore
                                            • String ID:
                                            • API String ID: 3340455307-0
                                            • Opcode ID: fd8835e4233293591ea5a8582186aba0aa2126ac905c183a9a3c131a0123eb89
                                            • Instruction ID: b09494983f6a947c5480acda04e141ca4a54d7f65b2ba8249d6c7a7fa3a9d6ea
                                            • Opcode Fuzzy Hash: fd8835e4233293591ea5a8582186aba0aa2126ac905c183a9a3c131a0123eb89
                                            • Instruction Fuzzy Hash: 68410822B15692D6FA64DF21F90676A2362FBC4F94F044038DE8D8B794DE3CE8468B44

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 7ff665fedfd0-7ff665fee024 call 7ff666002450 GetModuleHandleW 3 7ff665fee07b-7ff665fee3a5 0->3 4 7ff665fee026-7ff665fee039 GetProcAddress 0->4 7 7ff665fee503-7ff665fee521 call 7ff665fe6454 call 7ff665fe7df4 3->7 8 7ff665fee3ab-7ff665fee3b4 call 7ff66600b788 3->8 5 7ff665fee053-7ff665fee066 GetProcAddress 4->5 6 7ff665fee03b-7ff665fee04a 4->6 5->3 10 7ff665fee068-7ff665fee078 5->10 6->5 19 7ff665fee525-7ff665fee52f call 7ff665fe51a4 7->19 8->7 16 7ff665fee3ba-7ff665fee3fd call 7ff665fe6454 CreateFileW 8->16 10->3 22 7ff665fee403-7ff665fee416 SetFilePointer 16->22 23 7ff665fee4f0-7ff665fee4fe CloseHandle call 7ff665fd1fa0 16->23 27 7ff665fee564-7ff665fee5ac call 7ff66600797c call 7ff665fd129c call 7ff665fe8090 call 7ff665fd1fa0 call 7ff665fe32bc 19->27 28 7ff665fee531-7ff665fee53c call 7ff665fedd88 19->28 22->23 25 7ff665fee41c-7ff665fee43e ReadFile 22->25 23->7 25->23 29 7ff665fee444-7ff665fee452 25->29 67 7ff665fee5b1-7ff665fee5b4 27->67 28->27 40 7ff665fee53e-7ff665fee562 CompareStringW 28->40 30 7ff665fee800-7ff665fee807 call 7ff666002624 29->30 31 7ff665fee458-7ff665fee4ac call 7ff66600797c call 7ff665fd129c 29->31 49 7ff665fee4c3-7ff665fee4d9 call 7ff665fed0a0 31->49 40->27 44 7ff665fee5bd-7ff665fee5c6 40->44 44->19 47 7ff665fee5cc 44->47 50 7ff665fee5d1-7ff665fee5d4 47->50 61 7ff665fee4ae-7ff665fee4be call 7ff665fedd88 49->61 62 7ff665fee4db-7ff665fee4eb call 7ff665fd1fa0 * 2 49->62 53 7ff665fee63f-7ff665fee642 50->53 54 7ff665fee5d6-7ff665fee5d9 50->54 57 7ff665fee7c2-7ff665fee7ff call 7ff665fd1fa0 * 2 call 7ff666002320 53->57 58 7ff665fee648-7ff665fee65b call 7ff665fe7eb0 call 7ff665fe51a4 53->58 59 7ff665fee5dd-7ff665fee62d call 7ff66600797c call 7ff665fd129c call 7ff665fe8090 call 7ff665fd1fa0 call 7ff665fe32bc 54->59 82 7ff665fee661-7ff665fee701 call 7ff665fedd88 * 2 call 7ff665feaae0 call 7ff665feda98 call 7ff665feaae0 call 7ff665fedc2c call 7ff665ff87ac call 7ff665fd19e0 58->82 83 7ff665fee706-7ff665fee753 call 7ff665feda98 AllocConsole 58->83 107 7ff665fee62f-7ff665fee638 59->107 108 7ff665fee63c 59->108 61->49 62->23 74 7ff665fee5ce 67->74 75 7ff665fee5b6 67->75 74->50 75->44 100 7ff665fee7b4-7ff665fee7bb call 7ff665fd19e0 ExitProcess 82->100 94 7ff665fee755-7ff665fee7aa GetCurrentProcessId AttachConsole call 7ff665fee868 call 7ff665fee858 GetStdHandle WriteConsoleW Sleep FreeConsole 83->94 95 7ff665fee7b0 83->95 94->95 95->100 107->59 112 7ff665fee63a 107->112 108->53 112->53
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$Console$FileHandle$AddressProcProcess$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadModulePointerReadSleepStringSystemVersionWrite
                                            • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$RpcRtRemote.dll$SSPICLI.DLL$SetDefaultDllDirectories$SetDllDirectoryW$UXTheme.dll$WINNSI.DLL$WindowsCodecs.dll$XmlLite.dll$aclui.dll$apphelp.dll$atl.dll$browcli.dll$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$cryptbase.dll$cryptsp.dll$cryptui.dll$cscapi.dll$devrtl.dll$dfscli.dll$dhcpcsvc.dll$dhcpcsvc6.dll$dnsapi.DLL$dsrole.dll$dwmapi.dll$ieframe.dll$imageres.dll$iphlpapi.DLL$kernel32$linkinfo.dll$lpk.dll$mlang.dll$mpr.dll$msasn1.dll$netapi32.dll$netutils.dll$ntmarta.dll$ntshrui.dll$oleaccrc.dll$peerdist.dll$profapi.dll$propsys.dll$psapi.dll$rasadhlp.dll$rsaenh.dll$samcli.dll$samlib.dll$secur32.dll$setupapi.dll$sfc_os.dll$shdocvw.dll$shell32.dll$slc.dll$srvcli.dll$userenv.dll$usp10.dll$uxtheme.dll$version.dll$wintrust.dll$wkscli.dll$ws2_32.dll$ws2help.dll
                                            • API String ID: 1496594111-2013832382
                                            • Opcode ID: 19926894803355f4926a5d38047f13a95aa4f57e947c60c8a04cc60affe7caae
                                            • Instruction ID: dd227d0e4e4a741eba6e72f959fe6fb4569e022d90fbf53d36fa74b62bd94c26
                                            • Opcode Fuzzy Hash: 19926894803355f4926a5d38047f13a95aa4f57e947c60c8a04cc60affe7caae
                                            • Instruction Fuzzy Hash: C7320431A09B82E9EB219FA0F9411E973B4FB44758F500236DA4D8F7A5EF39E645CB40
                                            APIs
                                              • Part of subcall function 00007FF665FE8E58: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF665FE8F8D
                                            • _snwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF665FE9F75
                                            • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665FEA42F
                                            • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665FEA435
                                              • Part of subcall function 00007FF665FF0BBC: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF665FF0B44), ref: 00007FF665FF0BE9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$ByteCharConcurrency::cancel_current_taskMultiWide_snwprintf
                                            • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS
                                            • API String ID: 3629253777-3268106645
                                            • Opcode ID: f8d2576f2d3b58c8de45b6f33364cb60e7b4664a3fbb63d368bfc9699b226bdf
                                            • Instruction ID: 621684a0a1f2daac954147e60198ea3a7d0444bca5715cf5a719ca91eeb5cd71
                                            • Opcode Fuzzy Hash: f8d2576f2d3b58c8de45b6f33364cb60e7b4664a3fbb63d368bfc9699b226bdf
                                            • Instruction Fuzzy Hash: 9C62BF22A196C2E5EB10DF24D54A2BD63B5FB40B88F805132DA4D8F6D5EF3DE984CB50

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1910 7ff666001900-7ff666001989 call 7ff666001558 1913 7ff6660019b4-7ff6660019d1 1910->1913 1914 7ff66600198b-7ff6660019af call 7ff666001868 RaiseException 1910->1914 1916 7ff6660019d3-7ff6660019e4 1913->1916 1917 7ff6660019e6-7ff6660019ea 1913->1917 1920 7ff666001bb8-7ff666001bd5 1914->1920 1919 7ff6660019ed-7ff6660019f9 1916->1919 1917->1919 1921 7ff6660019fb-7ff666001a0d 1919->1921 1922 7ff666001a1a-7ff666001a1d 1919->1922 1930 7ff666001a13 1921->1930 1931 7ff666001b89-7ff666001b93 1921->1931 1923 7ff666001ac4-7ff666001acb 1922->1923 1924 7ff666001a23-7ff666001a26 1922->1924 1926 7ff666001adf-7ff666001ae2 1923->1926 1927 7ff666001acd-7ff666001adc 1923->1927 1928 7ff666001a3d-7ff666001a52 LoadLibraryExA 1924->1928 1929 7ff666001a28-7ff666001a3b 1924->1929 1932 7ff666001b85 1926->1932 1933 7ff666001ae8-7ff666001aec 1926->1933 1927->1926 1934 7ff666001a54-7ff666001a67 GetLastError 1928->1934 1935 7ff666001aa9-7ff666001ab2 1928->1935 1929->1928 1929->1935 1930->1922 1942 7ff666001b95-7ff666001ba6 1931->1942 1943 7ff666001bb0 call 7ff666001868 1931->1943 1932->1931 1940 7ff666001aee-7ff666001af2 1933->1940 1941 7ff666001b1b-7ff666001b2e GetProcAddress 1933->1941 1944 7ff666001a7e-7ff666001aa4 call 7ff666001868 RaiseException 1934->1944 1945 7ff666001a69-7ff666001a7c 1934->1945 1936 7ff666001ab4-7ff666001ab7 FreeLibrary 1935->1936 1937 7ff666001abd 1935->1937 1936->1937 1937->1923 1940->1941 1946 7ff666001af4-7ff666001aff 1940->1946 1941->1932 1949 7ff666001b30-7ff666001b43 GetLastError 1941->1949 1942->1943 1952 7ff666001bb5 1943->1952 1944->1920 1945->1935 1945->1944 1946->1941 1950 7ff666001b01-7ff666001b08 1946->1950 1954 7ff666001b45-7ff666001b58 1949->1954 1955 7ff666001b5a-7ff666001b81 call 7ff666001868 RaiseException call 7ff666001558 1949->1955 1950->1941 1957 7ff666001b0a-7ff666001b0f 1950->1957 1952->1920 1954->1932 1954->1955 1955->1932 1957->1941 1960 7ff666001b11-7ff666001b19 1957->1960 1960->1932 1960->1941
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: DloadSection$AccessExceptionProtectRaiseReleaseWrite$ErrorLastLibraryLoad
                                            • String ID: H
                                            • API String ID: 3432403771-2852464175
                                            • Opcode ID: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                                            • Instruction ID: 11a5147db15f80f687a891f14a8a5715794893608c713381f841c1c2cb46dc4a
                                            • Opcode Fuzzy Hash: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                                            • Instruction Fuzzy Hash: EE915922A05B12DAEB10CFA5EA842A873B5FB08B98F444135DE0D5F754EF39E545CB40

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1988 7ff665fff4e0-7ff665fff523 1989 7ff665fff894-7ff665fff8b9 call 7ff665fd1fa0 call 7ff666002320 1988->1989 1990 7ff665fff529-7ff665fff565 call 7ff666003cf0 1988->1990 1995 7ff665fff56a-7ff665fff571 1990->1995 1996 7ff665fff567 1990->1996 1998 7ff665fff573-7ff665fff577 1995->1998 1999 7ff665fff582-7ff665fff586 1995->1999 1996->1995 2001 7ff665fff57c-7ff665fff580 1998->2001 2002 7ff665fff579 1998->2002 2003 7ff665fff58b-7ff665fff596 1999->2003 2004 7ff665fff588 1999->2004 2001->2003 2002->2001 2005 7ff665fff59c 2003->2005 2006 7ff665fff628 2003->2006 2004->2003 2007 7ff665fff5a2-7ff665fff5a9 2005->2007 2008 7ff665fff62c-7ff665fff62f 2006->2008 2009 7ff665fff5ae-7ff665fff5b3 2007->2009 2010 7ff665fff5ab 2007->2010 2011 7ff665fff631-7ff665fff635 2008->2011 2012 7ff665fff637-7ff665fff63a 2008->2012 2015 7ff665fff5e5-7ff665fff5f0 2009->2015 2016 7ff665fff5b5 2009->2016 2010->2009 2011->2012 2013 7ff665fff660-7ff665fff673 call 7ff665fe63ac 2011->2013 2012->2013 2014 7ff665fff63c-7ff665fff643 2012->2014 2029 7ff665fff675-7ff665fff693 call 7ff665ff13c4 2013->2029 2030 7ff665fff698-7ff665fff6ed call 7ff66600797c call 7ff665fd129c call 7ff665fe32a8 call 7ff665fd1fa0 2013->2030 2014->2013 2017 7ff665fff645-7ff665fff65c 2014->2017 2019 7ff665fff5f5-7ff665fff5fa 2015->2019 2020 7ff665fff5f2 2015->2020 2021 7ff665fff5ca-7ff665fff5d0 2016->2021 2017->2013 2025 7ff665fff600-7ff665fff607 2019->2025 2026 7ff665fff8ba-7ff665fff8c1 2019->2026 2020->2019 2022 7ff665fff5d2 2021->2022 2023 7ff665fff5b7-7ff665fff5be 2021->2023 2022->2015 2033 7ff665fff5c3-7ff665fff5c8 2023->2033 2034 7ff665fff5c0 2023->2034 2031 7ff665fff60c-7ff665fff612 2025->2031 2032 7ff665fff609 2025->2032 2027 7ff665fff8c3 2026->2027 2028 7ff665fff8c6-7ff665fff8cb 2026->2028 2027->2028 2036 7ff665fff8de-7ff665fff8e6 2028->2036 2037 7ff665fff8cd-7ff665fff8d4 2028->2037 2029->2030 2055 7ff665fff742-7ff665fff74f ShellExecuteExW 2030->2055 2056 7ff665fff6ef-7ff665fff73d call 7ff66600797c call 7ff665fd129c call 7ff665fe5b60 call 7ff665fd1fa0 2030->2056 2031->2026 2040 7ff665fff618-7ff665fff622 2031->2040 2032->2031 2033->2021 2035 7ff665fff5d4-7ff665fff5db 2033->2035 2034->2033 2041 7ff665fff5e0 2035->2041 2042 7ff665fff5dd 2035->2042 2045 7ff665fff8eb-7ff665fff8f6 2036->2045 2046 7ff665fff8e8 2036->2046 2043 7ff665fff8d9 2037->2043 2044 7ff665fff8d6 2037->2044 2040->2006 2040->2007 2041->2015 2042->2041 2043->2036 2044->2043 2045->2008 2046->2045 2058 7ff665fff755-7ff665fff75f 2055->2058 2059 7ff665fff846-7ff665fff84e 2055->2059 2056->2055 2063 7ff665fff761-7ff665fff764 2058->2063 2064 7ff665fff76f-7ff665fff772 2058->2064 2061 7ff665fff882-7ff665fff88f 2059->2061 2062 7ff665fff850-7ff665fff866 2059->2062 2061->1989 2066 7ff665fff87d call 7ff66600220c 2062->2066 2067 7ff665fff868-7ff665fff87b 2062->2067 2063->2064 2068 7ff665fff766-7ff665fff76d 2063->2068 2069 7ff665fff774-7ff665fff77f call 7ff66603e188 2064->2069 2070 7ff665fff78e-7ff665fff7ad call 7ff66603e1b8 call 7ff665fffe24 2064->2070 2066->2061 2067->2066 2074 7ff665fff8fb-7ff665fff903 call 7ff666007904 2067->2074 2068->2064 2076 7ff665fff7e3-7ff665fff7f0 CloseHandle 2068->2076 2069->2070 2085 7ff665fff781-7ff665fff78c ShowWindow 2069->2085 2070->2076 2096 7ff665fff7af-7ff665fff7b2 2070->2096 2081 7ff665fff805-7ff665fff80c 2076->2081 2082 7ff665fff7f2-7ff665fff803 call 7ff665ff13c4 2076->2082 2083 7ff665fff82e-7ff665fff830 2081->2083 2084 7ff665fff80e-7ff665fff811 2081->2084 2082->2081 2082->2083 2083->2059 2091 7ff665fff832-7ff665fff835 2083->2091 2084->2083 2090 7ff665fff813-7ff665fff828 2084->2090 2085->2070 2090->2083 2091->2059 2095 7ff665fff837-7ff665fff845 ShowWindow 2091->2095 2095->2059 2096->2076 2098 7ff665fff7b4-7ff665fff7c5 GetExitCodeProcess 2096->2098 2098->2076 2099 7ff665fff7c7-7ff665fff7dc 2098->2099 2099->2076
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_invalid_parameter_noinfo_noreturn
                                            • String ID: .exe$.inf$Install$p
                                            • API String ID: 1054546013-3607691742
                                            • Opcode ID: f5c8b309920baf1e38cfe499d4066692b9784065f97d1b9ba7782783299fb154
                                            • Instruction ID: 219bc773988c3f062a625c4c02044fa2c0af307ff05c7ed49150d22663f2993e
                                            • Opcode Fuzzy Hash: f5c8b309920baf1e38cfe499d4066692b9784065f97d1b9ba7782783299fb154
                                            • Instruction Fuzzy Hash: B7C18C22F18602D5FA40CB65EA8127963B1AFC9B84F044435CA4E9FBA5DF3DEC95CB04

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                            • String ID:
                                            • API String ID: 3569833718-0
                                            • Opcode ID: c58ef51af4c11ae469b78d40ba7290d4e9656f32b0895ce54e4debee0d1a06d9
                                            • Instruction ID: e036430301841d8381edffb8600dd752260cd91ebdb3ba22c6f6c3a2bad443c1
                                            • Opcode Fuzzy Hash: c58ef51af4c11ae469b78d40ba7290d4e9656f32b0895ce54e4debee0d1a06d9
                                            • Instruction Fuzzy Hash: 7841A131B14642C6F7109F61E914BAA2370EB89B99F441136DD0A9FBA5CE3EEC45CB44
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 3668304517-0
                                            • Opcode ID: 1f4c06cac65006907160b15d3882166ad00f23b738fd29126be59cee5bd80893
                                            • Instruction ID: 3dbf52246cfc00e5d7e977926872f5d8c2630ebcedfb10d9546bf57c393e3dc3
                                            • Opcode Fuzzy Hash: 1f4c06cac65006907160b15d3882166ad00f23b738fd29126be59cee5bd80893
                                            • Instruction Fuzzy Hash: 3B12A062F08B42C5EA10CB65D4466BD6371EB45BA8F400332DE5D9BAD9DF3CE989CB40

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 3818 7ff665fe24c0-7ff665fe24fb 3819 7ff665fe24fd-7ff665fe2504 3818->3819 3820 7ff665fe2506 3818->3820 3819->3820 3821 7ff665fe2509-7ff665fe2578 3819->3821 3820->3821 3822 7ff665fe257a 3821->3822 3823 7ff665fe257d-7ff665fe25a8 CreateFileW 3821->3823 3822->3823 3824 7ff665fe25ae-7ff665fe25de GetLastError call 7ff665fe6a0c 3823->3824 3825 7ff665fe2688-7ff665fe268d 3823->3825 3834 7ff665fe25e0-7ff665fe262a CreateFileW GetLastError 3824->3834 3835 7ff665fe262c 3824->3835 3826 7ff665fe2693-7ff665fe2697 3825->3826 3828 7ff665fe26a5-7ff665fe26a9 3826->3828 3829 7ff665fe2699-7ff665fe269c 3826->3829 3832 7ff665fe26cf-7ff665fe26e3 3828->3832 3833 7ff665fe26ab-7ff665fe26af 3828->3833 3829->3828 3831 7ff665fe269e 3829->3831 3831->3828 3838 7ff665fe26e5-7ff665fe26f0 3832->3838 3839 7ff665fe270c-7ff665fe2735 call 7ff666002320 3832->3839 3833->3832 3837 7ff665fe26b1-7ff665fe26c9 SetFileTime 3833->3837 3836 7ff665fe2632-7ff665fe263a 3834->3836 3835->3836 3842 7ff665fe2673-7ff665fe2686 3836->3842 3843 7ff665fe263c-7ff665fe2653 3836->3843 3837->3832 3840 7ff665fe26f2-7ff665fe26fa 3838->3840 3841 7ff665fe2708 3838->3841 3845 7ff665fe26ff-7ff665fe2703 call 7ff665fd20b0 3840->3845 3846 7ff665fe26fc 3840->3846 3841->3839 3842->3826 3847 7ff665fe2655-7ff665fe2668 3843->3847 3848 7ff665fe266e call 7ff66600220c 3843->3848 3845->3841 3846->3845 3847->3848 3851 7ff665fe2736-7ff665fe273b call 7ff666007904 3847->3851 3848->3842
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: File$CreateErrorLast$Time_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 3536497005-0
                                            • Opcode ID: 33f6b48159d5b7d750ef9f2960fa93fa1ced6f4fdcb3bbf877704cc21e72eec3
                                            • Instruction ID: d886404ffa54d7487d388855f3e0f3efa4591c893e092f30788eb963fc2ee4f8
                                            • Opcode Fuzzy Hash: 33f6b48159d5b7d750ef9f2960fa93fa1ced6f4fdcb3bbf877704cc21e72eec3
                                            • Instruction Fuzzy Hash: FB61E362A18682D5E7208B29F90136E67B1FB85BACF100334DFA94BAD4DF3ED5558B40

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Global$Resource$Object$AllocBitmapCreateDeleteGdipLoadLock$FindFreeFromSizeofStreamUnlock
                                            • String ID: ]
                                            • API String ID: 3561356813-3352871620
                                            • Opcode ID: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                                            • Instruction ID: b47ffc983838df8259e8ffc8c431cd00b40d022c3f2056c9a4e73e936292373b
                                            • Opcode Fuzzy Hash: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                                            • Instruction Fuzzy Hash: FE114F21B09683C2EA649B22E65627953B1AFC8FC0F080435D95D8FF99DE3DEC05CE00

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Message$DialogDispatchPeekTranslate
                                            • String ID:
                                            • API String ID: 1266772231-0
                                            • Opcode ID: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                                            • Instruction ID: 41d3c1a5f3f146ca29dd8ca820cc171ba9fec69c9ee29ed858ea3145174f7a68
                                            • Opcode Fuzzy Hash: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                                            • Instruction Fuzzy Hash: E4F0C935A38583C2EB509B21F995F762371BFD0B06F805532E94E9A854DF3DD908CE04

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: AutoClassCompareCompleteFindNameStringWindow
                                            • String ID: EDIT
                                            • API String ID: 4243998846-3080729518
                                            • Opcode ID: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                                            • Instruction ID: f78f9e24df684a90cd66a5909e0fab3d65ac18791cc8190b6cdeb31d4185a65e
                                            • Opcode Fuzzy Hash: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                                            • Instruction Fuzzy Hash: 54018171B18A83C1FA209B21F9117FA63B0AF98B44F440131C94D8FA95EE3DE94DCE40

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 4184 7ff665fe2ce0-7ff665fe2d0a 4185 7ff665fe2d13-7ff665fe2d1b 4184->4185 4186 7ff665fe2d0c-7ff665fe2d0e 4184->4186 4188 7ff665fe2d2b 4185->4188 4189 7ff665fe2d1d-7ff665fe2d28 GetStdHandle 4185->4189 4187 7ff665fe2ea9-7ff665fe2ec4 call 7ff666002320 4186->4187 4191 7ff665fe2d31-7ff665fe2d3d 4188->4191 4189->4188 4193 7ff665fe2d3f-7ff665fe2d44 4191->4193 4194 7ff665fe2d86-7ff665fe2da2 WriteFile 4191->4194 4195 7ff665fe2daf-7ff665fe2db3 4193->4195 4196 7ff665fe2d46-7ff665fe2d7a WriteFile 4193->4196 4197 7ff665fe2da6-7ff665fe2da9 4194->4197 4199 7ff665fe2ea2-7ff665fe2ea6 4195->4199 4200 7ff665fe2db9-7ff665fe2dbd 4195->4200 4196->4197 4198 7ff665fe2d7c-7ff665fe2d82 4196->4198 4197->4195 4197->4199 4198->4196 4201 7ff665fe2d84 4198->4201 4199->4187 4200->4199 4202 7ff665fe2dc3-7ff665fe2dd8 call 7ff665fdb4f8 4200->4202 4201->4197 4205 7ff665fe2e1e-7ff665fe2e6d call 7ff66600797c call 7ff665fd129c call 7ff665fdbca8 4202->4205 4206 7ff665fe2dda-7ff665fe2de1 4202->4206 4205->4199 4217 7ff665fe2e6f-7ff665fe2e86 4205->4217 4206->4191 4208 7ff665fe2de7-7ff665fe2de9 4206->4208 4208->4191 4210 7ff665fe2def-7ff665fe2e19 4208->4210 4210->4191 4218 7ff665fe2e9d call 7ff66600220c 4217->4218 4219 7ff665fe2e88-7ff665fe2e9b 4217->4219 4218->4199 4219->4218 4220 7ff665fe2ec5-7ff665fe2ecb call 7ff666007904 4219->4220
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: FileWrite$Handle
                                            • String ID:
                                            • API String ID: 4209713984-0
                                            • Opcode ID: 0e24b38da4911ce84cd1995b05bc76a48cdbb6549566894b7731c3bd6f5b2069
                                            • Instruction ID: b87534eb534045873ba62fc76fae29ae2f2d68d5fe593ec1fe77468a03b8851c
                                            • Opcode Fuzzy Hash: 0e24b38da4911ce84cd1995b05bc76a48cdbb6549566894b7731c3bd6f5b2069
                                            • Instruction Fuzzy Hash: FF51E862A19583E2EA60CB65E94577A6370FF45B94F440131DA0D8F694EF3EE985CB00

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$TextWindow
                                            • String ID:
                                            • API String ID: 2912839123-0
                                            • Opcode ID: f8a7328c73512b25e0e7f4217039bd58d5acfa9dc3efb5ee78f1a139c28ede0e
                                            • Instruction ID: c782d3fcd909a946cfbac71e16fa60f7b7b29cbda61892f97ecbcdb6b5a434f1
                                            • Opcode Fuzzy Hash: f8a7328c73512b25e0e7f4217039bd58d5acfa9dc3efb5ee78f1a139c28ede0e
                                            • Instruction Fuzzy Hash: D1518D62F28A52C4FB009FA5E9452AD2372AF45BA4F400236DA1D9FBD6DF6DE540C780
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 1452418845-0
                                            • Opcode ID: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                                            • Instruction ID: 2c0f3c6e3c52e5c6a8584a9faaa4896d3f77584fa06f5bf55f5494be6e2baa6b
                                            • Opcode Fuzzy Hash: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                                            • Instruction Fuzzy Hash: 81314720A4C643D1FA59AF64B7113BA22B1AF44384F440435EA0ECF6D3EE2EB9448AD0

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: CreateDirectory$ErrorLast_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 2359106489-0
                                            • Opcode ID: c692564d5d1c2d87129f870fd8c4aa882645ff23391cbc0b7309d447f995f5b9
                                            • Instruction ID: aacb9e58f9537567b1b0c11427937bacd0fc1ec9078684be4abe65265eeb8507
                                            • Opcode Fuzzy Hash: c692564d5d1c2d87129f870fd8c4aa882645ff23391cbc0b7309d447f995f5b9
                                            • Instruction Fuzzy Hash: 4331FA21A0C6C2D1EA609B25E54A1796371FF89B90F500631EE8DCF6E4DF3CF9458A00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ErrorLast$FileHandleRead
                                            • String ID:
                                            • API String ID: 2244327787-0
                                            • Opcode ID: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                                            • Instruction ID: 18271fe11484e78a382cbf35cd1ded91738d524358246a372e9004de666a1949
                                            • Opcode Fuzzy Hash: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                                            • Instruction Fuzzy Hash: 3A218021E4C583D9EA609B51E801339A3B0FB45F98F144530DA5D8F698EF7EDD858F11
                                            APIs
                                              • Part of subcall function 00007FF665FEECD8: ResetEvent.KERNEL32 ref: 00007FF665FEECF1
                                              • Part of subcall function 00007FF665FEECD8: ReleaseSemaphore.KERNEL32 ref: 00007FF665FEED07
                                            • ReleaseSemaphore.KERNEL32 ref: 00007FF665FEE974
                                            • CloseHandle.KERNELBASE ref: 00007FF665FEE993
                                            • DeleteCriticalSection.KERNEL32 ref: 00007FF665FEE9AA
                                            • CloseHandle.KERNEL32 ref: 00007FF665FEE9B7
                                              • Part of subcall function 00007FF665FEEA5C: WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF665FEE95F,?,?,?,00007FF665FE463A,?,?,?), ref: 00007FF665FEEA63
                                              • Part of subcall function 00007FF665FEEA5C: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF665FEE95F,?,?,?,00007FF665FE463A,?,?,?), ref: 00007FF665FEEA6E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: CloseHandleReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                            • String ID:
                                            • API String ID: 502429940-0
                                            • Opcode ID: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                                            • Instruction ID: 603c0fcc5c32db15a1fcfdc042c63e3a1abfed31093b6386b8ec058bd1642306
                                            • Opcode Fuzzy Hash: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                                            • Instruction Fuzzy Hash: C3014033A15A81E2E649DB61F64526DB371FB84BC0F004031DB6D4B665CF39E5B4CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Thread$CreatePriority
                                            • String ID: CreateThread failed
                                            • API String ID: 2610526550-3849766595
                                            • Opcode ID: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                                            • Instruction ID: 849ce5bb1668c3fb3963c50e5dedbdba420b2ffab803f00f43a26ae20c3f77f9
                                            • Opcode Fuzzy Hash: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                                            • Instruction Fuzzy Hash: E3116031A09A82D1E700DF10F942269B370FB84B88F544636DA4E8F669DF3DE945CF40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: DirectoryInitializeMallocSystem
                                            • String ID: riched20.dll
                                            • API String ID: 174490985-3360196438
                                            • Opcode ID: 0d85db053d286d1bd0fa19ead2840fc3f5149c6ee0f027e6ed6c33eb2c824e37
                                            • Instruction ID: 2b68afed9cf1e3e2d3d908fef40f8d8e197aab2c8af4b68102266bb90b38014c
                                            • Opcode Fuzzy Hash: 0d85db053d286d1bd0fa19ead2840fc3f5149c6ee0f027e6ed6c33eb2c824e37
                                            • Instruction Fuzzy Hash: 00F0AF71618A82C2EB018F20F4046AAB3B0FB88714F400136EA8D8EB64DF7DE94CCF00
                                            APIs
                                              • Part of subcall function 00007FF665FF853C: GlobalMemoryStatusEx.KERNEL32 ref: 00007FF665FF856C
                                              • Part of subcall function 00007FF665FEAAE0: LoadStringW.USER32 ref: 00007FF665FEAB67
                                              • Part of subcall function 00007FF665FEAAE0: LoadStringW.USER32 ref: 00007FF665FEAB80
                                              • Part of subcall function 00007FF665FD1FA0: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665FD1FFB
                                              • Part of subcall function 00007FF665FD129C: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF665FD1396
                                            • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6660001BB
                                            • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6660001C1
                                            • SendDlgItemMessageW.USER32 ref: 00007FF6660001F2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$LoadString$Concurrency::cancel_current_taskGlobalItemMemoryMessageSendStatus
                                            • String ID:
                                            • API String ID: 3106221260-0
                                            • Opcode ID: 5e1efcc2b385ec2e27c5c3e9b0bda95dd4af1554cfa52ada46e12f5842fe570c
                                            • Instruction ID: 459c1ff6ff98d66c72049d56f475b98d7bc365dc9a7de55f32f25a4cef8305f9
                                            • Opcode Fuzzy Hash: 5e1efcc2b385ec2e27c5c3e9b0bda95dd4af1554cfa52ada46e12f5842fe570c
                                            • Instruction Fuzzy Hash: CE51B162F18642D6FB109FA1E4562FD2372AB85B88F404235DA4D9F7D6DE3DE940C780
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: CreateFile$_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 2272807158-0
                                            • Opcode ID: c0a24921bb432fc979f0151b166e22e2d4d2ab91ccee52ff8beeeb5fa3cca71f
                                            • Instruction ID: ef874a2f89c3fb7f1a06f4d2e4622d161fc2616a73d57359b2ea87c2ce047024
                                            • Opcode Fuzzy Hash: c0a24921bb432fc979f0151b166e22e2d4d2ab91ccee52ff8beeeb5fa3cca71f
                                            • Instruction Fuzzy Hash: 2041D072A08786D2EB248B15E84526D63B1FB85BB4F105334DFAD4BAD5DF3DE9908B00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: TextWindow$Length_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 2176759853-0
                                            • Opcode ID: 41410b057bf1bfc832f9111b5635005432e9644e209f963b7c0d07f0c95fee55
                                            • Instruction ID: 54da17babd421b1041cc842ac0cc4f1b5d413eb2ed7316e3a2b2b27aaca9fc86
                                            • Opcode Fuzzy Hash: 41410b057bf1bfc832f9111b5635005432e9644e209f963b7c0d07f0c95fee55
                                            • Instruction Fuzzy Hash: D821AF72A28B8281EA108B65F94057AB374FB89BD0F144331EF9D4BB95CF3DE5808B40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: std::bad_alloc::bad_alloc
                                            • String ID:
                                            • API String ID: 1875163511-0
                                            • Opcode ID: 5d5f35b7d0b1a8ec44982466ed86c266d3277025963138b758b7e20b27780546
                                            • Instruction ID: 71341ccc8182b751e2a1709f9c7b20312327f9f40ff1323704fcbe04d83ee72f
                                            • Opcode Fuzzy Hash: 5d5f35b7d0b1a8ec44982466ed86c266d3277025963138b758b7e20b27780546
                                            • Instruction Fuzzy Hash: DD318463A0C686D1FB249B14E9453B963B0FB90F84F544031E24D9F9A9DF7EE945CB01
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 1203560049-0
                                            • Opcode ID: a1f7dc1dbaba3642fc9690cddce522cfa30acb7a6fd15afbd6a0ae69969149b0
                                            • Instruction ID: d969c8ae875923cccefc9de6d00b32af7f6c9df162608d7f9868050b3cf8dea1
                                            • Opcode Fuzzy Hash: a1f7dc1dbaba3642fc9690cddce522cfa30acb7a6fd15afbd6a0ae69969149b0
                                            • Instruction Fuzzy Hash: E321D622A18685D1EA208F25F4462696371FF88B94F104230EA9D8B6E9DF3CE940CE40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: DeleteFile$_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 3118131910-0
                                            • Opcode ID: 69d2c27007a20e930861445e234d5951a1cf09c7b93575dd70fe51422861bc3e
                                            • Instruction ID: 2ef04d1255a6cd12068d3891fa4475b6b53a79a43637a5e7a8890aac399050b9
                                            • Opcode Fuzzy Hash: 69d2c27007a20e930861445e234d5951a1cf09c7b93575dd70fe51422861bc3e
                                            • Instruction Fuzzy Hash: 41219032A187C1D1EA108B25F84522A6370FB89B94F501230EADE8BAE9DF3DE540CE40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 1203560049-0
                                            • Opcode ID: 07782a0afab47d92a22bff3076416a7edfcd43da74ab10a948eda14518e6746e
                                            • Instruction ID: d0059feff49f62c9086de067798f04e9444a389baf39152a1d55c61413388cac
                                            • Opcode Fuzzy Hash: 07782a0afab47d92a22bff3076416a7edfcd43da74ab10a948eda14518e6746e
                                            • Instruction Fuzzy Hash: 6E218832A187C1D1EA108B19F54512A6371FBC9BA4F500331EA9D8B7E5DF3DE940CB40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Process$CurrentExitTerminate
                                            • String ID:
                                            • API String ID: 1703294689-0
                                            • Opcode ID: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                                            • Instruction ID: 9ebd2239ff41b78dff44ab917444e373084bdbfe5ac5a26a2f2edba30751443c
                                            • Opcode Fuzzy Hash: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                                            • Instruction Fuzzy Hash: 4BE04F28B04305C6EB546F71BA953792376AF88745F104438D80E8F396CF3FA4098F80
                                            APIs
                                            • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665FDF895
                                            • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665FDF89B
                                              • Part of subcall function 00007FF665FE3EC8: FindClose.KERNELBASE(?,?,00000000,00007FF665FF0811), ref: 00007FF665FE3EFD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$CloseFind
                                            • String ID:
                                            • API String ID: 3587649625-0
                                            • Opcode ID: ff05a0ad3b9c4f4235e1478b2c69edca0b6840efc482a2fd304b53339564797e
                                            • Instruction ID: 1fa421548ce661964818c951df20d2142649e6f3d3e0998cf2ee1c41bb22af66
                                            • Opcode Fuzzy Hash: ff05a0ad3b9c4f4235e1478b2c69edca0b6840efc482a2fd304b53339564797e
                                            • Instruction Fuzzy Hash: 4D91B273A18781D0EB10DF64D4455AD6371FB84B98F404231EA4C8BAE9DF7CD985CB40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 3668304517-0
                                            • Opcode ID: dfb5e971954e8ecfa9eab7821141cd8d5f8eac190b9055cad7bdf59bd5ea8a56
                                            • Instruction ID: 95f2bffd940ee917230606b62e747644bf5077ad80214454978c856d3b05d562
                                            • Opcode Fuzzy Hash: dfb5e971954e8ecfa9eab7821141cd8d5f8eac190b9055cad7bdf59bd5ea8a56
                                            • Instruction Fuzzy Hash: 3D41A062F14652C5FB00DBB1E4426AD2371AF45FD8F145235EE1DAFADADE3CA8828640
                                            APIs
                                            • SetFilePointer.KERNELBASE(00000000,00000002,?,00000F99,?,00007FF665FE274D), ref: 00007FF665FE28A9
                                            • GetLastError.KERNEL32(?,00007FF665FE274D), ref: 00007FF665FE28B8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastPointer
                                            • String ID:
                                            • API String ID: 2976181284-0
                                            • Opcode ID: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                                            • Instruction ID: 4a5b5f3ccedd5c896731fc22caa55cf1dda2d66a77fc6c0949cac2679d1bb4f8
                                            • Opcode Fuzzy Hash: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                                            • Instruction Fuzzy Hash: BE31A632B19A97E2EA644B2ADD416766370AF44FD4F140132DE5D8F7A0EF3EDE418A40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Item_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 1746051919-0
                                            • Opcode ID: 8d40ccc84b580f33f3dafee36447434fcdf79cb76bf08fc935a239d44bb79c76
                                            • Instruction ID: eb285124fd14b3d29c97e1a60b1218af2507e1dd2dfe7a4d7698293ff5e81a78
                                            • Opcode Fuzzy Hash: 8d40ccc84b580f33f3dafee36447434fcdf79cb76bf08fc935a239d44bb79c76
                                            • Instruction Fuzzy Hash: 8331B022A18786C2EA149F55F9453AEB370EB84B94F444331EB9C4FB95DF3DE9408B40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: File$BuffersFlushTime
                                            • String ID:
                                            • API String ID: 1392018926-0
                                            • Opcode ID: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                                            • Instruction ID: a2c5c9106565d5952d429817168e6a85a331082bd9e05be179d1e746e0a99173
                                            • Opcode Fuzzy Hash: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                                            • Instruction Fuzzy Hash: 0B21A322E097C7F5EA628E51E8067B657B1AF41B98F154031DE4C4B295FE3EDD46CA00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: LoadString
                                            • String ID:
                                            • API String ID: 2948472770-0
                                            • Opcode ID: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                                            • Instruction ID: db6e598f26289f54b5b9441fdfb78b57445db8cc502d25d1ce157a258ae78e96
                                            • Opcode Fuzzy Hash: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                                            • Instruction Fuzzy Hash: 60117970B09A82C6EA008F16FA4486877B1BB88FC1F544536CE4DEB721DE7DE9418B84
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastPointer
                                            • String ID:
                                            • API String ID: 2976181284-0
                                            • Opcode ID: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                                            • Instruction ID: 232eae8a800e2ca537c9d65ed51bb33f3b2939ac5ef7670888d462b280034b40
                                            • Opcode Fuzzy Hash: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                                            • Instruction Fuzzy Hash: 61116321A18686D1EB509B25EC426696370EB44FB8F544731DA6D9B2D4DF3ED982CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ItemRectTextWindow$Clientswprintf
                                            • String ID:
                                            • API String ID: 3322643685-0
                                            • Opcode ID: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                                            • Instruction ID: 15d5af056c5a2743c4323842a942d381e0a244ba8e41e4b1a17e4cd5402cb51d
                                            • Opcode Fuzzy Hash: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                                            • Instruction Fuzzy Hash: 43015214A0D28BC1FE555751F959BB957B29F85B84F080235D84D8F299EE3EEC848B40
                                            APIs
                                            • GetCurrentProcess.KERNEL32(?,?,?,?,00007FF665FEEBAD,?,?,?,?,00007FF665FE5752,?,?,?,00007FF665FE56DE), ref: 00007FF665FEEB5C
                                            • GetProcessAffinityMask.KERNEL32 ref: 00007FF665FEEB6F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Process$AffinityCurrentMask
                                            • String ID:
                                            • API String ID: 1231390398-0
                                            • Opcode ID: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                                            • Instruction ID: c43748049bed43453b533486e67eb1c73d1b45e5782327d5bd2463fe8db285dd
                                            • Opcode Fuzzy Hash: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                                            • Instruction Fuzzy Hash: 55E02B61F24586D2DF498F55E4514E9B3B2BFC8F40B848035D60BCB614DE3DE6498F00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                            • String ID:
                                            • API String ID: 1173176844-0
                                            • Opcode ID: c507040392a2377e4895e65205c3b95c5fe2146e3485fc393c80d7c2ffdcaf26
                                            • Instruction ID: 52961b33c3afb700bf4fe8ba411ecc51400fa40fc01d66f5d26772c29d6c285e
                                            • Opcode Fuzzy Hash: c507040392a2377e4895e65205c3b95c5fe2146e3485fc393c80d7c2ffdcaf26
                                            • Instruction Fuzzy Hash: DCE0EC60E1D107C2FD582AA63A661B401744F29770E181730DE3E8D2C3EE1FA8918990
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 485612231-0
                                            • Opcode ID: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                                            • Instruction ID: 4e2b85efde8f04ff851a54aafa31056d3f122bf01e22d6496085f5f120b009dc
                                            • Opcode Fuzzy Hash: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                                            • Instruction Fuzzy Hash: 5CE08C60E09103C2FF08AFF2BA155B863B09F94B55B040030C90DCE3D2EE3EA6828E60
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 3668304517-0
                                            • Opcode ID: 33f84bb692d5293623e3afab48e0196588e748b5593b514a14a7011791a52734
                                            • Instruction ID: 51b73c158864559998518309c228c80c8a0001f4d99b1f13c8a2db367401903e
                                            • Opcode Fuzzy Hash: 33f84bb692d5293623e3afab48e0196588e748b5593b514a14a7011791a52734
                                            • Instruction Fuzzy Hash: F2D18E62B08682D6EB688B25D6452B9B7B1FB05FC4F040635CB5D8F7E5CF39E9618B00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: CompareString_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 1017591355-0
                                            • Opcode ID: d592eabcbe9af83a373b8b16b8cc449c2e49e9c4d9704c8b20a1f27e4dd7bd8a
                                            • Instruction ID: bd765a60d1de815fe42952836673bb1bd90803d534e63b23ad751204452a451e
                                            • Opcode Fuzzy Hash: d592eabcbe9af83a373b8b16b8cc449c2e49e9c4d9704c8b20a1f27e4dd7bd8a
                                            • Instruction Fuzzy Hash: F661E211A0C6C7D5EA649A15E5262BE63B2AF80FD4F144131EE4DCFAC6EE7CEC418A10
                                            APIs
                                              • Part of subcall function 00007FF665FEE948: ReleaseSemaphore.KERNEL32 ref: 00007FF665FEE974
                                              • Part of subcall function 00007FF665FEE948: CloseHandle.KERNELBASE ref: 00007FF665FEE993
                                              • Part of subcall function 00007FF665FEE948: DeleteCriticalSection.KERNEL32 ref: 00007FF665FEE9AA
                                              • Part of subcall function 00007FF665FEE948: CloseHandle.KERNEL32 ref: 00007FF665FEE9B7
                                            • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665FF1ACB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: CloseHandle$CriticalDeleteReleaseSectionSemaphore_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 904680172-0
                                            • Opcode ID: 385a02acb57b8c59120be0c34ea2f347caf4614f8b231966af7ef80d9636563d
                                            • Instruction ID: fe18eb7c10a040eed5a53c5f122f6bd986c44e8a85b8d8ee03264f85f465666e
                                            • Opcode Fuzzy Hash: 385a02acb57b8c59120be0c34ea2f347caf4614f8b231966af7ef80d9636563d
                                            • Instruction Fuzzy Hash: 98618CA2B15A85E2EE08DF65D6950BC7375FB80F90B544236D72D8FA82CF39E860C740
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 3668304517-0
                                            • Opcode ID: af1c5978b98fda9a8b2c18bb3354693c366be56127f8703ff8eb31aec807914d
                                            • Instruction ID: e8c3985cd2a078d9b88cefe25f992ad43a1b68953c4f6bf37fa76ea7ec57abba
                                            • Opcode Fuzzy Hash: af1c5978b98fda9a8b2c18bb3354693c366be56127f8703ff8eb31aec807914d
                                            • Instruction Fuzzy Hash: 9951A062A08682D0EA149F25E8463A97771FB85FC4F440236EF5D8F396DE3DE885CB40
                                            APIs
                                              • Part of subcall function 00007FF665FE3EC8: FindClose.KERNELBASE(?,?,00000000,00007FF665FF0811), ref: 00007FF665FE3EFD
                                            • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665FDE993
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: CloseFind_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 1011579015-0
                                            • Opcode ID: 1ed87b38f53b3cf50e1c2200cac218cce737f4e527dde5fbd83d50be022e59e1
                                            • Instruction ID: 9916ec4fe1927ad83af4780a98e8e35925d7888a562d90ca2480b433a2a06ac1
                                            • Opcode Fuzzy Hash: 1ed87b38f53b3cf50e1c2200cac218cce737f4e527dde5fbd83d50be022e59e1
                                            • Instruction Fuzzy Hash: 4D514B22A09686C1FB609F24E48636D7371FB84F84F440236EB8D9B6A5DF3DE841CB51
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 3668304517-0
                                            • Opcode ID: 8f5a58c5ca3b50e021cd7d957f77a4d85bae32fcfe51cc18db3578f951f03667
                                            • Instruction ID: d56253eadd460b310d2175107779bd5ed3ba023bc2c7c68ef228df2c1d8891f0
                                            • Opcode Fuzzy Hash: 8f5a58c5ca3b50e021cd7d957f77a4d85bae32fcfe51cc18db3578f951f03667
                                            • Instruction Fuzzy Hash: 8841F762B18AC192EA149B17E64137AA361FB84FC0F448536EE5C8FF4ADF3CD9918740
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 3668304517-0
                                            • Opcode ID: e2b4454f69462049619ab9b1c97d5eb6f0ad1ff01e3f8e4e7caa5ef109cfce74
                                            • Instruction ID: c30862d5a3af6249085df08278bd8be95266c939eddd76388b51c7f8cfb9029e
                                            • Opcode Fuzzy Hash: e2b4454f69462049619ab9b1c97d5eb6f0ad1ff01e3f8e4e7caa5ef109cfce74
                                            • Instruction Fuzzy Hash: 4141D262A08B86D0EF159F29E54A3792371EB85FD8F141135EB4D8B6E9DF3DE8408B40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: HandleModule$AddressFreeLibraryProc
                                            • String ID:
                                            • API String ID: 3947729631-0
                                            • Opcode ID: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                                            • Instruction ID: d98c64526714b9d2a11bd1bb4d4e1a38b74026eeb9c60b608dd1c5d87afeab4a
                                            • Opcode Fuzzy Hash: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                                            • Instruction Fuzzy Hash: 0541AE22A18643D2FB249F15BA5017863B1AFA4B84F544476DA0DDF6A1EF7FE8418F80
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                                            • String ID:
                                            • API String ID: 680105476-0
                                            • Opcode ID: 8615e64c65e08c4765cb9fe696173ca1d24e70e0804716bd186f62c3c2783a0a
                                            • Instruction ID: ba2087fad38eed9a7317072ac4bee1fa9fe50a6472ff7a7e8b697b8be9b1939c
                                            • Opcode Fuzzy Hash: 8615e64c65e08c4765cb9fe696173ca1d24e70e0804716bd186f62c3c2783a0a
                                            • Instruction Fuzzy Hash: B4217C22A48651C5EA149F92E5016797360AB05FF0F680B30DE7E8FBD1DE7DE8518B44
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 3215553584-0
                                            • Opcode ID: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                                            • Instruction ID: bc2c74df57107eca904a9f2105da2f4951812b4d5ac7cda545935fe89f493fd2
                                            • Opcode Fuzzy Hash: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                                            • Instruction Fuzzy Hash: 13117932A0C683C2E6149F90B640679B2B4FB51388F540174EA8DDF696DF2EEC208F44
                                            APIs
                                              • Part of subcall function 00007FF665FFF0A4: GetDlgItem.USER32 ref: 00007FF665FFF0E3
                                              • Part of subcall function 00007FF665FFF0A4: ShowWindow.USER32 ref: 00007FF665FFF109
                                              • Part of subcall function 00007FF665FFF0A4: SendMessageW.USER32 ref: 00007FF665FFF11E
                                              • Part of subcall function 00007FF665FFF0A4: SendMessageW.USER32 ref: 00007FF665FFF136
                                              • Part of subcall function 00007FF665FFF0A4: SendMessageW.USER32 ref: 00007FF665FFF157
                                              • Part of subcall function 00007FF665FFF0A4: SendMessageW.USER32 ref: 00007FF665FFF173
                                              • Part of subcall function 00007FF665FFF0A4: SendMessageW.USER32 ref: 00007FF665FFF1B6
                                              • Part of subcall function 00007FF665FFF0A4: SendMessageW.USER32 ref: 00007FF665FFF1D4
                                              • Part of subcall function 00007FF665FFF0A4: SendMessageW.USER32 ref: 00007FF665FFF1E8
                                              • Part of subcall function 00007FF665FFF0A4: SendMessageW.USER32 ref: 00007FF665FFF212
                                              • Part of subcall function 00007FF665FFF0A4: SendMessageW.USER32 ref: 00007FF665FFF22A
                                            • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665FFFD03
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: MessageSend$ItemShowWindow_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 1587882848-0
                                            • Opcode ID: 4e31503daed93d9188896172121f8db9e22501b53953b377ed489f9acb82b46e
                                            • Instruction ID: 60cf422eddb4b58a387741c7b5a486a8af8000a4d906c96f56cfe13909cad614
                                            • Opcode Fuzzy Hash: 4e31503daed93d9188896172121f8db9e22501b53953b377ed489f9acb82b46e
                                            • Instruction Fuzzy Hash: 7C01C862A28685C1ED149B64E44637D6331EFC9B94F500331EA9C8FBDADE3CE540CB04
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 3668304517-0
                                            • Opcode ID: 58579bce4bc1021bb98a03ef504395245509186ce5efb4717343b6b5f18682a3
                                            • Instruction ID: d92c5a9c07246c29efd9c669990d3f482a97ac7d69b772e3ebbb2693512b3064
                                            • Opcode Fuzzy Hash: 58579bce4bc1021bb98a03ef504395245509186ce5efb4717343b6b5f18682a3
                                            • Instruction Fuzzy Hash: 5A01C462E18685C1EA119B28E4422297371FF89B94F405331EB9C4FAE6DF3DE4408B04
                                            APIs
                                              • Part of subcall function 00007FF666001604: GetModuleHandleW.KERNEL32(?,?,?,00007FF666001573,?,?,?,00007FF66600192A), ref: 00007FF66600162B
                                            • DloadProtectSection.DELAYIMP ref: 00007FF6660015C9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: DloadHandleModuleProtectSection
                                            • String ID:
                                            • API String ID: 2883838935-0
                                            • Opcode ID: 902d746097657f35995c40355b3f554eba39218e3fb79a70aefbb70b68ceb6fd
                                            • Instruction ID: ebb0b5270ff0deda773c6dd8df147ee55c4406ef9eaa98367868017d4121b801
                                            • Opcode Fuzzy Hash: 902d746097657f35995c40355b3f554eba39218e3fb79a70aefbb70b68ceb6fd
                                            • Instruction Fuzzy Hash: FE11BA65D08607D1FB619F85BB457702370AF1834EF1400B4C90EDF2A1EF2EA9958F81
                                            APIs
                                              • Part of subcall function 00007FF665FE40BC: FindFirstFileW.KERNELBASE ref: 00007FF665FE410B
                                              • Part of subcall function 00007FF665FE40BC: FindFirstFileW.KERNELBASE ref: 00007FF665FE415E
                                              • Part of subcall function 00007FF665FE40BC: GetLastError.KERNEL32 ref: 00007FF665FE41AF
                                            • FindClose.KERNELBASE(?,?,00000000,00007FF665FF0811), ref: 00007FF665FE3EFD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Find$FileFirst$CloseErrorLast
                                            • String ID:
                                            • API String ID: 1464966427-0
                                            • Opcode ID: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                                            • Instruction ID: 8b3ced611ac6a2142de1a88eb4ffff346d25916b309405a9ed2b05994d69eaa5
                                            • Opcode Fuzzy Hash: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                                            • Instruction Fuzzy Hash: 61F0FF629082C1D5EA549FB4E10A27833709B4AFB4F181338EA3D4B2D7CE38EC848F41
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: File
                                            • String ID:
                                            • API String ID: 749574446-0
                                            • Opcode ID: 182d9e1e92039184aab4081fafd09b1cf385b4bd914a3c272b872952a66d9790
                                            • Instruction ID: 121084dae16dbbcb356c0fe22f0ff3499ee87dd2b7a7cd856c0967959ff9789a
                                            • Opcode Fuzzy Hash: 182d9e1e92039184aab4081fafd09b1cf385b4bd914a3c272b872952a66d9790
                                            • Instruction Fuzzy Hash: 86E0CD11B10555C1EF249B76DC426345330EF4CF85B441030CE0D4F321CE3AC8818E00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID:
                                            • API String ID: 3081899298-0
                                            • Opcode ID: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                                            • Instruction ID: 93a1db98e2ca5f2fad86ae0cfb4cc893868cb07d37d120a23a2151266f0315e6
                                            • Opcode Fuzzy Hash: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                                            • Instruction Fuzzy Hash: C6D01311D05441D2DD505775DC5203C23605F51735F740730D53DC75D2DE2E95955711
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: CurrentDirectory
                                            • String ID:
                                            • API String ID: 1611563598-0
                                            • Opcode ID: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                                            • Instruction ID: 57d60166868c89a5b9ba3f1df1b3191a2ad3659218f7788080fb831ce133992f
                                            • Opcode Fuzzy Hash: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                                            • Instruction Fuzzy Hash: 2EC08C20F0A582C2DA085B26C8CA11813B4BB40F08B614034C20CCA120CE3DCAEA9B85
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: AllocHeap
                                            • String ID:
                                            • API String ID: 4292702814-0
                                            • Opcode ID: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                                            • Instruction ID: e998dc72f3d1de7e1a73f2a9e0468b1245e01c9ad7a5585792533e98ee4f7bd7
                                            • Opcode Fuzzy Hash: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                                            • Instruction Fuzzy Hash: 18F06D94B09307C5FE545E65BB113B452B85FC6B80F2C5430CD0ECE3C1EE2EE6815AA8
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: CloseHandle
                                            • String ID:
                                            • API String ID: 2962429428-0
                                            • Opcode ID: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                                            • Instruction ID: 809f954f6d2c0985069a0050e4d270ef206beb7b0eb1ad9b27fb65acd1182183
                                            • Opcode Fuzzy Hash: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                                            • Instruction Fuzzy Hash: 33F06D22A09682E5FB248B20E8426696771EB54FB8F494335D7398A1D4DF39DA958B00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: AllocHeap
                                            • String ID:
                                            • API String ID: 4292702814-0
                                            • Opcode ID: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                                            • Instruction ID: d3dfb9c882fb12ecf7956b68c7378d4397e46e354abd197c7c926eed54b5b11e
                                            • Opcode Fuzzy Hash: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                                            • Instruction Fuzzy Hash: F5F05810B19207C5FF146EB17A602B466B09F847A0F081634D92ECE2C1DE2EA4808AA1
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$CloseErrorFileHandleLastwcscpy$ControlCreateCurrentDeleteDeviceDirectoryProcessRemove
                                            • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                            • API String ID: 2659423929-3508440684
                                            • Opcode ID: 5e44b816d37aa15c8bc93fb647ff289bd59fc38e1ab6cc2ff94f4b8665b3db8a
                                            • Instruction ID: d8557d50adc7c7e9cce82c7fac3a1209998fc44a5f5938d366028531ec4bfdfe
                                            • Opcode Fuzzy Hash: 5e44b816d37aa15c8bc93fb647ff289bd59fc38e1ab6cc2ff94f4b8665b3db8a
                                            • Instruction Fuzzy Hash: 0662B262F18682C5FB009BB4E5452BD2371EB85BA4F504331DA6D9BAD9DF3CE984CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastLoadString$Concurrency::cancel_current_taskInit_thread_footer
                                            • String ID: %ls$%s: %s
                                            • API String ID: 2539828978-2259941744
                                            • Opcode ID: 9b0d0f946a2626f580f858c3f49b622192f0469af18ec8d17628c736e928748c
                                            • Instruction ID: 710226da56302d45dbf1b83a1526087ca4c325ed43cc455797aa6d8cb256ef33
                                            • Opcode Fuzzy Hash: 9b0d0f946a2626f580f858c3f49b622192f0469af18ec8d17628c736e928748c
                                            • Instruction Fuzzy Hash: EAB2CF62958682D1EA109B25E5561BEA331FFC5B90F104336E6DD8FBD6EE7CE940CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfomemcpy_s
                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                            • API String ID: 1759834784-2761157908
                                            • Opcode ID: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                                            • Instruction ID: da36d2206a690b22097bddcd516b47b528c80cbf428477abbf8111388fc71430
                                            • Opcode Fuzzy Hash: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                                            • Instruction Fuzzy Hash: 69B2DA72A08182CBE7298EA5E6406FD77B5FB4878CF505135DA099FB84DF3AE9448F40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: NamePath$File_invalid_parameter_noinfo_noreturn$LongMoveShort$CompareCreateString
                                            • String ID: rtmp
                                            • API String ID: 3587137053-870060881
                                            • Opcode ID: 1ffb243e08b8fb519680c97ae3cffafb4c96412676108627d27e6b4ac5b9e215
                                            • Instruction ID: 0d103b35c5b3f27f48a4cd3652a88a5601edf5c7f5e2d2141d13add41c57885f
                                            • Opcode Fuzzy Hash: 1ffb243e08b8fb519680c97ae3cffafb4c96412676108627d27e6b4ac5b9e215
                                            • Instruction Fuzzy Hash: 62F1B322B18A82D1EB10DB65D4815FD7771FB85B94F501232EA4DCBAA9DF3CE984CB40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: FullNamePath_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 1693479884-0
                                            • Opcode ID: 1e7c5ac9d18d4859634b67c516166c1ae8f0dcc4e332a300e03a2fc1b19988e3
                                            • Instruction ID: 046b4992fc2860233ab1ea1b5780a2dfcc873d0b973a56c9d7b0ff06df33f5c0
                                            • Opcode Fuzzy Hash: 1e7c5ac9d18d4859634b67c516166c1ae8f0dcc4e332a300e03a2fc1b19988e3
                                            • Instruction Fuzzy Hash: D0A1C262F15A92D4FE109BB9D8451BC2331AB45FE4B144231DE2EAFBC9DE3CE8818640
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 3140674995-0
                                            • Opcode ID: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                                            • Instruction ID: 210aee0721c1d0693c6a20f9901d1dbcad9e7d97e52d26b12c2b793bad85e739
                                            • Opcode Fuzzy Hash: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                                            • Instruction Fuzzy Hash: 78315272609B82DAEB648F60F8507ED7370FB48748F444439DA4D8BA99DF39D649CB10
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                            • String ID:
                                            • API String ID: 1239891234-0
                                            • Opcode ID: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                                            • Instruction ID: 4f399c2b45c6f57efcb76333c6c3806952d604e6a93ad0527e7ae3a6a33d1867
                                            • Opcode Fuzzy Hash: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                                            • Instruction Fuzzy Hash: E7318F32608B81D6EB648F65F8406AE73B0FB88758F540135EA8D8BB99DF3DD545CB40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 3668304517-0
                                            • Opcode ID: 42edc099a2e17b02c0b0cf95a9f909a88c5519e6dc28ef395e63bef3918fefcd
                                            • Instruction ID: 90d043f1c2e105b15bb29a9e42f7db24fa8de52412aed5e030e27da08be89d97
                                            • Opcode Fuzzy Hash: 42edc099a2e17b02c0b0cf95a9f909a88c5519e6dc28ef395e63bef3918fefcd
                                            • Instruction Fuzzy Hash: FBB1BE62A14B86C5EB109B65E8456ED7371FB89B84F405331EA4D8BB9ADF3CE940CB00
                                            APIs
                                            • _invalid_parameter_noinfo.LIBCMT ref: 00007FF66600FAC4
                                              • Part of subcall function 00007FF666007934: GetCurrentProcess.KERNEL32(00007FF666010CCD), ref: 00007FF666007961
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: CurrentProcess_invalid_parameter_noinfo
                                            • String ID: *?$.
                                            • API String ID: 2518042432-3972193922
                                            • Opcode ID: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                                            • Instruction ID: 85c638b9631bb900d3f3acdcea3b4d19ecc728b8e73e51573e7aa09e154adb25
                                            • Opcode Fuzzy Hash: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                                            • Instruction Fuzzy Hash: EC511462B14B95C5EF10DFA2AA114B867B8FB88BD8B444531DE1D8FB84EF3DD0428B44
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: memcpy_s
                                            • String ID:
                                            • API String ID: 1502251526-0
                                            • Opcode ID: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                            • Instruction ID: 70dd2407c5d351f520f9f7ba53b6427db9887b3de33139c8ed8287c687138d38
                                            • Opcode Fuzzy Hash: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                            • Instruction Fuzzy Hash: 08D1A432B18286C7DB24CF55B28466AB7A1F799788F148134DB4E9BB44DE3DE881CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ErrorFormatFreeLastLocalMessage
                                            • String ID:
                                            • API String ID: 1365068426-0
                                            • Opcode ID: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                                            • Instruction ID: 119211ddc7b6fb12aab8d084d8be9c567e68fac460e73e6167fd4698e7690981
                                            • Opcode Fuzzy Hash: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                                            • Instruction Fuzzy Hash: D301FF7160C746C2E7509F62F95517AA3A5FB89BC4F484134EA8E8BB45CE3DDA058F40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: .
                                            • API String ID: 0-248832578
                                            • Opcode ID: 7c9d8364e7b62915daf92aecf888b4814fe01b6aae5fc02ec6e7aa2f3019df5b
                                            • Instruction ID: 3c665224e027c6ac7b1d24a7e47b29ab00f3a85da015723b881fe5f4dcf03a2f
                                            • Opcode Fuzzy Hash: 7c9d8364e7b62915daf92aecf888b4814fe01b6aae5fc02ec6e7aa2f3019df5b
                                            • Instruction Fuzzy Hash: E8313B22B086D185FB208E32B9057B9BAA5AB84BE4F148235DE5C8FBC6DE3DD5018744
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ExceptionRaise_clrfp
                                            • String ID:
                                            • API String ID: 15204871-0
                                            • Opcode ID: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                                            • Instruction ID: dd36a2d482a56c450c71d22a8885b7f96317d6752e88f931c248d0d6c5d45efa
                                            • Opcode Fuzzy Hash: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                                            • Instruction Fuzzy Hash: 0EB137B7600B85CAEB168F69D9863687BB0F744B4CF158931DA5D8B7A4CF3AD451CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ObjectRelease$CapsDevice
                                            • String ID:
                                            • API String ID: 1061551593-0
                                            • Opcode ID: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                                            • Instruction ID: 49bd8f4b1cb4debc2d6e7811b869b8301c92545c82aee4ef03687688d2306864
                                            • Opcode Fuzzy Hash: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                                            • Instruction Fuzzy Hash: F581E836B18A05D6EB208FAAE5456AD7771FB88F88F004132DE0D9BB64DF39D545CB40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: FormatInfoLocaleNumber
                                            • String ID:
                                            • API String ID: 2169056816-0
                                            • Opcode ID: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                                            • Instruction ID: 2dcb3eee93a58d6bfa4cbf2ca19cd4ceea659cf0f72ac489295846d0ad8a89c7
                                            • Opcode Fuzzy Hash: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                                            • Instruction Fuzzy Hash: A9113832A08B81D5E6618B11F5006E97374FF88B48F844135DA4D8BA54EF3DA545CB44
                                            APIs
                                              • Part of subcall function 00007FF665FE24C0: CreateFileW.KERNELBASE ref: 00007FF665FE259B
                                              • Part of subcall function 00007FF665FE24C0: GetLastError.KERNEL32 ref: 00007FF665FE25AE
                                              • Part of subcall function 00007FF665FE24C0: CreateFileW.KERNEL32 ref: 00007FF665FE260E
                                              • Part of subcall function 00007FF665FE24C0: GetLastError.KERNEL32 ref: 00007FF665FE2617
                                            • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665FE15D0
                                              • Part of subcall function 00007FF665FE3980: MoveFileW.KERNEL32 ref: 00007FF665FE39BD
                                              • Part of subcall function 00007FF665FE3980: MoveFileW.KERNEL32 ref: 00007FF665FE3A34
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: File$CreateErrorLastMove$_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 34527147-0
                                            • Opcode ID: f4ba19db134fffdb72e5179b0e3b1489712cd3e3a676d213efa016387a492e8d
                                            • Instruction ID: 4493ca28a189030d7f83e7b81ba7cb75db8e0984ced1dc9f1b7e29e6ceef8e06
                                            • Opcode Fuzzy Hash: f4ba19db134fffdb72e5179b0e3b1489712cd3e3a676d213efa016387a492e8d
                                            • Instruction Fuzzy Hash: E391AF22B18686D2EB10DB66E8466AE7371FB45FC4F404032EE0E9BB95DF39D945CB40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Version
                                            • String ID:
                                            • API String ID: 1889659487-0
                                            • Opcode ID: 6220f8f0736b52f52a4f9f0684f7fcd1da0b773ba531a70ae5974f71c0de4052
                                            • Instruction ID: 0f9de3d983ca1f4cf7429b1d1728cda40848ca30be17a2136f02796ea03fff73
                                            • Opcode Fuzzy Hash: 6220f8f0736b52f52a4f9f0684f7fcd1da0b773ba531a70ae5974f71c0de4052
                                            • Instruction Fuzzy Hash: 4F010271A0D683CAE6648B00FA41A7A33B1FB98719F500235D65ECF794DF3DE9048E40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID: 0
                                            • API String ID: 3215553584-4108050209
                                            • Opcode ID: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                                            • Instruction ID: b25ad602d87dbf72a26cd99fdce5f5df703bc33687965e40c4cd29e55fc4d5e0
                                            • Opcode Fuzzy Hash: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                                            • Instruction Fuzzy Hash: 7C81D121A18242E6EEA88E25A24067D23B0FF60744F141A33DD09CF695DF3FE946CF81
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID: 0
                                            • API String ID: 3215553584-4108050209
                                            • Opcode ID: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                                            • Instruction ID: 63254e61ffc88a9cc80fbb95ed59e769c8aaa49efa0f568785562ec2f9c2c933
                                            • Opcode Fuzzy Hash: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                                            • Instruction Fuzzy Hash: BA71C421A0C642E6FE688E19A24027E27B0BF42744F241535DD49CFAD6CF2FE8468FC1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: gj
                                            • API String ID: 0-4203073231
                                            • Opcode ID: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                                            • Instruction ID: 1d7770ba42edac4a26b6250e8fe0c90f873ad42fd6b4a6cef1dc118b3c618bb8
                                            • Opcode Fuzzy Hash: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                                            • Instruction Fuzzy Hash: 0E518F376286908BD724CF25E401A9AB7A5F388758F445126EE4A97B09CF39E945CF40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @
                                            • API String ID: 0-2766056989
                                            • Opcode ID: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                                            • Instruction ID: 7cdcaa0ca10c37e5660e3d3aedda5c5b394d4902fae15617b6e030de516ef192
                                            • Opcode Fuzzy Hash: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                                            • Instruction Fuzzy Hash: 8041BD32714A45C6EE04CF2AE6182A9B3A5EB58FD4B499136DE1DCF794EE3DD042C740
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: HeapProcess
                                            • String ID:
                                            • API String ID: 54951025-0
                                            • Opcode ID: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                                            • Instruction ID: 29716a89fbe12dcc76525bd9ef328c4e39ddd8af5efe8663566248e702abb955
                                            • Opcode Fuzzy Hash: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                                            • Instruction Fuzzy Hash: 92B09220E17A02C2EA082B51BE8225462B4BF48701F988038C50C99320EE2E25A64B00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 93e830777a8553980f5fe243353a36f6d8d27a5fc8052bc9569f2c684e316ecf
                                            • Instruction ID: e1d4513f83c97f132645a2dfd22d1e1ee7b46da89fc2cf30bb3a22c450ff07e1
                                            • Opcode Fuzzy Hash: 93e830777a8553980f5fe243353a36f6d8d27a5fc8052bc9569f2c684e316ecf
                                            • Instruction Fuzzy Hash: D88215A3A096C1C6D705CF29D5092BC7BB1E795F88F198136CA8E8BB85DE3CD845CB11
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                                            • Instruction ID: f25f632bbbe48ff4ec28e41b0dd534875c6f3a64874fd8a1247188d6c2f393e6
                                            • Opcode Fuzzy Hash: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                                            • Instruction Fuzzy Hash: FF627D9AD3AF9A1EE303A53954131D2E35C0EF74C9551E31BFCE431E66EB92A6832314
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 569adc29ececf777b1726fc3f5cd67d4b9927b4b604ee9515eb09b13eba64041
                                            • Instruction ID: 2126f23bd67bb93ed0a7bbe8f645d57f1c110cf08ec6e66ed7fc170aca3b3860
                                            • Opcode Fuzzy Hash: 569adc29ececf777b1726fc3f5cd67d4b9927b4b604ee9515eb09b13eba64041
                                            • Instruction Fuzzy Hash: 5082E0B3A096C18ADB24CE28D4556FC7BB1E795F48F19C136CA4D8BB89DE38D845CB10
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                                            • Instruction ID: 077a7a9b5b79e568bb5eccac62bba6350d77ea163457f78b1f89b39968269dae
                                            • Opcode Fuzzy Hash: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                                            • Instruction Fuzzy Hash: 3422F373B206508BD728CF25D89AA5E3766F798744B4B8228DF0ACB789DF39D505CB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                                            • Instruction ID: 83feaf36c310c17697ea4461b911a4f256aa4bdfabbdd1705ae8af8afc6f84f8
                                            • Opcode Fuzzy Hash: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                                            • Instruction Fuzzy Hash: 6832AF72A085918BE718CF28D555ABC37B1F794B48F05C139DA8A8BB89DF3CAC55CB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                                            • Instruction ID: 0236ae64cefa3c088cbd1ff08036eefbad952eb068d9f6ea04fc8ce32a38ed26
                                            • Opcode Fuzzy Hash: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                                            • Instruction Fuzzy Hash: 48C19BB7B281908FE350CF7AE400A9D3BB1F39878CB519125DF59A7B09D639EA45CB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                                            • Instruction ID: 46ad899609bea9b448f6a9e49637b40ef64b0218a019551902adee7a170b5ac6
                                            • Opcode Fuzzy Hash: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                                            • Instruction Fuzzy Hash: 64A12372A081C2C6EB15CA24D8467FD27A1EBD0B48F554135DA8A8FBC6DE3DEC41CB51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                                            • Instruction ID: 5bb39d97497016d379882e54cb448f8e59fb33f65f3db71e34d641208694cf3c
                                            • Opcode Fuzzy Hash: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                                            • Instruction Fuzzy Hash: B0C10673A292E08DE302CBB5A4248FD3FF1E71D74DB464151EF9667B4AD9285201DF60
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: AddressProc
                                            • String ID:
                                            • API String ID: 190572456-0
                                            • Opcode ID: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                                            • Instruction ID: 548494e5b27419ab5fa9add5fb48527ae3e12bfca186e5fce7c01b07e5ff3a1a
                                            • Opcode Fuzzy Hash: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                                            • Instruction Fuzzy Hash: 28912262B186C196EB11CF29D4426FD2771FF95B88F440131EF4E8BA59EE39DA06CB00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                                            • Instruction ID: 76f76def74f975455c315f1d9f93965a57b6ce827a37bcb0011c0c1b63c898b9
                                            • Opcode Fuzzy Hash: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                                            • Instruction Fuzzy Hash: A4611723B182D599EB11CF75C6014FD7FB1A71AB84B458872CE999B646CE3CE906CF10
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                                            • Instruction ID: b8d660891d6a70b16b90524fb32b684c13160cdb5d992840447af7081658c0fb
                                            • Opcode Fuzzy Hash: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                                            • Instruction Fuzzy Hash: 1C510473B181918BE7298F28E905B7D3761F794B48F454134DB498BA89DE3EE941CF00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                                            • Instruction ID: c36b0678a4f0d87fc5e04026a27cfd91b248fff0fcc87420ffff0fc7d01a7f6e
                                            • Opcode Fuzzy Hash: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                                            • Instruction Fuzzy Hash: 3631C3B2A185C19BD718DE56D95227E77A1F784B44F048139DF4ACBB81DE3CE841CB10
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 20052d42666034676028b01d15d2cffdefdd266dec7e2dd0f98b8d8f07818195
                                            • Instruction ID: 2d69617208ea8123cdee3fd61ecadb7ed3c6ead693f2832378c088a451c6777a
                                            • Opcode Fuzzy Hash: 20052d42666034676028b01d15d2cffdefdd266dec7e2dd0f98b8d8f07818195
                                            • Instruction Fuzzy Hash: 99F068B1718256CBDBA48F29F542A2977E0F708384F448039D58DCBB44DE3D94519F04
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                                            • Instruction ID: d3db07ec50c07cc6fec4b9924908e016c970d977f33792cf120e0bbcb80a01d6
                                            • Opcode Fuzzy Hash: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                                            • Instruction Fuzzy Hash: F6A002A190CC43E0E65D8F50FAA0470B330FB58304B540031F00DCD0A4DF3EA902CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn
                                            • String ID: :$EFS:$LOGGED_UTILITY_STREAM$:$I30:$INDEX_ALLOCATION$:$TXF_DATA:$LOGGED_UTILITY_STREAM$::$ATTRIBUTE_LIST$::$BITMAP$::$DATA$::$EA$::$EA_INFORMATION$::$FILE_NAME$::$INDEX_ALLOCATION$::$INDEX_ROOT$::$LOGGED_UTILITY_STREAM$::$OBJECT_ID$::$REPARSE_POINT
                                            • API String ID: 3668304517-727060406
                                            • Opcode ID: fc44dbfd106e66ad26630d810067bee7702886ae7b68d41755c36eb4d41d7e9a
                                            • Instruction ID: d080c940f3125202842c1855cef70e54e02355ce7d4788328ec334f8bee4b31f
                                            • Opcode Fuzzy Hash: fc44dbfd106e66ad26630d810067bee7702886ae7b68d41755c36eb4d41d7e9a
                                            • Instruction Fuzzy Hash: 1141EA36B15F01E9EB008F60E5813E933B5EB48798F400636DA4D8BB59EF39D655CB80
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                            • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                            • API String ID: 2565136772-3242537097
                                            • Opcode ID: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                                            • Instruction ID: 20487354d79269116a481e390385c4e9446a394804871791385bcc31531e847c
                                            • Opcode Fuzzy Hash: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                                            • Instruction Fuzzy Hash: 08215C74E09A03E2FE559FA0FB5457463B0AF48795F940035C90ECE7A0EF3EA9868B40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$Xinvalid_argumentstd::_
                                            • String ID: DXGIDebug.dll$UNC$\\?\
                                            • API String ID: 4097890229-4048004291
                                            • Opcode ID: daa1e37c37adf2081c091304f114c6a73fdbf020029389702496ed43c368b156
                                            • Instruction ID: 0dd6d0922c1476b6afc688ce84db047aaeac0176f99a391321950e5d521a3b9d
                                            • Opcode Fuzzy Hash: daa1e37c37adf2081c091304f114c6a73fdbf020029389702496ed43c368b156
                                            • Instruction Fuzzy Hash: 4312E122B09A86D0EB10DF64E4461AD6371EB85F88F504231EB5D8BBEADF3DD945CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskDialog
                                            • String ID: GETPASSWORD1$Software\WinRAR SFX
                                            • API String ID: 431506467-1315819833
                                            • Opcode ID: d20c2f114c9109beee27ce5cf2a2d2fb90c2edf5e9b936924732424cb653f975
                                            • Instruction ID: 45f901c9d48e86f787a6972cfc4dd2ea5b4f4c7d5959f2ce07880763caa88fa2
                                            • Opcode Fuzzy Hash: d20c2f114c9109beee27ce5cf2a2d2fb90c2edf5e9b936924732424cb653f975
                                            • Instruction Fuzzy Hash: 93B1AF62F19782C5FB008BA4E4452BC23B2EB85B98F404235DA5CAFAD9DF3DE945C744
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$Global$AllocCreateStream
                                            • String ID: </html>$<html>$<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>$<style>body{font-family:"Arial";font-size:12;}</style>
                                            • API String ID: 2868844859-1533471033
                                            • Opcode ID: 7d5a2165bcb14269ce88758dc811b505d41036279ac82267a240c61270d62392
                                            • Instruction ID: ff5a5aa3bb490fd3543453d977c747775864c968b25c05b327f88871585a80fb
                                            • Opcode Fuzzy Hash: 7d5a2165bcb14269ce88758dc811b505d41036279ac82267a240c61270d62392
                                            • Instruction Fuzzy Hash: 99819062F19A42D5FB00DBA5E5411ED6371AF84B88F400135DE1D9FA9AEE3DE90AC740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                                            • API String ID: 3215553584-2617248754
                                            • Opcode ID: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                                            • Instruction ID: 1ad08d647298da2cbdbf4dddad3e93b83445bcba12465ec4df4256d1e770b75b
                                            • Opcode Fuzzy Hash: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                                            • Instruction Fuzzy Hash: 24418A72A09B85C9EB04CF65F9517A933B4EB18398F004136EA5C9FB94DE3ED025C784
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Window$MessageObjectSend$ClassDeleteLongName
                                            • String ID: STATIC
                                            • API String ID: 2845197485-1882779555
                                            • Opcode ID: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                                            • Instruction ID: f2a980c2268d4c51563cf6200bd7eba592be7bcd31ad96434addea66e11d881d
                                            • Opcode Fuzzy Hash: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                                            • Instruction Fuzzy Hash: BA318B21B08683C2FA609B12E655BBA63B1AB89B80F440031DD4D8FB56DE3DEC06CF40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ItemTextWindow
                                            • String ID: LICENSEDLG
                                            • API String ID: 2478532303-2177901306
                                            • Opcode ID: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                                            • Instruction ID: 6e1261c6ac78b580a80db447305d6bdaba4bfe6471b1ed8615da4a39b2668e3e
                                            • Opcode Fuzzy Hash: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                                            • Instruction Fuzzy Hash: 7D418B31A08A52C2FB509B12F955BB923B1AF84F85F444135D94E8FBA5CF7EAD46CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: AddressProc$CurrentDirectoryProcessSystem
                                            • String ID: Crypt32.dll$CryptProtectMemory$CryptProtectMemory failed$CryptUnprotectMemory$CryptUnprotectMemory failed
                                            • API String ID: 2915667086-2207617598
                                            • Opcode ID: d2e93635ec338890dfe438c4789fcaf7e26687fbfe6c7ce53d5981307f2d6baa
                                            • Instruction ID: 0bc999f90e21269fa789cf807e73b67bbca46b08985c997de2d4c2b99c83a24d
                                            • Opcode Fuzzy Hash: d2e93635ec338890dfe438c4789fcaf7e26687fbfe6c7ce53d5981307f2d6baa
                                            • Instruction Fuzzy Hash: 20315724A0EB87E0FA149B52FA5667563B0AF45F94F040935CC4E8F3A4DE3EE9818B04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn
                                            • String ID: $
                                            • API String ID: 3668304517-227171996
                                            • Opcode ID: f2fdc83a9f6be17559bdfed1ab1fa604e61a382ff22291328a8e9483648cafea
                                            • Instruction ID: c978fd4c2ed5051010a337135b1e638b8df80e7c53b16141900364e35c73b56e
                                            • Opcode Fuzzy Hash: f2fdc83a9f6be17559bdfed1ab1fa604e61a382ff22291328a8e9483648cafea
                                            • Instruction Fuzzy Hash: 79F1CF62F15A46C0EF109B66E58A1BC2371AB84F98F405231CB6D9BBD9DF7CE981C740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Is_bad_exception_allowedabortstd::bad_alloc::bad_alloc
                                            • String ID: csm$csm$csm
                                            • API String ID: 2940173790-393685449
                                            • Opcode ID: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                                            • Instruction ID: 64f57bca32f998875cc7ff5c68c30742d93b2bc226a26a84e4adb701010d2ea1
                                            • Opcode Fuzzy Hash: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                                            • Instruction Fuzzy Hash: 34E1CE76908B82CAE7219F25E6803AD3BB0FB45748F144535DA8C8F696DF39E485CB80
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: AllocClearStringVariant
                                            • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                            • API String ID: 1959693985-3505469590
                                            • Opcode ID: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                                            • Instruction ID: 2a28364a2de1321870bd5b5c5d016f95279da3babf93ac4f4a8a569f6ed33495
                                            • Opcode Fuzzy Hash: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                                            • Instruction Fuzzy Hash: 49714A36A14B46D5EB20CF65E9806AD77B0FB88B98B045136EE4E8BB64CF3DD544CB00
                                            APIs
                                            • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF6660074F3,?,?,?,00007FF66600525E,?,?,?,00007FF666005219), ref: 00007FF666007371
                                            • GetLastError.KERNEL32(?,?,00000000,00007FF6660074F3,?,?,?,00007FF66600525E,?,?,?,00007FF666005219), ref: 00007FF66600737F
                                            • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF6660074F3,?,?,?,00007FF66600525E,?,?,?,00007FF666005219), ref: 00007FF6660073A9
                                            • FreeLibrary.KERNEL32(?,?,00000000,00007FF6660074F3,?,?,?,00007FF66600525E,?,?,?,00007FF666005219), ref: 00007FF6660073EF
                                            • GetProcAddress.KERNEL32(?,?,00000000,00007FF6660074F3,?,?,?,00007FF66600525E,?,?,?,00007FF666005219), ref: 00007FF6660073FB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                                            • Instruction ID: 2c5f622b9bd430541bfb7d080f098dc68c0620fa73bc4dfb25d5769d8dd05c6d
                                            • Opcode Fuzzy Hash: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                                            • Instruction Fuzzy Hash: 4131B021A1A642E1FE219F06BA0067963B8FF48BA4F594635DD1D8F384EF3DF4408B50
                                            APIs
                                            • GetModuleHandleW.KERNEL32(?,?,?,00007FF666001573,?,?,?,00007FF66600192A), ref: 00007FF66600162B
                                            • GetProcAddress.KERNEL32(?,?,?,00007FF666001573,?,?,?,00007FF66600192A), ref: 00007FF666001648
                                            • GetProcAddress.KERNEL32(?,?,?,00007FF666001573,?,?,?,00007FF66600192A), ref: 00007FF666001664
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: AddressProc$HandleModule
                                            • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                            • API String ID: 667068680-1718035505
                                            • Opcode ID: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                                            • Instruction ID: bfb8b0f3f66384d7c348271433f9b78a736cb3b6509fd2d812ae7b5073e13107
                                            • Opcode Fuzzy Hash: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                                            • Instruction Fuzzy Hash: 60110C31A19B03D1FE658F80BB4027463B96F0879CF4C5475C92ECE390EE7EA9448E40
                                            APIs
                                              • Part of subcall function 00007FF665FE51A4: GetVersionExW.KERNEL32 ref: 00007FF665FE51D5
                                            • FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF665FD5AB4), ref: 00007FF665FEED8C
                                            • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF665FD5AB4), ref: 00007FF665FEED98
                                            • SystemTimeToTzSpecificLocalTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF665FD5AB4), ref: 00007FF665FEEDA8
                                            • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF665FD5AB4), ref: 00007FF665FEEDB6
                                            • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF665FD5AB4), ref: 00007FF665FEEDC4
                                            • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF665FD5AB4), ref: 00007FF665FEEE05
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Time$File$System$Local$SpecificVersion
                                            • String ID:
                                            • API String ID: 2092733347-0
                                            • Opcode ID: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                                            • Instruction ID: 8e027aa29726ec2bc8ecce375d4e2624d98d831124e30b8ff078a437ff8a9dea
                                            • Opcode Fuzzy Hash: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                                            • Instruction Fuzzy Hash: A7516DB2B10652DAEB14CFA5E4451AC77B1F748B88B64403ADE0D9BB58DF38E955CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Time$File$System$Local$SpecificVersion
                                            • String ID:
                                            • API String ID: 2092733347-0
                                            • Opcode ID: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                                            • Instruction ID: ff14e771d89b6210c9e401a46a3c346494962445ab3b9823a53a669e8f226f29
                                            • Opcode Fuzzy Hash: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                                            • Instruction Fuzzy Hash: 30311A62B10A51DDFB04CFB5E8811AC7771FB08758B54503AEE0D9BA58EF38D995CB10
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn
                                            • String ID: .rar$exe$rar$sfx
                                            • API String ID: 3668304517-630704357
                                            • Opcode ID: 2782df0ac0d906a6dfd4afc5fd13043494203347564149d90fad9f6fe0172506
                                            • Instruction ID: 96a39d6185440b26652a204da996b15fdf5681a881bd6e90542d9c0fc98d6d48
                                            • Opcode Fuzzy Hash: 2782df0ac0d906a6dfd4afc5fd13043494203347564149d90fad9f6fe0172506
                                            • Instruction Fuzzy Hash: E1A1A122A19A86E0EA049F65E8462BC2371EF44F98F401235DE1D9F6EADF3DE945C740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: abort$CallEncodePointerTranslator
                                            • String ID: MOC$RCC
                                            • API String ID: 2889003569-2084237596
                                            • Opcode ID: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                                            • Instruction ID: 52a7943fe24cc548827623e6584013d5a17c3ab747196e8487bc1d7bb25510ec
                                            • Opcode Fuzzy Hash: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                                            • Instruction Fuzzy Hash: B4918C77A08B81CAE7118F65E6402AD7BB0FB04788F14413AEA8D9FB59DF39D195CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 2395640692-629598281
                                            • Opcode ID: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                                            • Instruction ID: 07af2cc8c3dc6b4242815cc0a782f72d2006624f7915588775b10a2e8c626304
                                            • Opcode Fuzzy Hash: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                                            • Instruction Fuzzy Hash: 14519F36A19602C6EB16CF15F644A6D77B5FB44B88F508034EA1A8F748DF7AE941CF80
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ErrorLast_invalid_parameter_noinfo_noreturn$CloseCurrentHandleProcess
                                            • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                            • API String ID: 2102711378-639343689
                                            • Opcode ID: 8e19f0960acccde70cdb6f4ae44bfdba7dde49cd3aecb391576d39059d5aab7f
                                            • Instruction ID: 70a0e815e9bf3f02da5e6d923ab8d6cb52d26b8854df21643b92064848eaeb4b
                                            • Opcode Fuzzy Hash: 8e19f0960acccde70cdb6f4ae44bfdba7dde49cd3aecb391576d39059d5aab7f
                                            • Instruction Fuzzy Hash: D651E262F18642D5FB00DB65E9466BD2370AF84BA4F400231DE1DDF69ADE3CAC86CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Window$Show$Rect
                                            • String ID: RarHtmlClassName
                                            • API String ID: 2396740005-1658105358
                                            • Opcode ID: 95333b9ad2bfddc98b100d65ee3ae7a1141886215ecc40d0d40dcbf9cb340d19
                                            • Instruction ID: 0493e91e6b183dba296ca32450863ba8c3431a2fce8eefca34d7b2618f8d1499
                                            • Opcode Fuzzy Hash: 95333b9ad2bfddc98b100d65ee3ae7a1141886215ecc40d0d40dcbf9cb340d19
                                            • Instruction Fuzzy Hash: D7517022A09B82C6EA249B25F54577AA3B0FB85B80F104535DE8E8FB55DF3DE845CF00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: EnvironmentVariable$_invalid_parameter_noinfo_noreturn
                                            • String ID: sfxcmd$sfxpar
                                            • API String ID: 3540648995-3493335439
                                            • Opcode ID: ce72e9bcdfddcf2667ebe4c513ec0d1727c59f1d3b739ca42450d660fec21911
                                            • Instruction ID: c73218f17a2b0313f6558ff4c6c5467f70105e9ca7608add49a6e398c576c84d
                                            • Opcode Fuzzy Hash: ce72e9bcdfddcf2667ebe4c513ec0d1727c59f1d3b739ca42450d660fec21911
                                            • Instruction Fuzzy Hash: 09318B32A14A46C4EB048BA9E8851AC7371FB88B98F141131DE5D9FBA9DE38E585CB44
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: RENAMEDLG$REPLACEFILEDLG
                                            • API String ID: 0-56093855
                                            • Opcode ID: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                                            • Instruction ID: ae1a32889499fb8e40b39bdedb60fd0beb056ae354a5bee3754816682289d0ad
                                            • Opcode Fuzzy Hash: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                                            • Instruction Fuzzy Hash: 5721252090DA8BD1FA518B15FA4557463B0EB8AB89F640136D94DDFBA0CE3EE884CB44
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                                            • Instruction ID: cbc839afb680a677ab20b71c58a8fee83d7950f029211dd35ead44e73c5e28ea
                                            • Opcode Fuzzy Hash: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                                            • Instruction Fuzzy Hash: 8BF04F62A19A42D1EF448B51F540379A370EF88798F581035E94F8E664DE3EE584CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 3215553584-0
                                            • Opcode ID: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                                            • Instruction ID: fb492e26daf845a36f91c2ab0f9536d0fd4cb5e797c804f38b5df22c091dfdf4
                                            • Opcode Fuzzy Hash: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                                            • Instruction Fuzzy Hash: 9081F262F18602E5F7108FA5AA406BCA7B0BB45B8CF454136DE0EDF6A5DF3EA445CB10
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: File$Create$CloseHandleTime_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 2398171386-0
                                            • Opcode ID: ed02a809717236ee1ed586c7e858dbefa1ed7ae72bbe3c8719455611c93ecd51
                                            • Instruction ID: 159cd1fa45d513a73a3ae454c3b8a5ef4739daebcfeb74ecad55f66fbe56b285
                                            • Opcode Fuzzy Hash: ed02a809717236ee1ed586c7e858dbefa1ed7ae72bbe3c8719455611c93ecd51
                                            • Instruction Fuzzy Hash: A751C422B04A82E9FB50DBA5E4452BD63B1AB84B98F104635DE1D9F7E8DE38A945C700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
                                            • String ID:
                                            • API String ID: 3659116390-0
                                            • Opcode ID: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                                            • Instruction ID: 290ea49d8d18c8a99ab7b2f811ea49c993590a286af69b00210de621579ffbb4
                                            • Opcode Fuzzy Hash: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                                            • Instruction Fuzzy Hash: 6551DD32A14A51D9E711CFA5E5403AC7BB0BB48B9CF048135DF0A9FAA8DF3AD156CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$AllocString
                                            • String ID:
                                            • API String ID: 262959230-0
                                            • Opcode ID: 55eea0222137253c860f73f771396d48486a61dcff80d6f5aaddb46a2ec13fc8
                                            • Instruction ID: 7c16b59eb1ecf5d067fb32e004f3542857a113687f81efa22ef03900136834ee
                                            • Opcode Fuzzy Hash: 55eea0222137253c860f73f771396d48486a61dcff80d6f5aaddb46a2ec13fc8
                                            • Instruction Fuzzy Hash: DE41E531A09646C6EB148FA1B64037962B5EF04BE8F144634EA6DCFBD5DF3ED1418B80
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: AddressProc
                                            • String ID:
                                            • API String ID: 190572456-0
                                            • Opcode ID: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                                            • Instruction ID: 087e13e4bca77dae3584074dabb8319110fed93081cf8bd4bf8a5211e9c26322
                                            • Opcode Fuzzy Hash: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                                            • Instruction Fuzzy Hash: B241D422B09A42D1FA159F52BA0067563B9BF84BD4F098535DE1DCF784EF3DE4409B84
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                            • Instruction ID: d4389693a995185c8afb32da104a44cd1264dcc4617b0a3f78eb23ba65e5b0ad
                                            • Opcode Fuzzy Hash: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                            • Instruction Fuzzy Hash: EF11E2FEE1CA07C1F61B11E4F34337990B16F493A8F488232EA7D8E1D6DE2EA4404900
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Message$DispatchObjectPeekSingleTranslateWait
                                            • String ID:
                                            • API String ID: 3621893840-0
                                            • Opcode ID: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                                            • Instruction ID: 6e184b4ddc4270889ed197abf0a161a040fa6aac056aa532f9612bd3301d3264
                                            • Opcode Fuzzy Hash: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                                            • Instruction Fuzzy Hash: 6AF03732B28486C2F7508B20F895F7A2221FFE4B06F841131EA4A8A894DE3DD949CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: __except_validate_context_recordabort
                                            • String ID: csm$csm
                                            • API String ID: 746414643-3733052814
                                            • Opcode ID: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                                            • Instruction ID: a0aadbe9243bd39f5676cf5b580fe47b7cb82db6653aa2ff998647c0cddaf51e
                                            • Opcode Fuzzy Hash: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                                            • Instruction Fuzzy Hash: 1C71A072619681DAD7608F26A25077D7BB1FB05B98F048135DA4C8FA89CF3DD4D5CB80
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID: $*
                                            • API String ID: 3215553584-3982473090
                                            • Opcode ID: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                                            • Instruction ID: e719ecfcee06628cf4a8600178dd81f3d754537bba21b9a6c44dd327e6e42c41
                                            • Opcode Fuzzy Hash: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                                            • Instruction Fuzzy Hash: 2B51477291CA42DAEF688E28A64437C3BB5FF05B19F141135C64A8D299CF3ED881CF85
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$StringType
                                            • String ID: $%s
                                            • API String ID: 3586891840-3791308623
                                            • Opcode ID: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                                            • Instruction ID: bedd29703434199fc54d898c9faafaa21156ec211f4c6b796b7c3dfdf549a384
                                            • Opcode Fuzzy Hash: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                                            • Instruction Fuzzy Hash: AB41B332B15B81CAEB258F65E9002A8A2B1FB54BACF484231DE1D8F7C5DF7DE4418740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: CreateFrameInfo__except_validate_context_recordabort
                                            • String ID: csm
                                            • API String ID: 2466640111-1018135373
                                            • Opcode ID: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                                            • Instruction ID: 56a255e35d9759157587ad3a0db4335067e563672075105cab695ffeb4148b8e
                                            • Opcode Fuzzy Hash: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                                            • Instruction Fuzzy Hash: 4D513B76628B41C7E620AF56B24026E77B4FB89B90F140535EB8D8FB55CF39E490CB80
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ByteCharErrorFileLastMultiWideWrite
                                            • String ID: U
                                            • API String ID: 2456169464-4171548499
                                            • Opcode ID: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                                            • Instruction ID: 6c588d8c9d6622565a075fb3322f063211be8ea9d1afa3e955da42e127d74d91
                                            • Opcode Fuzzy Hash: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                                            • Instruction Fuzzy Hash: 7841A222A19A81D2EB108F65F5443BAA760FB88798F444131EE4DCF754DF7DD545CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ObjectRelease
                                            • String ID:
                                            • API String ID: 1429681911-3916222277
                                            • Opcode ID: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                                            • Instruction ID: 95267082e4cdc6df6e5b685bfc5327afe94c5777efb937882a508753d8c4e445
                                            • Opcode Fuzzy Hash: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                                            • Instruction Fuzzy Hash: F731403560878286DB149F12BA18B6A7770F789FD2F504536ED4A9B754CE3DD889CB00
                                            APIs
                                            • InitializeCriticalSection.KERNEL32(?,?,?,00007FF665FF317F,?,?,00001000,00007FF665FDE51D), ref: 00007FF665FEE8BB
                                            • CreateSemaphoreW.KERNEL32(?,?,?,00007FF665FF317F,?,?,00001000,00007FF665FDE51D), ref: 00007FF665FEE8CB
                                            • CreateEventW.KERNEL32(?,?,?,00007FF665FF317F,?,?,00001000,00007FF665FDE51D), ref: 00007FF665FEE8E4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: Create$CriticalEventInitializeSectionSemaphore
                                            • String ID: Thread pool initialization failed.
                                            • API String ID: 3340455307-2182114853
                                            • Opcode ID: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                                            • Instruction ID: e92ad05ae5300e892434237a43ef85da723898f39323c93da621c89b8ff27ca2
                                            • Opcode Fuzzy Hash: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                                            • Instruction Fuzzy Hash: AB219D32A19642C6F7108F24E4557AA33B2EB88F0DF188134CA0D8F295CF7F99458F84
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: CapsDeviceRelease
                                            • String ID:
                                            • API String ID: 127614599-3916222277
                                            • Opcode ID: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                                            • Instruction ID: 7b89f46926f9b72ff2c7fbe3560c1fa1c08b7bef7a743572f6de078fcb15d67b
                                            • Opcode Fuzzy Hash: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                                            • Instruction Fuzzy Hash: 8EE08C20B08683C2EB0857B6B78992A2261AB8CBD1F158536DA1A8B794CE3DCCC44B00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$FileTime
                                            • String ID:
                                            • API String ID: 1137671866-0
                                            • Opcode ID: 2d452471b7d5dd184fe666455331b196c35d21b330d78aced89ac185778723fc
                                            • Instruction ID: b60b99490b908b9d5fb519da68f9223449739f3483fbfa56671dbf8f612291ba
                                            • Opcode Fuzzy Hash: 2d452471b7d5dd184fe666455331b196c35d21b330d78aced89ac185778723fc
                                            • Instruction Fuzzy Hash: B6A1D362A18682D1EB10DF65E8421BD6371FB85B84F405231EA5D8FAE9DF3DE944CF40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ErrorLast
                                            • String ID:
                                            • API String ID: 1452528299-0
                                            • Opcode ID: 25819bbde86230c00c876be8c9dac5eedcee3915eb1a00923d8757575eef845b
                                            • Instruction ID: a5b7b7c7f15bc2ab96981beb707da75f97571b3f44b90b8419f09590a14cde67
                                            • Opcode Fuzzy Hash: 25819bbde86230c00c876be8c9dac5eedcee3915eb1a00923d8757575eef845b
                                            • Instruction Fuzzy Hash: 5351B072B14A46D9FB009F65E5462EC2331EB84B98F404232DA5D9FBD6EE7CEA44C740
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: CreateCurrentDirectoryErrorFreeLastLocalProcess
                                            • String ID:
                                            • API String ID: 1077098981-0
                                            • Opcode ID: 91dec681af915968dd102d853b3eeeabd4842e789cbe2ad92d88e952f467e522
                                            • Instruction ID: 586414cb2151bcfb8eeae46a76b24a107972fb6b1e8832f4d3577b74a906bc13
                                            • Opcode Fuzzy Hash: 91dec681af915968dd102d853b3eeeabd4842e789cbe2ad92d88e952f467e522
                                            • Instruction Fuzzy Hash: 5A515C32A18B82D6EB408F61E6447AE73B4FB84B84F501136EA4D9BA54DF3DD944CF40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                                            • String ID:
                                            • API String ID: 4141327611-0
                                            • Opcode ID: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                                            • Instruction ID: 65566b5fd38ed5764bfa887e6850544dc5a8d8f75990154ebc648fe57b05f2d8
                                            • Opcode Fuzzy Hash: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                                            • Instruction Fuzzy Hash: 00418431A08683C6F7659F10B254779A6B0EF80B90F148531DB4D8EAD5DF7EE8418F90
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: FileMove_invalid_parameter_noinfo_noreturn
                                            • String ID:
                                            • API String ID: 3823481717-0
                                            • Opcode ID: 1e191b709e62ef26e60e8f1d0cc24d6cdbe4e9a67f5d62f6318cd10f240089dc
                                            • Instruction ID: af79f14c2460495efa9e8008c1a789a0d5f2f4017e3b226368b022f6f6df9234
                                            • Opcode Fuzzy Hash: 1e191b709e62ef26e60e8f1d0cc24d6cdbe4e9a67f5d62f6318cd10f240089dc
                                            • Instruction Fuzzy Hash: 4B419F62F14691D4FB00CFA5E88A1AC2372BB44B98B105231DE5D9FAA9DF39E885C640
                                            APIs
                                            • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF66600C45B), ref: 00007FF666010B91
                                            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF66600C45B), ref: 00007FF666010BF3
                                            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF66600C45B), ref: 00007FF666010C2D
                                            • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF66600C45B), ref: 00007FF666010C57
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ByteCharEnvironmentMultiStringsWide$Free
                                            • String ID:
                                            • API String ID: 1557788787-0
                                            • Opcode ID: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                                            • Instruction ID: 5778d3a7c3e9195529c7041f2a4827c926f605069893b487f2405050348dae44
                                            • Opcode Fuzzy Hash: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                                            • Instruction Fuzzy Hash: B5218031B1CB52C1E6249F527550029B6B4FB94BD4B084534DE8EAFBA4DF3DE4628B40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ErrorLast$abort
                                            • String ID:
                                            • API String ID: 1447195878-0
                                            • Opcode ID: df247b5a3948333368795c339682862bf84e23f7c025c70b8dad3e7beb060077
                                            • Instruction ID: 2fafb9099df7b0d1fd8ecf7d5db1d3869f345999d1f88cba807b4db143d967cb
                                            • Opcode Fuzzy Hash: df247b5a3948333368795c339682862bf84e23f7c025c70b8dad3e7beb060077
                                            • Instruction Fuzzy Hash: 18019E20B09606D3FA99AF61B75923C22B19F44790F044538DD1ECE7D6ED2EF8004E60
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: CapsDevice$Release
                                            • String ID:
                                            • API String ID: 1035833867-0
                                            • Opcode ID: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                                            • Instruction ID: c05f80916615862600abb98c33513fd54e860e47097f174efd67aeccd111b631
                                            • Opcode Fuzzy Hash: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                                            • Instruction Fuzzy Hash: 68E0E560E09643C2FF085B717A595751170AF48743F08493AC81F9E350DD3DAC85CA14
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn
                                            • String ID: DXGIDebug.dll
                                            • API String ID: 3668304517-540382549
                                            • Opcode ID: 29c3812da8397d74a7501658cc2389868464bc71a0304964e69ab8611b481b8c
                                            • Instruction ID: cc9c136411acf1c39d49821f317387219cf1ab06bd750a334911e5ee72316835
                                            • Opcode Fuzzy Hash: 29c3812da8397d74a7501658cc2389868464bc71a0304964e69ab8611b481b8c
                                            • Instruction Fuzzy Hash: 8071B972A14B81C2EB148F25E9413ADB3B8FB54B94F004236DBAC4BB95DF38E561C300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID: e+000$gfff
                                            • API String ID: 3215553584-3030954782
                                            • Opcode ID: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                                            • Instruction ID: 5133ab9a352f5711367424700fd0ad3e62ef79900b0ff02481aac8f66dde2146
                                            • Opcode Fuzzy Hash: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                                            • Instruction Fuzzy Hash: 2B51F962B187C2C6E7258F35AA413696BA1E785B90F089231C79CCFBD6CF2ED444CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo_noreturn$swprintf
                                            • String ID: SIZE
                                            • API String ID: 449872665-3243624926
                                            • Opcode ID: e0bc738575b9dfc7518a9e38475377609f14f4f1dbbb3954c7928ccc9b577437
                                            • Instruction ID: 6a4c615f384f24c54ff5746c39539efaff3c7b8adc5dd9ffcfa9daf81af32c22
                                            • Opcode Fuzzy Hash: e0bc738575b9dfc7518a9e38475377609f14f4f1dbbb3954c7928ccc9b577437
                                            • Instruction Fuzzy Hash: 7B41A262A28782D5EA10DF14E5423BD6370EF85B94F504231EA9D8F6D6EE3DE941CB10
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: FileModuleName_invalid_parameter_noinfo
                                            • String ID: C:\Users\user\Desktop\0438.pdf.exe
                                            • API String ID: 3307058713-792344357
                                            • Opcode ID: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                                            • Instruction ID: ac1821789280c79b7715cfea84f319a122b2a3076b572a92b8f1a1ba48b0f87d
                                            • Opcode Fuzzy Hash: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                                            • Instruction Fuzzy Hash: 29417F72A18A52CAEB159F25F6400BC77B4FF44794B444036E94E8FB95DE3EE841CB90
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ItemText$DialogWindow
                                            • String ID: ASKNEXTVOL
                                            • API String ID: 445417207-3402441367
                                            • Opcode ID: 97ebd98f0834f70bd8f3ada112357d921bc9d5e9383391aa045354938bfaeae3
                                            • Instruction ID: 7e03d7d9ddec14898cf5e933e33ae994a110e5bb1964c9341faada19e5804fb2
                                            • Opcode Fuzzy Hash: 97ebd98f0834f70bd8f3ada112357d921bc9d5e9383391aa045354938bfaeae3
                                            • Instruction Fuzzy Hash: EF418122A08683C1FA14AF12E6516B963B1AF85FC4F140135DE4D9FBA9DE3DED45CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide_snwprintf
                                            • String ID: $%s$@%s
                                            • API String ID: 2650857296-834177443
                                            • Opcode ID: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                                            • Instruction ID: cde327cbd47c81d6a43f1ec88db4bd6fe4ed2b3d20c7f4cdc79497a22e363529
                                            • Opcode Fuzzy Hash: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                                            • Instruction Fuzzy Hash: 6131C572B18A8AD5EE108F66E6416E963B4FB45B84F401032EE0D8F795DE3DE945CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: FileHandleType
                                            • String ID: @
                                            • API String ID: 3000768030-2766056989
                                            • Opcode ID: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                                            • Instruction ID: 1810846c52234dc41614b1325eb4ee5a80586eba0b0fd4c3c8eb42efbf684375
                                            • Opcode Fuzzy Hash: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                                            • Instruction Fuzzy Hash: CE216822A0CBC2C1EB648F25A59013A6671EB45774F281335D66F9F7D4DE3ED881C781
                                            APIs
                                            • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF666001D3E), ref: 00007FF6660040BC
                                            • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF666001D3E), ref: 00007FF666004102
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                                            • Instruction ID: 92c046ea0599f63e918c1b1af7d0edcea7c9f7dfb79c52e89b8a69e9e126c537
                                            • Opcode Fuzzy Hash: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                                            • Instruction Fuzzy Hash: 41114922A08B41D2EB208F15F540269B7B0FB98B84F184230DA8D4B754DF3ED551CB40
                                            APIs
                                            • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF665FEE95F,?,?,?,00007FF665FE463A,?,?,?), ref: 00007FF665FEEA63
                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF665FEE95F,?,?,?,00007FF665FE463A,?,?,?), ref: 00007FF665FEEA6E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: ErrorLastObjectSingleWait
                                            • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                            • API String ID: 1211598281-2248577382
                                            • Opcode ID: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                                            • Instruction ID: 74993f2bc6b7bc9ca8fd314b1c101139369226fccd26b80487b0be6778245ab7
                                            • Opcode Fuzzy Hash: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                                            • Instruction Fuzzy Hash: 93E0E521E1A842D1E600AB60FD425682230BF60BA4F900371D03ECE1E19E2EAA498F40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1746165905.00007FF665FD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665FD0000, based on PE: true
                                            • Associated: 00000000.00000002.1745999553.00007FF665FD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746242519.00007FF666018000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF66602B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746275364.00007FF666034000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1746329426.00007FF66603E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff665fd0000_0438.jbxd
                                            Similarity
                                            • API ID: FindHandleModuleResource
                                            • String ID: RTL
                                            • API String ID: 3537982541-834975271
                                            • Opcode ID: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                                            • Instruction ID: 1b35dd85724826a4929c0d7d793e217819493610f452bc8e09df5eccf1b351a4
                                            • Opcode Fuzzy Hash: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                                            • Instruction Fuzzy Hash: B7D01792F09642D2FF198BB1A44973466B15B18B45F485038C95A8E390EE3E9588CB50