Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
0438.pdf.exe

Overview

General Information

Sample name:0438.pdf.exe
renamed because original name is a hash value
Original sample name: .pdf.exe
Analysis ID:1543801
MD5:2d11dba46735af1cb1c0a42e9564e20d
SHA1:b2e17960c6d080f7aba7df87f57c08b4bc2e7051
SHA256:e19477a56b247e6cc435fee367abcf6e0c3db21de91ae2514b4a6b1807233c53
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sigma detected: Suspicious Double Extension File Execution
Connects to many ports of the same IP (likely port scanning)
Enables network access during safeboot for specific services
Enables remote desktop connection
Initial sample is a PE file and has a suspicious name
Uses an obfuscated file name to hide its real file extension (double extension)
Checks for available system drives (often done to infect USB drives)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Internet Provider seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file contains strange resources
Queries disk information (often used to detect virtual machines)
Queries the installation date of Windows
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Stores files to the Windows start menu directory
Stores large binary data to the registry
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 0438.pdf.exe (PID: 6660 cmdline: "C:\Users\user\Desktop\0438.pdf.exe" MD5: 2D11DBA46735AF1CB1C0A42E9564E20D)
    • msiexec.exe (PID: 6944 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\pdf.msi" /qn MD5: E5DA170027542E25EDE42FC54C929077)
    • Acrobat.exe (PID: 7020 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\Doc.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
      • AcroCEF.exe (PID: 6092 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
        • AcroCEF.exe (PID: 6712 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2068 --field-trial-handle=1576,i,6061207058783302797,5194887840937353,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
  • msiexec.exe (PID: 7068 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • ROMFUSClient.exe (PID: 7872 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /siex /silentinstall MD5: 63D0964168B927D00064AA684E79A300)
      • ROMServer.exe (PID: 8016 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /siex /silentinstall MD5: F3D74B072B9697CF64B0B8445FDC8128)
    • ROMFUSClient.exe (PID: 8116 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /firewall MD5: 63D0964168B927D00064AA684E79A300)
      • ROMServer.exe (PID: 8164 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /firewall MD5: F3D74B072B9697CF64B0B8445FDC8128)
    • ROMFUSClient.exe (PID: 7144 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /start MD5: 63D0964168B927D00064AA684E79A300)
      • ROMServer.exe (PID: 7064 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /start MD5: F3D74B072B9697CF64B0B8445FDC8128)
  • svchost.exe (PID: 7104 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • ROMServer.exe (PID: 7076 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" MD5: F3D74B072B9697CF64B0B8445FDC8128)
    • ROMFUSClient.exe (PID: 7988 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /tray MD5: 63D0964168B927D00064AA684E79A300)
    • ROMFUSClient.exe (PID: 8008 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" MD5: 63D0964168B927D00064AA684E79A300)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
          SourceRuleDescriptionAuthorStrings
          00000009.00000000.1843565844.0000000000401000.00000020.00000001.01000000.0000000C.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
            00000007.00000000.1833595645.0000000000401000.00000020.00000001.01000000.0000000B.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
              SourceRuleDescriptionAuthorStrings
              7.0.ROMFUSClient.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                9.0.ROMServer.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\0438.pdf.exe", CommandLine: "C:\Users\user\Desktop\0438.pdf.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\0438.pdf.exe, NewProcessName: C:\Users\user\Desktop\0438.pdf.exe, OriginalFileName: C:\Users\user\Desktop\0438.pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\Desktop\0438.pdf.exe", ProcessId: 6660, ProcessName: 0438.pdf.exe
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 111.90.140.76, DestinationIsIpv6: false, DestinationPort: 465, EventID: 3, Image: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe, Initiated: true, ProcessId: 7076, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49874
                  Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7104, ProcessName: svchost.exe
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\EULA.rtfJump to behavior
                  Source: 0438.pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: 0438.pdf.exe
                  Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeFile opened: c:
                  Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EEB190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF665EEB190
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665ED40BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF665ED40BC
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EFFCA0 FindFirstFileExA,0_2_00007FF665EFFCA0

                  Networking

                  barindex
                  Source: global trafficTCP traffic: 111.90.140.76 ports 5651,8080,1,465,5,6,80
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeRegistry value created: NULL Service
                  Source: global trafficTCP traffic: 192.168.2.4:49871 -> 111.90.140.76:5651
                  Source: global trafficTCP traffic: 192.168.2.4:49876 -> 65.21.245.7:5555
                  Source: Joe Sandbox ViewASN Name: SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 65.21.245.7
                  Source: unknownTCP traffic detected without corresponding DNS query: 111.90.140.76
                  Source: global trafficDNS traffic detected: DNS query: x1.i.lencr.org
                  Source: AledensoftIpcServer.dll.3.dr, ROMwln.dll.3.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B11000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                  Source: svchost.exe, 00000005.00000002.3412122782.0000023FA5600000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                  Source: svchost.exe, 00000005.00000003.1771637769.0000023FA5818000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                  Source: edb.log.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acosgr5ufcefr7w7nv4v6k4ebdda_117.0.5938.132/117.0.5
                  Source: edb.log.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                  Source: edb.log.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                  Source: svchost.exe, 00000005.00000003.1771637769.0000023FA5818000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                  Source: svchost.exe, 00000005.00000003.1771637769.0000023FA5818000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                  Source: svchost.exe, 00000005.00000003.1771637769.0000023FA584D000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                  Source: edb.log.5.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                  Source: 5141a4.rbs.3.drString found in binary or memory: http://litemanager.com/
                  Source: ROMFUSClient.exe, 00000010.00000002.3606716114.0000000002983000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://litemanager.com/03
                  Source: ROMServer.exe, 0000000F.00000002.3606364288.0000000001773000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://litemanager.com/03w
                  Source: ROMServer.exe, 0000000F.00000002.3606364288.000000000176C000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000010.00000002.3606716114.000000000297C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://litemanager.com/1
                  Source: ROMFUSClient.exe, 00000007.00000000.1834516823.00000000008E4000.00000002.00000001.01000000.0000000B.sdmp, ROMServer.exe, 00000009.00000000.1848189601.00000000009FE000.00000002.00000001.01000000.0000000C.sdmp, Ukrainian.lg.3.dr, Russian.lg.3.drString found in binary or memory: http://litemanager.ru/
                  Source: Ukrainian.lg.3.drString found in binary or memory: http://litemanager.ru/forum/ru/memberlist.php?mode=viewprofile&u=977.
                  Source: ROMServer.exe, 00000009.00000000.1843565844.0000000000401000.00000020.00000001.01000000.0000000C.sdmpString found in binary or memory: http://litemanager.ru/noip.txtU
                  Source: AledensoftIpcServer.dll.3.dr, ROMwln.dll.3.drString found in binary or memory: http://ocsp.comodoca.com0
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B11000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.drString found in binary or memory: http://ocsp.thawte.com0
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B11000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B11000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.drString found in binary or memory: http://s2.symcb.com0
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B11000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0f
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B11000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B11000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.drString found in binary or memory: http://sv.symcd.com0&
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B11000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B11000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B11000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                  Source: 5141a4.rbs.3.drString found in binary or memory: http://www.LiteManagerTeam.com
                  Source: ROMFUSClient.exe, 00000007.00000000.1833595645.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, ROMFUSClient.exe, 00000007.00000003.1853231064.00000000028D7000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 00000009.00000003.1850203236.0000000002907000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 00000009.00000000.1843565844.0000000000951000.00000020.00000001.01000000.0000000C.sdmp, ROMFUSClient.exe, 0000000A.00000003.1864973686.00000000027F7000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 0000000B.00000003.1862661234.0000000002947000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 0000000D.00000003.1902208763.0000000002887000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 0000000E.00000003.1897803392.00000000027E7000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 0000000F.00000002.3606364288.00000000016D7000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000010.00000002.3606716114.00000000028E7000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000011.00000002.3606084225.00000000027B7000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe.3.drString found in binary or memory: http://www.indyproject.org/
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B11000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.drString found in binary or memory: http://www.symauth.com/cps0(
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B11000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.drString found in binary or memory: http://www.symauth.com/rpa00
                  Source: 2D85F72862B55C4EADD9E66E06947F3D0.4.drString found in binary or memory: http://x1.i.lencr.org/
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B11000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.drString found in binary or memory: https://d.symcb.com/cps0%
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B11000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.drString found in binary or memory: https://d.symcb.com/rpa0
                  Source: svchost.exe, 00000005.00000003.1771637769.0000023FA58C2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.drString found in binary or memory: https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
                  Source: edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
                  Source: edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2
                  Source: edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
                  Source: svchost.exe, 00000005.00000003.1771637769.0000023FA58C2000.00000004.00000800.00020000.00000000.sdmp, edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
                  Source: ROMFUSClient.exe, 00000007.00000000.1833595645.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, ROMServer.exe, 00000009.00000000.1843565844.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, ROMFUSClient.exe.3.drString found in binary or memory: https://litemanager.com/romversion.txt
                  Source: ROMFUSClient.exe, 00000007.00000000.1833595645.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, ROMServer.exe, 00000009.00000000.1843565844.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, ROMFUSClient.exe.3.drString found in binary or memory: https://litemanager.com/soft/pro/ROMServer.zip
                  Source: svchost.exe, 00000005.00000003.1771637769.0000023FA58C2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.drString found in binary or memory: https://oneclient.sfx.ms/Win/Installers/23.194.0917.0001/amd64/OneDriveSetup.exe
                  Source: edb.log.5.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe.C:

                  System Summary

                  barindex
                  Source: initial sampleStatic PE information: Filename: 0438.pdf.exe
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665ECC2F0: CreateFileW,CloseHandle,wcscpy,wcscpy,wcscpy,wcscpy,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF665ECC2F0
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5141a2.msiJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{71FFA475-24D5-44FB-A51F-39B699E3D82C}Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI46B3.tmpJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ARPPRODUCTICON.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ROMServer.exe_9D09B2BC25A2414CBD848E2B75898676.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\UNINST_Uninstall_L_78AA5B6662514D94A847D6C603AF0895.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\stop_server_51B516B87C64408FA3C56354EA2277C2.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\config_server_B6BD2967C67B44649764F06ADFFD6458.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5141a5.msiJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5141a5.msiJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\5141a5.msiJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665ECF9300_2_00007FF665ECF930
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665ED49280_2_00007FF665ED4928
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EF07540_2_00007FF665EF0754
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EEB1900_2_00007FF665EEB190
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EDA4AC0_2_00007FF665EDA4AC
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EE34840_2_00007FF665EE3484
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EE1F200_2_00007FF665EE1F20
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EECE880_2_00007FF665EECE88
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EC5E240_2_00007FF665EC5E24
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EC76C00_2_00007FF665EC76C0
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665F025500_2_00007FF665F02550
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EC48400_2_00007FF665EC4840
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EFC8380_2_00007FF665EFC838
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665ECA3100_2_00007FF665ECA310
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665ECC2F00_2_00007FF665ECC2F0
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EC72880_2_00007FF665EC7288
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665ED126C0_2_00007FF665ED126C
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EE21D00_2_00007FF665EE21D0
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EDF1800_2_00007FF665EDF180
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EDB5340_2_00007FF665EDB534
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EE53F00_2_00007FF665EE53F0
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EDAF180_2_00007FF665EDAF18
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EE8DF40_2_00007FF665EE8DF4
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EF07540_2_00007FF665EF0754
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EE2D580_2_00007FF665EE2D58
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665F020800_2_00007FF665F02080
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665F05AF80_2_00007FF665F05AF8
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EE2AB00_2_00007FF665EE2AB0
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EC1AA40_2_00007FF665EC1AA4
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EFFA940_2_00007FF665EFFA94
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665ED1A480_2_00007FF665ED1A48
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EF89A00_2_00007FF665EF89A0
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EDC96C0_2_00007FF665EDC96C
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EE39640_2_00007FF665EE3964
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EF8C1C0_2_00007FF665EF8C1C
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EE4B980_2_00007FF665EE4B98
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EDBB900_2_00007FF665EDBB90
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665ED5B600_2_00007FF665ED5B60
                  Source: ROMViewer.exe.3.drStatic PE information: Resource name: RT_VERSION type: Intel ia64 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                  Source: ROMServer.exe.3.drStatic PE information: Resource name: RT_VERSION type: Intel ia64 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                  Source: ROMServer.exe0.3.drStatic PE information: Resource name: RT_VERSION type: Intel ia64 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                  Source: ROMServer.exe0.3.drStatic PE information: Number of sections : 11 > 10
                  Source: ROMServer.exe.3.drStatic PE information: Number of sections : 11 > 10
                  Source: ROMViewer.exe.3.drStatic PE information: Number of sections : 11 > 10
                  Source: ROMFUSClient.exe.3.drStatic PE information: Number of sections : 11 > 10
                  Source: ROMViewer.exe.3.drStatic PE information: Resource name: RT_RCDATA type: Delphi compiled form 'TfmEditBinaryValue'
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B37000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_IsIcoRes.exe< vs 0438.pdf.exe
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameISRegSvr.dll vs 0438.pdf.exe
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_IsIcoRes.exe< vs 0438.pdf.exe
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916A97000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_IsIcoRes.exe< vs 0438.pdf.exe
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916A97000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSetAllUsers.dll< vs 0438.pdf.exe
                  Source: 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B1D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_IsIcoRes.exe< vs 0438.pdf.exe
                  Source: classification engineClassification label: mal68.troj.evad.winEXE@37/79@1/3
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665ECB6D8 GetLastError,FormatMessageW,LocalFree,0_2_00007FF665ECB6D8
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EE8624 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipAlloc,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00007FF665EE8624
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - ServerJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.5012Jump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeMutant created: \Sessions\1\BaseNamedObjects\Local\ROMFUSLocal
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeMutant created: \Sessions\1\BaseNamedObjects\Local\ROMFUSTray
                  Source: C:\Users\user\Desktop\0438.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\__tmp_rar_sfx_access_check_5323234Jump to behavior
                  Source: Yara matchFile source: 7.0.ROMFUSClient.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.0.ROMServer.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000009.00000000.1843565844.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000000.1833595645.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, type: MEMORY
                  Source: Yara matchFile source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exe, type: DROPPED
                  Source: 0438.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Users\user\Desktop\0438.pdf.exeFile read: C:\Windows\win.iniJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeFile read: C:\Users\user\Desktop\0438.pdf.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\0438.pdf.exe "C:\Users\user\Desktop\0438.pdf.exe"
                  Source: C:\Users\user\Desktop\0438.pdf.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\pdf.msi" /qn
                  Source: C:\Users\user\Desktop\0438.pdf.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\Doc.pdf"
                  Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2068 --field-trial-handle=1576,i,6061207058783302797,5194887840937353,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /siex /silentinstall
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /siex /silentinstall
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /firewall
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /firewall
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /start
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /start
                  Source: unknownProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe"
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /tray
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe"
                  Source: C:\Users\user\Desktop\0438.pdf.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\pdf.msi" /qnJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\Doc.pdf"Jump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /siex /silentinstallJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /firewallJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /startJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2068 --field-trial-handle=1576,i,6061207058783302797,5194887840937353,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8Jump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /siex /silentinstall
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /firewall
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /start
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /tray
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe"
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: dxgidebug.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: riched20.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: usp10.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: msls31.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: pcacli.dllJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: dlnashext.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wpdshext.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: linkinfo.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: ntshrui.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: cscapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: umpdc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: fwpuclnt.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: idndl.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dwmapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: propsys.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: profapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: edputil.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: urlmon.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: iertutil.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: srvcli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: windows.staterepositoryps.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wintypes.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: appresolver.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: bcp47langs.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: slc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: userenv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sppc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: onecorecommonproxystub.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: onecoreuapcommonproxystub.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: apphelp.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: pcacli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: mpr.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sfc_os.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: apphelp.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avifil32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: umpdc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: umpdc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: fwpuclnt.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: idndl.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dwmapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: propsys.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: profapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: edputil.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: urlmon.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: iertutil.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: srvcli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: windows.staterepositoryps.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wintypes.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: appresolver.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: bcp47langs.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: slc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: userenv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sppc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: onecorecommonproxystub.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: onecoreuapcommonproxystub.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: pcacli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: mpr.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sfc_os.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avifil32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: umpdc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: firewallapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: dnsapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: fwbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: fwpolicyiomgr.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: sxs.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: umpdc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: fwpuclnt.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: idndl.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dwmapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: propsys.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: profapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: edputil.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: urlmon.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: iertutil.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: srvcli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: windows.staterepositoryps.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wintypes.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: appresolver.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: bcp47langs.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: slc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: userenv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sppc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: onecorecommonproxystub.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: onecoreuapcommonproxystub.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: pcacli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: mpr.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sfc_os.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avifil32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: umpdc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avifil32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: umpdc.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: kernel.appcore.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: sspicli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: windows.storage.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wldp.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: fwpuclnt.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: idndl.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: ntmarta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msxml6.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: userenv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: profapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: mswsock.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wininet.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmmbase.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmmbase.dll
                  Source: C:\Users\user\Desktop\0438.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                  Source: Start LM-Server.lnk.3.drLNK file: ..\..\..\..\..\..\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                  Source: Uninstall LiteManager - Server.lnk.3.drLNK file: ..\..\..\..\..\..\Windows\SysWOW64\msiexec.exe
                  Source: Stop LM-Server.lnk.3.drLNK file: ..\..\..\..\..\..\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                  Source: Settings for LM-Server.lnk.3.drLNK file: ..\..\..\..\..\..\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: 0438.pdf.exeStatic PE information: Image base 0x140000000 > 0x60000000
                  Source: 0438.pdf.exeStatic file information: File size 11654747 > 1048576
                  Source: 0438.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: 0438.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: 0438.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: 0438.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: 0438.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: 0438.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: 0438.pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Source: 0438.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: 0438.pdf.exe
                  Source: 0438.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: 0438.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: 0438.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: 0438.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: 0438.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\0438.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\__tmp_rar_sfx_access_check_5323234Jump to behavior
                  Source: 0438.pdf.exeStatic PE information: section name: .didat
                  Source: 0438.pdf.exeStatic PE information: section name: _RDATA
                  Source: ROMViewer.exe.3.drStatic PE information: section name: .didata
                  Source: ROMFUSClient.exe.3.drStatic PE information: section name: .didata
                  Source: ROMwln.dll.3.drStatic PE information: section name: .didata
                  Source: ROMServer.exe.3.drStatic PE information: section name: .didata
                  Source: HookDrv.dll.3.drStatic PE information: section name: .didata
                  Source: ROMServer.exe0.3.drStatic PE information: section name: .didata
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665F05166 push rsi; retf 0_2_00007FF665F05167
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665F05156 push rsi; retf 0_2_00007FF665F05157
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\config_server_B6BD2967C67B44649764F06ADFFD6458.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\stop_server_51B516B87C64408FA3C56354EA2277C2.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\files\ROMServer.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ARPPRODUCTICON.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\HookDrv.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\UNINST_Uninstall_L_78AA5B6662514D94A847D6C603AF0895.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\ROMwln.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\AledensoftIpcServer.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ROMServer.exe_9D09B2BC25A2414CBD848E2B75898676.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\config_server_B6BD2967C67B44649764F06ADFFD6458.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\stop_server_51B516B87C64408FA3C56354EA2277C2.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ARPPRODUCTICON.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\UNINST_Uninstall_L_78AA5B6662514D94A847D6C603AF0895.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ROMServer.exe_9D09B2BC25A2414CBD848E2B75898676.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\EULA.rtfJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\romserver.exe
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LiteManager Pro - ServerJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LiteManager Pro - Server\Start LM-Server.lnkJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LiteManager Pro - Server\Uninstall LiteManager - Server.lnkJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LiteManager Pro - Server\Stop LM-Server.lnkJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LiteManager Pro - Server\Settings for LM-Server.lnkJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: Possible double extension: pdf.exeStatic PE information: 0438.pdf.exe
                  Source: C:\Windows\System32\msiexec.exeKey value created or modified: HKEY_LOCAL_MACHINE\SYSTEM\LiteManager\v3.4\Server\Parameters NoIPSettingsJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeWindow / User API: threadDelayed 2360
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeWindow / User API: threadDelayed 7446
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\config_server_B6BD2967C67B44649764F06ADFFD6458.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\stop_server_51B516B87C64408FA3C56354EA2277C2.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\LiteManager Pro - Server\files\ROMServer.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ARPPRODUCTICON.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\LiteManager Pro - Server\HookDrv.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\UNINST_Uninstall_L_78AA5B6662514D94A847D6C603AF0895.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\LiteManager Pro - Server\ROMwln.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\LiteManager Pro - Server\AledensoftIpcServer.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ROMServer.exe_9D09B2BC25A2414CBD848E2B75898676.exeJump to dropped file
                  Source: C:\Windows\System32\svchost.exe TID: 6880Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\svchost.exe TID: 6880Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe TID: 5348Thread sleep count: 51 > 30
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe TID: 8104Thread sleep time: -1180000s >= -30000s
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe TID: 8104Thread sleep time: -3723000s >= -30000s
                  Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeLast function: Thread delayed
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EEB190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF665EEB190
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665ED40BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF665ED40BC
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EFFCA0 FindFirstFileExA,0_2_00007FF665EFFCA0
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EF16A4 VirtualQuery,GetSystemInfo,0_2_00007FF665EF16A4
                  Source: svchost.exe, 00000005.00000002.3411497699.0000023FA002B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3412201732.0000023FA5645000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3412270652.0000023FA5657000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: ROMFUSClient.exe, 00000010.00000002.3605366567.0000000000C08000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll(
                  Source: ROMServer.exe, 0000000F.00000002.3605481052.0000000000DB8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll?
                  Source: ROMFUSClient.exe, 00000011.00000002.3605532030.0000000000C68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EF76D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF665EF76D8
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665F00D20 GetProcessHeap,0_2_00007FF665F00D20
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess token adjusted: Debug
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess token adjusted: Debug
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /startJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EF76D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF665EF76D8
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EF3170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF665EF3170
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EF2510 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF665EF2510
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EF3354 SetUnhandledExceptionFilter,0_2_00007FF665EF3354
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EEB190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF665EEB190
                  Source: C:\Users\user\Desktop\0438.pdf.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\pdf.msi" /qnJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\Doc.pdf"Jump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /siex /silentinstall
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /firewall
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /start
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665F058E0 cpuid 0_2_00007FF665F058E0
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00007FF665EEA2CC
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665EF0754 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,OleUninitialize,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF665EF0754
                  Source: C:\Users\user\Desktop\0438.pdf.exeCode function: 0_2_00007FF665ED51A4 GetVersionExW,0_2_00007FF665ED51A4

                  Remote Access Functionality

                  barindex
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server AllowRemoteRPC
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure1
                  Replication Through Removable Media
                  Windows Management Instrumentation1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  1
                  Disable or Modify Tools
                  OS Credential Dumping1
                  System Time Discovery
                  1
                  Remote Desktop Protocol
                  1
                  Archive Collected Data
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/Job1
                  Windows Service
                  1
                  DLL Side-Loading
                  11
                  Obfuscated Files or Information
                  LSASS Memory11
                  Peripheral Device Discovery
                  Remote Desktop ProtocolData from Removable Media1
                  Non-Standard Port
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAt1
                  Registry Run Keys / Startup Folder
                  1
                  Windows Service
                  1
                  Software Packing
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook11
                  Process Injection
                  1
                  DLL Side-Loading
                  NTDS65
                  System Information Discovery
                  Distributed Component Object ModelInput Capture1
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                  Registry Run Keys / Startup Folder
                  1
                  File Deletion
                  LSA Secrets31
                  Security Software Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts122
                  Masquerading
                  Cached Domain Credentials2
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Modify Registry
                  DCSync1
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                  Virtualization/Sandbox Evasion
                  Proc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                  Process Injection
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1543801 Sample: 0438.pdf.exe Startdate: 28/10/2024 Architecture: WINDOWS Score: 68 52 x1.i.lencr.org 2->52 60 Sigma detected: Suspicious Double Extension File Execution 2->60 62 Uses an obfuscated file name to hide its real file extension (double extension) 2->62 64 Connects to many ports of the same IP (likely port scanning) 2->64 66 Initial sample is a PE file and has a suspicious name 2->66 9 ROMServer.exe 2->9         started        13 msiexec.exe 99 61 2->13         started        16 0438.pdf.exe 6 9 2->16         started        18 svchost.exe 1 1 2->18         started        signatures3 process4 dnsIp5 54 111.90.140.76, 465, 49871, 49872 SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY Malaysia 9->54 56 65.21.245.7, 49875, 49876, 5555 CP-ASDE United States 9->56 68 Enables remote desktop connection 9->68 70 Enables network access during safeboot for specific services 9->70 20 ROMFUSClient.exe 9->20         started        22 ROMFUSClient.exe 9->22         started        44 C:\Program Files (x86)\...\ROMServer.exe, PE32 13->44 dropped 46 stop_server_51B516...3C56354EA2277C2.exe, PE32 13->46 dropped 48 config_server_B6BD...764F06ADFFD6458.exe, PE32 13->48 dropped 50 9 other files (none is malicious) 13->50 dropped 24 ROMFUSClient.exe 13->24         started        26 ROMFUSClient.exe 13->26         started        28 ROMFUSClient.exe 13->28         started        30 Acrobat.exe 71 16->30         started        32 msiexec.exe 16->32         started        58 127.0.0.1 unknown unknown 18->58 file6 signatures7 process8 process9 34 ROMServer.exe 24->34         started        36 ROMServer.exe 26->36         started        38 ROMServer.exe 28->38         started        40 AcroCEF.exe 97 30->40         started        process10 42 AcroCEF.exe 40->42         started       

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  0438.pdf.exe5%ReversingLabsWin64.Malware.Generic
                  SourceDetectionScannerLabelLink
                  C:\Program Files (x86)\LiteManager Pro - Server\AledensoftIpcServer.dll0%ReversingLabs
                  C:\Program Files (x86)\LiteManager Pro - Server\HookDrv.dll0%ReversingLabs
                  C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe3%ReversingLabs
                  C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe3%ReversingLabs
                  C:\Program Files (x86)\LiteManager Pro - Server\ROMwln.dll0%ReversingLabs
                  C:\Program Files (x86)\LiteManager Pro - Server\files\ROMServer.exe3%ReversingLabs
                  C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exe3%ReversingLabs
                  C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ARPPRODUCTICON.exe0%ReversingLabs
                  C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ROMServer.exe_9D09B2BC25A2414CBD848E2B75898676.exe5%ReversingLabs
                  C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\UNINST_Uninstall_L_78AA5B6662514D94A847D6C603AF0895.exe0%ReversingLabs
                  C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\config_server_B6BD2967C67B44649764F06ADFFD6458.exe5%ReversingLabs
                  C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\stop_server_51B516B87C64408FA3C56354EA2277C2.exe5%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://g.live.com/odclientsettings/Prod.C:0%URL Reputationsafe
                  http://x1.i.lencr.org/0%URL Reputationsafe
                  https://g.live.com/odclientsettings/ProdV20%URL Reputationsafe
                  http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
                  https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c960%URL Reputationsafe
                  http://www.symauth.com/rpa000%URL Reputationsafe
                  http://ocsp.thawte.com00%URL Reputationsafe
                  https://g.live.com/odclientsettings/ProdV2.C:0%URL Reputationsafe
                  http://www.indyproject.org/0%URL Reputationsafe
                  http://www.symauth.com/cps0(0%URL Reputationsafe
                  https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b60%URL Reputationsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  x1.i.lencr.org
                  unknown
                  unknownfalse
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://litemanager.com/1ROMServer.exe, 0000000F.00000002.3606364288.000000000176C000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000010.00000002.3606716114.000000000297C000.00000004.00001000.00020000.00000000.sdmpfalse
                      unknown
                      http://litemanager.ru/ROMFUSClient.exe, 00000007.00000000.1834516823.00000000008E4000.00000002.00000001.01000000.0000000B.sdmp, ROMServer.exe, 00000009.00000000.1848189601.00000000009FE000.00000002.00000001.01000000.0000000C.sdmp, Ukrainian.lg.3.dr, Russian.lg.3.drfalse
                        unknown
                        https://g.live.com/odclientsettings/Prod.C:edb.log.5.drfalse
                        • URL Reputation: safe
                        unknown
                        http://x1.i.lencr.org/2D85F72862B55C4EADD9E66E06947F3D0.4.drfalse
                        • URL Reputation: safe
                        unknown
                        https://litemanager.com/soft/pro/ROMServer.zipROMFUSClient.exe, 00000007.00000000.1833595645.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, ROMServer.exe, 00000009.00000000.1843565844.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, ROMFUSClient.exe.3.drfalse
                          unknown
                          http://litemanager.com/03ROMFUSClient.exe, 00000010.00000002.3606716114.0000000002983000.00000004.00001000.00020000.00000000.sdmpfalse
                            unknown
                            https://g.live.com/odclientsettings/ProdV2edb.log.5.drfalse
                            • URL Reputation: safe
                            unknown
                            https://litemanager.com/romversion.txtROMFUSClient.exe, 00000007.00000000.1833595645.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, ROMServer.exe, 00000009.00000000.1843565844.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, ROMFUSClient.exe.3.drfalse
                              unknown
                              http://crl.thawte.com/ThawteTimestampingCA.crl00438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B11000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.drfalse
                              • URL Reputation: safe
                              unknown
                              https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96svchost.exe, 00000005.00000003.1771637769.0000023FA58C2000.00000004.00000800.00020000.00000000.sdmp, edb.log.5.drfalse
                              • URL Reputation: safe
                              unknown
                              http://www.symauth.com/rpa000438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B11000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.drfalse
                              • URL Reputation: safe
                              unknown
                              http://litemanager.ru/forum/ru/memberlist.php?mode=viewprofile&u=977.Ukrainian.lg.3.drfalse
                                unknown
                                http://ocsp.thawte.com00438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B11000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.drfalse
                                • URL Reputation: safe
                                unknown
                                http://litemanager.ru/noip.txtUROMServer.exe, 00000009.00000000.1843565844.0000000000401000.00000020.00000001.01000000.0000000C.sdmpfalse
                                  unknown
                                  http://crl.ver)svchost.exe, 00000005.00000002.3412122782.0000023FA5600000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://g.live.com/odclientsettings/ProdV2.C:edb.log.5.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://litemanager.com/5141a4.rbs.3.drfalse
                                      unknown
                                      http://litemanager.com/03wROMServer.exe, 0000000F.00000002.3606364288.0000000001773000.00000004.00001000.00020000.00000000.sdmpfalse
                                        unknown
                                        http://www.LiteManagerTeam.com5141a4.rbs.3.drfalse
                                          unknown
                                          http://www.indyproject.org/ROMFUSClient.exe, 00000007.00000000.1833595645.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, ROMFUSClient.exe, 00000007.00000003.1853231064.00000000028D7000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 00000009.00000003.1850203236.0000000002907000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 00000009.00000000.1843565844.0000000000951000.00000020.00000001.01000000.0000000C.sdmp, ROMFUSClient.exe, 0000000A.00000003.1864973686.00000000027F7000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 0000000B.00000003.1862661234.0000000002947000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 0000000D.00000003.1902208763.0000000002887000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 0000000E.00000003.1897803392.00000000027E7000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 0000000F.00000002.3606364288.00000000016D7000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000010.00000002.3606716114.00000000028E7000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000011.00000002.3606084225.00000000027B7000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe.3.drfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.symauth.com/cps0(0438.pdf.exe, 00000000.00000003.1743995858.0000017916AD3000.00000004.00000020.00020000.00000000.sdmp, 0438.pdf.exe, 00000000.00000003.1743995858.0000017916B11000.00000004.00000020.00020000.00000000.sdmp, pdf.msi.0.drfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6svchost.exe, 00000005.00000003.1771637769.0000023FA58C2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.drfalse
                                          • URL Reputation: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          111.90.140.76
                                          unknownMalaysia
                                          45839SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMYtrue
                                          65.21.245.7
                                          unknownUnited States
                                          199592CP-ASDEfalse
                                          IP
                                          127.0.0.1
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1543801
                                          Start date and time:2024-10-28 13:40:49 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 8m 22s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Run name:Run with higher sleep bypass
                                          Number of analysed new started processes analysed:22
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:0438.pdf.exe
                                          renamed because original name is a hash value
                                          Original Sample Name: .pdf.exe
                                          Detection:MAL
                                          Classification:mal68.troj.evad.winEXE@37/79@1/3
                                          EGA Information:
                                          • Successful, ratio: 50%
                                          HCA Information:
                                          • Successful, ratio: 100%
                                          • Number of executed functions: 70
                                          • Number of non-executed functions: 93
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                          • Excluded IPs from analysis (whitelisted): 184.28.88.176, 2.19.126.143, 2.19.126.149, 52.5.13.197, 52.202.204.11, 54.227.187.23, 23.22.254.206, 162.159.61.3, 172.64.41.3, 184.28.90.27, 93.184.221.240, 2.23.197.184, 88.221.168.141, 2.16.164.115, 2.16.164.75, 2.16.164.51, 2.16.164.83, 2.16.164.8, 2.16.164.112, 2.16.164.122, 2.16.164.91, 2.16.164.11, 23.218.232.159
                                          • Excluded domains from analysis (whitelisted): e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, e8652.dscx.akamaiedge.net, slscr.update.microsoft.com, e4578.dscb.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, acroipm2.adobe.com, wu.azureedge.net, ocsp.digicert.com, ssl-delivery.adobe.com.edgekey.net, a122.dscd.akamai.net, e16604.g.akamaiedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, crl.root-x1.letsencrypt.org.edgekey.net, fs.microsoft.com, otelrules.azureedge.net, acroipm2.adobe.com.edgesuite.net, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, p13n.adobe.io, fe3cr.delivery.mp.microsoft.com, ssl.adobe.com.edgekey.net, armmf.adobe.com, geo2.adobe.com
                                          • Execution Graph export aborted for target ROMServer.exe, PID 7076 because there are no executed function
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • VT rate limit hit for: 0438.pdf.exe
                                          TimeTypeDescription
                                          08:42:36API Interceptor125536x Sleep call for process: ROMFUSClient.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          65.21.245.7044f.pdf.scrGet hashmaliciousRMSRemoteAdminBrowse
                                            3e#U043c.scrGet hashmaliciousRMSRemoteAdminBrowse
                                              3e#U043c.scrGet hashmaliciousRMSRemoteAdminBrowse
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMYb.cmdGet hashmaliciousUnknownBrowse
                                                • 101.99.92.203
                                                rrwzOU7A9F.exeGet hashmaliciousXWormBrowse
                                                • 101.99.92.203
                                                3xlcP3DFLm.exeGet hashmaliciousXWormBrowse
                                                • 101.99.92.203
                                                JruZmEO5Dm.exeGet hashmaliciousXWormBrowse
                                                • 101.99.92.203
                                                zVlbADkNqu.exeGet hashmaliciousXWormBrowse
                                                • 101.99.92.203
                                                vqUuq8t2Uc.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                • 101.99.92.203
                                                pXJ9iQvcQa.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                • 101.99.92.203
                                                CP-ASDEiQPxJrxxaj.exeGet hashmaliciousPikaBotBrowse
                                                • 65.20.66.218
                                                iQPxJrxxaj.exeGet hashmaliciousPikaBotBrowse
                                                • 65.20.66.218
                                                http://www.thegioimoicau.com/Get hashmaliciousUnknownBrowse
                                                • 65.21.45.74
                                                Bill Of Lading_MEDUVB935991.pdf.exeGet hashmaliciousFormBookBrowse
                                                • 65.21.196.90
                                                arm.elfGet hashmaliciousUnknownBrowse
                                                • 65.21.50.224
                                                P1 BOL.exeGet hashmaliciousUnknownBrowse
                                                • 65.21.196.90
                                                Doc 784-01965670.exeGet hashmaliciousFormBookBrowse
                                                • 65.21.196.90
                                                No context
                                                No context
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:data
                                                Category:modified
                                                Size (bytes):25210
                                                Entropy (8bit):5.137987835164834
                                                Encrypted:false
                                                SSDEEP:384:8S75t8t+CqZ+oNbynfBytjj3IGdgdVOVv:8S1t8t+CqZ+oNbynfEtIG+jMv
                                                MD5:842DC8644AE8AD0B673659D501A14797
                                                SHA1:3F01957A39466DAFD196B6B08B3A4D8269980A08
                                                SHA-256:CF77BCDECFC6FE1BC7DD2A2E09939C27C44175FF403AF1B2183556D1FD94251A
                                                SHA-512:73C44641D726FE1E9E3C9F932F91EDE641A942998D6FF82D2721B4E91AD22F42C251A6936DD1B8DA2E8F4FCAACA252ADF1D4271501415086D190E300CD356C9C
                                                Malicious:false
                                                Preview:...@IXOS.@.....@;E\Y.@.....@.....@.....@.....@.....@......&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}..LiteManager Pro - Server..pdf.msi.@.....@.....@.....@......ARPPRODUCTICON.exe..&.{9EF586E9-112B-4AAE-B439-5B62B7A0B1DE}.....@.....@.....@.....@.......@.....@.....@.......@......LiteManager Pro - Server......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{3244CDE6-6414-4399-B0D5-424562747210}&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}.@......&.{4D4D18AA-F74D-4291-B5A9-93C3CC48B75F}&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}.@......&.{641F154A-FEEF-4FA7-B5BF-414DB1DB8390}&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}.@......&.{26EAB54E-4659-47E8-86F9-4CB74F7E03BE}&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}.@......&.{596F4636-5D51-49F5-B3B4-F3C366E9DC23}&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}.@......&.{596F4636-5D51-49F5-B3B4-F3C366E9DC23}&.{00000000-0000-0000-0000-000000000000}.@......&.{A3DC5A2F-2249-4674-B
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):132032
                                                Entropy (8bit):6.10195829980833
                                                Encrypted:false
                                                SSDEEP:3072:sh/1J7RYdzZU4Z5tegH1q888888888888W888888888882zgP:sh/jIZPZ5tJ8888888888888W888888s
                                                MD5:C40455A478E0B76521130D9DAAAADC4B
                                                SHA1:42DE923D5E36A9F56B002DD66DB245BC44480089
                                                SHA-256:308085BC357BF3A3BEE0D662FCC01628E9EE2FFD478AE0F1E7140939AD99B892
                                                SHA-512:76ED6D763F603BCAA7FE186C0A7449E614DCDB18036F7587C6E5A11C3F3269E400E3D2062856CC280AC20C094617924783B6C360F25AF66767DCC53C2F3045C9
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....xK............................p........ ..........................................................................\.......\...............................x#...................................................................................text...$........................... ..`.itext.............................. ..`.data...0.... ......................@....bss....xN...@...........................idata..\...........................@....edata..\............&..............@..@.reloc..x#.......$...(..............@..B.rsrc................L..............@..@....................................@..@........................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:Rich Text Format data, version 1, ANSI, code page 1251, default language ID 1049
                                                Category:dropped
                                                Size (bytes):58679
                                                Entropy (8bit):4.738446173390891
                                                Encrypted:false
                                                SSDEEP:768:bkJC7UF9eVWSlBY8Aq9CBGDtD8gX1ZDCZjewbAsCw1vPDQuJPQzusxxeCNHnPPsT:htwqueMZYU
                                                MD5:BAED4E7AF33F77350D454B69317EE63B
                                                SHA1:2B598774F0C73850A36117F29EA8DAC57BE1C138
                                                SHA-256:671D65183C39E53FC1759C45B105A0FBE2D3A216E4099B66D5FCF274EA625E07
                                                SHA-512:E740997BDECB8F907A000D01BF3E823898A1289D1DBFAE5BF342D4BCB6FF09D258317955F4FD858FF6B239E5BA08E49E90CDEC06E24DABDB18C1CF2D8943590C
                                                Malicious:false
                                                Preview:{\rtf1\ansi\ansicpg1251\uc1\deff0\stshfdbch0\stshfloch37\stshfhich37\stshfbi37\deflang1049\deflangfe1049{\fonttbl{\f0\froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman{\*\falt Times New Roman};}..{\f1\fswiss\fcharset204\fprq2{\*\panose 020b0604020202020204}Arial;}{\f2\fmodern\fcharset204\fprq1{\*\panose 02070309020205020404}Courier New;}{\f3\froman\fcharset2\fprq2{\*\panose 05050102010706020507}Symbol;}..{\f10\fnil\fcharset2\fprq2{\*\panose 05000000000000000000}Wingdings;}{\f37\fswiss\fcharset204\fprq2{\*\panose 020f0502020204030204}Calibri;}{\f211\froman\fcharset0\fprq2 Times New Roman{\*\falt Times New Roman};}..{\f209\froman\fcharset238\fprq2 Times New Roman CE{\*\falt Times New Roman};}{\f212\froman\fcharset161\fprq2 Times New Roman Greek{\*\falt Times New Roman};}{\f213\froman\fcharset162\fprq2 Times New Roman Tur{\*\falt Times New Roman};}..{\f214\froman\fcharset177\fprq2 Times New Roman (Hebrew){\*\falt Times New Roman};}{\f215\froman\fcharset178\fprq2 Time
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):89220
                                                Entropy (8bit):3.469297258214741
                                                Encrypted:false
                                                SSDEEP:768:YvozCzKUNNfMnuQhgdXT0Z2BPshK+4aCWpQJ3OEInKDcbztlXnpQbbMv3PI:Yvoz4TXTI2pQCWOJvgXnpQbS3PI
                                                MD5:B1C96EF24061BF294CAC6C4C9CBF7757
                                                SHA1:5D1B1934091E257B5F1C69B13F5FC1E424348584
                                                SHA-256:20DB884523DA62C20F80B8A3BB71E11091B90A443B83C06D8FE2A1BBC00C1C33
                                                SHA-512:6E90562FD804F91DDADEF2310551063D34B859FF1CC6E58A41667E9CDA062DCA851C8455882EF47CF3E1A8EC21EBD9F0761F15E54174CC4A95427238CB39BA14
                                                Malicious:false
                                                Preview:..[._.s.y.s.t.e.m.].....l.a.n.g.u.a.g.e._.i.d.=.1.0.3.3.........[._.m.e.s.s.a.g.e.s.].....w.e.b._.s.i.t.e. .=. .h.t.t.p.:././.l.i.t.e.m.a.n.a.g.e.r...c.o.m./.....q.u.e.s.t.i.o.n. .=. .Q.u.e.s.t.i.o.n.....e.r.r.o.r. .=. .E.r.r.o.r.....i.n.f.o.r.m.a.t.i.o.n. .=. .I.n.f.o.r.m.a.t.i.o.n.....n.o.t.i.f.i.c.a.t.i.o.n. .=. .N.o.t.i.f.i.c.a.t.i.o.n.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.r.e.a.d._.c.o.n.f.i.g.u.r.a.t.i.o.n. .=. .C.a.n. .n.o.t. .r.e.a.d. .s.e.r.v.i.c.e. .c.o.n.f.i.g.u.r.a.t.i.o.n...\.n.;.R.e.i.n.s.t.a.l.l. .L.i.t.e.M.a.n.a.g.e.r. .s.e.r.v.i.c.e.?.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e. .=. .C.a.n. .n.o.t. .s.e.t. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r. .s.e.r.v.i.c.e. .s.t.a.r.t.u.p. .m.o.d.e.......f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e._.r.e.s.t.a.r.t. .=. .C.a.n. .n.o.t. .s.e.t. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r. .s.e.r.v.i.c.e. .s.t.a.r.t.u.p. .m.o.d.e...\.n.;.R.e.b.o.o.t. .s.y.s.t.e.m.,. .p.l.e.a.s.e.......
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):201728
                                                Entropy (8bit):6.3607488106285075
                                                Encrypted:false
                                                SSDEEP:3072:rmqdVRkbN1G3OKtVLqKc3IuQquARCASmShKJ:rmyTmNw3zqKcFLRs
                                                MD5:1D4F8CFC7BBF374CCC3AAE6045B2133D
                                                SHA1:802EDF0B0ED1D0305BCD6688EE3301366FEC1337
                                                SHA-256:C04885562F17BAEEFBCD2D4FC29F054EB8A66C44BD015750498C69A912D94C1F
                                                SHA-512:68643A30FEA87B2B61AF546F42BF32A25459152C1BCCE5A8A881714139CE828DFE4237874FF1E9CC3B78D6CDBEF7DD45C9F3459C3337D83693C704C274AFFF3E
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...|..[.................\...........v............@.................................................................. ...................@...................@...G..................................................$................................text....S.......T.................. ..`.itext..D....p.......X.............. ..`.data...<............`..............@....bss....<Y...............................idata...............z..............@....didata.............................@....edata....... ......................@..@.rdata..E....0......................@..@.reloc...G...@...H..................@..B.rsrc....@.......@..................@..@....................................@..@........................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):61034
                                                Entropy (8bit):4.429529654892776
                                                Encrypted:false
                                                SSDEEP:768:nebbtdP4XFsh6HWiIZTYp7JtMLG54ttg2kGPyWtvQTznCKDMlV2f:ne3KOhTTocL8HnMlV2f
                                                MD5:7303B5AE0B8911CEB238DC01419695BE
                                                SHA1:22B89BDB8FAEC62BA3E66639E38E6271B593944A
                                                SHA-256:88155FB3F0E198AA4A24F9CFECBB83C5A4E081C6EA362BC50294410CB2FB5C50
                                                SHA-512:8AE802616AF60BAF214E254F6A55D312DC46B6E3F8BEE5F50E30E372FF38103776278B5FB07A562C2149EEA58107CB427A03B1629F72044AB69D3507E5DFAB15
                                                Malicious:false
                                                Preview:[._.s.y.s.t.e.m.].....l.a.n.g.u.a.g.e._.i.d.=.1.0.2.8.........[._.m.e.s.s.a.g.e.s.].....w.e.b._.s.i.t.e. .=. .h.t.t.p.:././.l.i.t.e.m.a.n.a.g.e.r...c.o.m./.....q.u.e.s.t.i.o.n. .=. .OUL.....e.r.r.o.r. .=. ./.......i.n.f.o.r.m.a.t.i.o.n. .=. ........n.o.t.i.f.i.c.a.t.i.o.n. .=. ....w....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.r.e.a.d._.c.o.n.f.i.g.u.r.a.t.i.o.n. .=. .!q.l...S.g.RD}Ka.0\.n.;...e.[. .L.i.t.e.M.a.n.a.g.e.r. ..g.R?.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e. .=. .!q.l-..[ .L.i.t.e.M.a.n.a.g.e.r. .:O.ghV.g.R_U.R!j._.0....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e._.r.e.s.t.a.r.t. .=. .!q.l-..[ .L.i.t.e.M.a.n.a.g.e.r. .:O.ghV.g.R_U.R!j._.0\.n.;....e.._j.|q}.0....f.m._.s.e.t.t.i.n.g.s._.r.e.s.t.a.r.t._.s.e.r.v.i.c.e._.t.o._.a.p.p.l.y. .=. ....e_U.R .L.M. .:O.ghV.a(u.z._.NWY(u...f.0....f.m._.s.e.c.u.r.i.t.y._.f.o.r.c.e._.g.u.e.s.t. .=. .7_6R.O.(Wdk.|q}.N-..[.....asTW.@b.g.}..O(u.....S.g.O.X[.S.kP..0 .!q.l.O(u.07_
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):58794
                                                Entropy (8bit):3.642324420313977
                                                Encrypted:false
                                                SSDEEP:768:D+XPobz4qFlRiiXc0HwgHSSxnrKT7nke7GShFBy/x97fuTLY57aC7I/Fj:yPQMw1ZOT7kef1y/X7fuTq4j
                                                MD5:606DC375E898D7221CCB7CEB8F7C686B
                                                SHA1:26DCF93876C89283623B8150C1B79EDB24B6A7EC
                                                SHA-256:F442E440580EA35040E35BF1D85A118E7C182FDE0B9BA2A3C1816DEAB5F822BB
                                                SHA-512:9FBC42165B51A2020D2DA2FFE33287A4F3AA33639126813B290D329D47C4F4DA8F297A47AF3C1F63AF6F9E1BA47ACE840BC1660D603E17589E5DB6DDA0E1E5B1
                                                Malicious:false
                                                Preview:..[._.s.y.s.t.e.m.].....l.a.n.g.u.a.g.e._.i.d.=.1.0.5.5.........[._.m.e.s.s.a.g.e.s.].....w.e.b._.s.i.t.e. .=. .h.t.t.p.:././.l.i.t.e.m.a.n.a.g.e.r...c.o.m./.....q.u.e.s.t.i.o.n. .=. .S.o.r.u.....e.r.r.o.r. .=. .H.a.t.a.....i.n.f.o.r.m.a.t.i.o.n. .=. .B.i.l.g.i.....n.o.t.i.f.i.c.a.t.i.o.n. .=. .B.i.l.d.i.r.i.m.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.r.e.a.d._.c.o.n.f.i.g.u.r.a.t.i.o.n. .=. .H.i.z.m.e.t. .y.a.p.1.l.a.n.d.1.r.m.a.s.1. .o.k.u.n.a.m.1.y.o.r...\.n.;.L.i.t.e.M.a.n.a.g.e.r. .h.i.z.m.e.t.i.n.i. .y.e.n.i.d.e.n. .y...k.l.e.m.e.k. .m.i. .i.s.t.i.y.o.r.s.u.n.u.z.?.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e. .=. .L.i.t.e.M.a.n.a.g.e.r. .h.i.z.m.e.t. .b.a._.l.a.n.g.1... .m.o.d.u.n.u. .a.y.a.r.l.a.y.a.m.1.y.o.r.......f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e._.r.e.s.t.a.r.t. .=. .L.i.t.e.M.a.n.a.g.e.r. .h.i.z.m.e.t. .b.a._.l.a.n.g.1... .m.o.d.u.n.u. .a.y.a.r.l.a.y.a.m.1.y.o.r...\.n.;.S.i.s.t.e.m.i. .y.e.n.i.d.e.n. .b.a._.l.
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with very long lines (305), with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):87912
                                                Entropy (8bit):4.303374267443204
                                                Encrypted:false
                                                SSDEEP:768:VUlHxa/yEOYEJNHWjlUu1pZ26ER2nkUTbfk74Q:aNxWREb4lUu1P29R2JbfC4Q
                                                MD5:3FC082E8F516EAD9FC26AC01E737F9EF
                                                SHA1:3B67EBCE4400DDCF6B228E5668F3008561FB8F21
                                                SHA-256:3DC0CEAE11F445B57B17B7C35A90B5133E313CF6B61550AB418252C5B8089C99
                                                SHA-512:9A9D20AF2F8C27056F58AB5A9C687F5124CE5F6D563E396C9558331FB8BE48E88E148B1FDC548A5EBDEDB451E3D89F2F96856F3BBFD695691D5687599F376421
                                                Malicious:false
                                                Preview:..[._.s.y.s.t.e.m.].....l.a.n.g.u.a.g.e._.i.d. .=. .1.0.5.8.........[._.m.e.s.s.a.g.e.s.].....w.e.b._.s.i.t.e. .=. .h.t.t.p.:././.l.i.t.e.m.a.n.a.g.e.r...r.u./.....q.u.e.s.t.i.o.n. .=. ...8.B.0.=.=.O.....e.r.r.o.r. .=. ...>.<.8.;.:.0.....i.n.f.o.r.m.a.t.i.o.n. .=. ...=.D.>.@.<.0.F.V.O.....n.o.t.i.f.i.c.a.t.i.o.n. .=. ...>.2.V.4.>.<.;.5.=.=.O.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.r.e.a.d._.c.o.n.f.i.g.u.r.a.t.i.o.n. .=. ...5.<.>.6.;.8.2.>. .?.@.>.G.8.B.0.B.8. .:.>.=.D.V.3.C.@.0.F.V.N. .A.;.C.6.1.8...\.n.;...5.@.5.2.A.B.0.=.>.2.8.B.8. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r.?.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e. .=. ...5.<.>.6.;.8.2.>. .2.A.B.0.=.>.2.8.B.8. .@.5.6.8.<. .7.0.?.C.A.:.C. .A.;.C.6.1.8. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r.......f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e._.r.e.s.t.a.r.t. .=. ...5.<.>.6.;.8.2.>. .2.A.B.0.=.>.2.8.B.8. .@.5.6.8.<. .7.0.?.C.A.:.C. .A.;.C.6.1.8. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r.
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):6307408
                                                Entropy (8bit):6.5944937257467116
                                                Encrypted:false
                                                SSDEEP:98304:NwiA/GmKEt3LQ7V8z3uHWkd49GMdqOxaB:NOGmKEt31kd2dqwaB
                                                MD5:63D0964168B927D00064AA684E79A300
                                                SHA1:B4B9B0E3D92E8A3CBE0A95221B5512DED14EFB64
                                                SHA-256:33D1A34FEC88CE59BEB756F5A274FF451CAF171A755AAE12B047E678929E8023
                                                SHA-512:894D8A25E9DB3165E0DAAE521F36BBD6F9575D4F46A2597D13DEC8612705634EFEA636A3C4165BA1F7CA3CDC4DC7D4542D0EA9987DE10D2BC5A6ED9D6E05AECB
                                                Malicious:false
                                                Yara Hits:
                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe, Author: Joe Security
                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe, Author: Joe Security
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 3%
                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......f..................C..F........C.......C...@.......................... i.......`..........@................... N.......M..A...@T...............`.P"...PN.<............................@N.......................M.......N......................text.....C.......C................. ..`.itext...0....C..2....C............. ..`.data... 3....C..4....C.............@....bss........0E..........................idata...A....M..B....E.............@....didata.......N......LE.............@....edata....... N......ZE.............@..@.tls....X....0N..........................rdata..]....@N......\E.............@..@.reloc..<....PN......^E.............@..B.rsrc........@T......DK.............@..@............. i.......`.............@..@................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):7753808
                                                Entropy (8bit):6.615075046955521
                                                Encrypted:false
                                                SSDEEP:98304:D4/WZQ7lc63BJGS1VFeIEll251o7+YcMBk2VVyN/RTfCAFIqOx9N:DXQ7SIEXeMBk2V4N/Nq2Iqw9N
                                                MD5:F3D74B072B9697CF64B0B8445FDC8128
                                                SHA1:8408DA5AF9F257D12A8B8C93914614E9E725F54C
                                                SHA-256:70186F0710D1402371CE2E6194B03D8A153443CEA5DDB9FC57E7433CCE96AE02
                                                SHA-512:004054EF8CDB9E2FEFC3B7783574BFF57D6D5BF9A4624AD88CB7ECCAE29D4DFD2240A0DC60A14480E6722657132082332A3EC3A7C49D37437644A31E59F551AF
                                                Malicious:true
                                                Yara Hits:
                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe, Author: Joe Security
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 3%
                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...w#.f.................ZU... ......qU.......U...@.......................... ........v..........@...................._......`_..K....g.. ............v.P"...._.4............................._..................... m_.|....._......................text....&U......(U................. ..`.itext..$1...@U..2...,U............. ..`.data....@....U..B...^U.............@....bss....0.....V..........................idata...K...`_..L....V.............@....didata......._.......V.............@....edata........_.......V.............@..@.tls....`....._..........................rdata..]....._.......V.............@..@.reloc..4....._.......V.............@..B.rsrc.... ....g.. ....^.............@..@............. ........v.............@..@................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):999944
                                                Entropy (8bit):6.626732213066839
                                                Encrypted:false
                                                SSDEEP:12288:SA9+TVJdg0YMgqAahyv0jKdTq4lrBhqSq/rt8VwGFrt:SRho0lgqA6yvnrBhq/rQDt
                                                MD5:ED32E23322D816C3FE2FC3D05972689E
                                                SHA1:5EEA702C9F2AC0A1AADAE25B09E7983DA8C82344
                                                SHA-256:7F33398B98E225F56CD287060BEFF6773ABB92404AFC21436B0A20124919FE05
                                                SHA-512:E505265DD9D88B3199EB0D4B7D8B81B2F4577FABD4271B3C286366F3C1A58479B4DC40CCB8F0045C7CD08FD8BF198029345EEF9D2D2407306B73E5957AD59EDF
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...`.-\.................J...........X.......`....@.................................................................. ...................@...........0.......@.. O...................................................................................text...0?.......@.................. ..`.itext..8....P.......D.............. ..`.data....:...`...<...N..............@....bss.....]...............................idata..............................@....didata.............................@....edata....... ......................@..@.rdata..E....0......................@..@.reloc.. O...@...P..................@..B.rsrc....@.......@..................@..@.....................0..............@..@........................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):94772
                                                Entropy (8bit):4.284840986247552
                                                Encrypted:false
                                                SSDEEP:768:r1kyTyZFOTb6QeZGJXYbFAMrKARuZk7FRwZoFTa2n:rn+2iZGhYbK4KARpAoFTa2n
                                                MD5:0E204FABE68B4B65ED5E0834651FB732
                                                SHA1:B338A6E54AA18F3F8A573580520F16C74A51F3D2
                                                SHA-256:302373D81F0AE15589206420CB01A266804C9FD1C1FF0D6E09CE6BA3FEF92B64
                                                SHA-512:AAD76F6A76DC693D959389CE471BC585D0DA72737FED99F42F219FDC7C71617C00E8003A467092E12820A359D672C6FB80D99772F3F6433923B2ABB7EEA40F08
                                                Malicious:false
                                                Preview:..[._.s.y.s.t.e.m.].....l.a.n.g.u.a.g.e._.i.d.=.1.0.4.9.........[._.m.e.s.s.a.g.e.s.].....w.e.b._.s.i.t.e. .=. .h.t.t.p.:././.l.i.t.e.m.a.n.a.g.e.r...r.u./.....q.u.e.s.t.i.o.n. .=. ...>.?.@.>.A.....e.r.r.o.r. .=. ...H.8.1.:.0.....i.n.f.o.r.m.a.t.i.o.n. .=. ...=.D.>.@.<.0.F.8.O.....n.o.t.i.f.i.c.a.t.i.o.n. .=. ...?.>.2.5.I.5.=.8.5.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.r.e.a.d._.c.o.n.f.i.g.u.r.a.t.i.o.n. .=. ...5.2.>.7.<.>.6.=.>. .?.@.>.G.8.B.0.B.L. .:.>.=.D.8.3.C.@.0.F.8.N. .A.;.C.6.1.K...\.n.;...5.@.5.C.A.B.0.=.>.2.8.B.L. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r.?.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e. .=. ...5.2.>.7.<.>.6.=.>. .C.A.B.0.=.>.2.8.B.L. .@.5.6.8.<. .7.0.?.C.A.:.0. .A.;.C.6.1.K. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r.......f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e._.r.e.s.t.a.r.t. .=. ...5.2.>.7.<.>.6.=.>. .C.A.B.0.=.>.2.8.B.L. .@.5.6.8.<. .7.0.?.C.A.:.0. .A.;.C.6.1.K. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r...\.n.
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):7752272
                                                Entropy (8bit):6.615186281886958
                                                Encrypted:false
                                                SSDEEP:98304:y4/WZQ7lc63BJGS1VFeIEll251o7+YcMBk2VVyN/RTfCEFIqOxJn:yXQ7SIEXeMBk2V4N/NqiIqwJn
                                                MD5:84FB34E529BEDE393A3F604EAA8137B2
                                                SHA1:195EA03B7BD086454A13C0D8357E0A9E447D9EC9
                                                SHA-256:1E396C4066AC8F421A54893442A0D76C4F8D4146E63825D67DFC0DA782E73EE5
                                                SHA-512:A48A80D62E588667B4C891CDED279BABFFA5FB4FDF092F345212F81D29A9ACAA06E6DB27B49DC601909409A3C82AA9272BCDF90D0AE1738E83E80D9FCA4D93E6
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 3%
                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......f.................ZU... ......qU.......U...@.......................... ........v..........@...................._......`_..K....g..............(v.P"...._.4............................._..................... m_.|....._......................text....&U......(U................. ..`.itext..$1...@U..2...,U............. ..`.data....@....U..B...^U.............@....bss....0.....V..........................idata...K...`_..L....V.............@....didata......._.......V.............@....edata........_.......V.............@..@.tls....`....._..........................rdata..]....._.......V.............@..@.reloc..4....._.......V.............@..B.rsrc.........g.......^.............@..@............. .......(v.............@..@................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):11361360
                                                Entropy (8bit):6.496049600782297
                                                Encrypted:false
                                                SSDEEP:98304:AshiRp5hPI7N9sSA5wbZXJOu/0uOXZYfmQYanSjS+cWuNOlQpgfYLyPsd+QgBBP5:Al5hPwgvyAjDjS+igfgym+bHJxmK
                                                MD5:B0E355EC3453C8FFAEE08CD4257E96F2
                                                SHA1:0FA023CA8F1C1ECDADDE3DD3BD551870C2D965E2
                                                SHA-256:60248BA026064B116E4F94020DABB74DF519F5B4C41379CA19A38D725692CA8E
                                                SHA-512:B6004F83FD78EED84BF21611EFA45F2FFADF3625E0A2FDCDAE531B4734A4B886EBFE5EBE990DA42302B7368282D83DFFEF19E71DA8EC4C155EE5C8619AD028DD
                                                Malicious:false
                                                Yara Hits:
                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exe, Author: Joe Security
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 3%
                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......f..................v..67.......v...... v...@..........................0...................@...................p...........L...p....+..........:..P"...................................................................`.......................text.....u.......u................. ..`.itext...6....u..8....u............. ..`.data....R... v..T....v.............@....bss.........w..........................idata...L.......N...Xw.............@....didata......`........w.............@....edata.......p........w.............@..@.tls....`................................rdata..].............w.............@..@.reloc................w.............@..B.rsrc.....+..p....+.................@..@.............0.......:..............@..@................
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):8192
                                                Entropy (8bit):0.363788168458258
                                                Encrypted:false
                                                SSDEEP:6:6xPoaaD0JOCEfMuaaD0JOCEfMKQmDNOxPoaaD0JOCEfMuaaD0JOCEfMKQmDN:1aaD0JcaaD0JwQQbaaD0JcaaD0JwQQ
                                                MD5:0E72F896C84F1457C62C0E20338FAC0D
                                                SHA1:9C071CC3D15E5BD8BF603391AE447202BD9F8537
                                                SHA-256:686DC879EA8690C42D3D5D10D0148AE7110FA4D8DCCBF957FB8E41EE3D4A42B3
                                                SHA-512:AAA5BE088708DABC2EC9A7A6632BDF5700BE719D3F72B732BD2DFD1A3CFDD5C8884BFA4951DB0C499AF423EC30B14A49A30FBB831D1B0A880FE10053043A4251
                                                Malicious:false
                                                Preview:*.>...........&.....D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................&.............................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):1310720
                                                Entropy (8bit):1.3108007160208661
                                                Encrypted:false
                                                SSDEEP:3072:5JCnRjDxImmaooCEYhlOe2Pp4mH45l6MFXDaFXpVv1L0Inc4lfEnogVsiJKrvrM:KooCEYhgYEL0In
                                                MD5:D8749336466819CDACA88D99BDB5379C
                                                SHA1:D93EF2E140B2ED46A253C1BDA206B8B2C91C9885
                                                SHA-256:EFDCE324AB90B9D681661311DCF3B5157E5BA9AEBDE27CE4269E899C992D33D6
                                                SHA-512:1D98987EDB99C5D618B20C4706C61B96F093E112BE77F23E3EC81958FC34E12C6C80DFA6BE9F9C0C86DA73F7D6C10A67CB5B379C3B7A5D5288AF67E49E616F80
                                                Malicious:false
                                                Preview:z3..........@..@.;...{..................<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@..........................................#.................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:Extensible storage engine DataBase, version 0x620, checksum 0xad4b781c, page size 16384, Windows version 10.0
                                                Category:dropped
                                                Size (bytes):1310720
                                                Entropy (8bit):0.4221961352421052
                                                Encrypted:false
                                                SSDEEP:1536:XSB2ESB2SSjlK/uedMrSU0OrsJzvqYkr3g16f2UPkLk+ku4/Iw4KKazAkUk1k2DO:Xazag03A2UrzJDO
                                                MD5:8977088B3FD9D574C915F8658EEBD674
                                                SHA1:558D6874578E36F08B4F3134C7D41932CC5C0BB0
                                                SHA-256:C9366D8C996A2BB0AD50ECCEAC0C036413084A10D97C9E0DD953734BE7612977
                                                SHA-512:01285B6615EB965C5D503C08402A1913375E1CEA274A23074012C45A48D9FC3F4D46FC8C48E20DFDFEBA94F49ABD504C7B0D00523F529A2E619A37A5364CE6B6
                                                Malicious:false
                                                Preview:.Kx.... .......Y.......X\...;...{......................n.%......,...|..2)...|..h.#......,...|..n.%.........D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ............................................................................................................................................................................................................2...{....................................? .,...|.....................9.,...|...........................#......n.%.....................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):16384
                                                Entropy (8bit):0.0788715398926901
                                                Encrypted:false
                                                SSDEEP:3:Y48SltOetYegmShvZ6lDSBAa6lYcolallOE/tlnl+/rTc:Y48SltrzxSY4keHApMP
                                                MD5:52B5EF3ECA4F8717DF7B3DFAC86F30B3
                                                SHA1:ADAD7B49FB9E0355FEA6ED3F75CE68D9E24515AA
                                                SHA-256:FA198DB15C7D8E1B13289C49838513C04081D6EE8C10033780A83B4BE258D613
                                                SHA-512:3CA170DB128EE400CC147B6C17AFC05536397E648F75D5712B5B6C21CB54277EECEB2BFFC9113B0195AE26274E793C494A34E71349FFF0CEE8ECB3BA3BCC3747
                                                Malicious:false
                                                Preview:. .Y.....................................;...{..2)...|...,...|...........,...|...,...|...1k..,...|.....................9.,...|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Thu Aug 22 17:41:10 2024, mtime=Mon Oct 28 11:41:56 2024, atime=Thu Aug 22 17:41:10 2024, length=7753808, window=hide
                                                Category:dropped
                                                Size (bytes):2167
                                                Entropy (8bit):3.898819567963484
                                                Encrypted:false
                                                SSDEEP:48:8c2xfvmObdO8ayo/AZd5Y+d5YsP5qoZkmrSUp8JWqoZkmtn:8cU0y839O5qoZbcJWqoZbt
                                                MD5:448E906F24834BBB05C573CA54C6BA64
                                                SHA1:7BE9E5C3936D6BC92FA91026493ED3B90E9ABD8A
                                                SHA-256:6CD744A0E84672F52C8B64DF3FC8630B9A4399727BBB7A0CF9B05F3CFB87BB65
                                                SHA-512:13C19CFA5A24BA0B3B61036CD87167E8C9A56ECA45148DE93C6D8E3DDC575799B7B6DC96B42647324A8B543F1605853B6437210F0C563C1402CACF0FCF4F3CBE
                                                Malicious:false
                                                Preview:L..................F.@.. .....>.....;J..6)....>.....PPv..........................P.O. .:i.....+00.../C:\.....................1.....\Y;e..PROGRA~2.........O.I\Y;e....................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....z.1.....\Y<e..LITEMA~1..b......\Y;e\Y=e..............................L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.....h.2.PPv..Y%. .ROMSER~1.EXE..L.......Y%.\Y<e..............................R.O.M.S.e.r.v.e.r...e.x.e.......l...............-.......k...........[........C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe..L.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.\.R.O.M.S.e.r.v.e.r...e.x.e.0.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.\.../.c.o.n.f.i.g.n.C.:.\.W.i.n.d.o.w.s.\.I.n.s.t.a.l.l.e.r.\.{.7.1.F.F.A.4.7.5.-.2.4.D.5.-.4.4.F.B.-.A.5.1.F.-.3.9.B.6.9.9.E.3.D.8.2.C.}.\
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                Category:dropped
                                                Size (bytes):1890
                                                Entropy (8bit):3.1573107695942624
                                                Encrypted:false
                                                SSDEEP:48:8ddOEPLqd5Y+d5YcCP5q2DT2S0Wq2DTKX7:85LJ9cM5qUoWqUE
                                                MD5:5FC67E19699B3F0B2AB7B4B89B0B3F1A
                                                SHA1:6F6380DF2EB8C5D30452A846864F001A8B0E473A
                                                SHA-256:45451F933B472FA53301D46B7C072AF67E51EC60172E6E9C01E0B308DF78A2F4
                                                SHA-512:81C7A9F5683DB54893BD26A6EC1BCBDB17983037668CD996E03934E7708331594195DBF2CCE9EB2B0C0567A9E8B24DD629D40866D49E55C9DF77A864D15744E5
                                                Malicious:false
                                                Preview:L..................F.@...........................................................P.O. .:i.....+00.../C:\...................z.1...........Program Files (x86).X............................................P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)..."...1...........LiteManager Pro - Server..b............................................L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r...(.h.2...........ROMServer.exe.L............................................R.O.M.S.e.r.v.e.r...e.x.e.......L.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.\.R.O.M.S.e.r.v.e.r...e.x.e.0.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.\.../.s.t.a.r.t.n.C.:.\.W.i.n.d.o.w.s.\.I.n.s.t.a.l.l.e.r.\.{.7.1.F.F.A.4.7.5.-.2.4.D.5.-.4.4.F.B.-.A.5.1.F.-.3.9.B.6.9.9.E.3.D.8.2.C.}.\.R.O.M.S.e.r.v.e.r...e.x.e._.9.D.0.9.B.2.B.C.2.5.A.2.4.1.4.C.B.D.8.4.8.E.2.B.7.5.8.9.8.6.7.6...e.x.e.........%SystemRoot%\In
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Thu Aug 22 17:41:10 2024, mtime=Mon Oct 28 11:41:55 2024, atime=Thu Aug 22 17:41:10 2024, length=7753808, window=hide
                                                Category:dropped
                                                Size (bytes):2159
                                                Entropy (8bit):3.8882393509083983
                                                Encrypted:false
                                                SSDEEP:48:882xfvmObdO8aLo/AZd5Y+d5Ys5qcxFWT84SslWqcxFWT8cn:88U0L839s5qcxYT8SWqcxYT8c
                                                MD5:77A8F30AC33B6C8D09D9CC894DCF0017
                                                SHA1:4E076BFF777C9F3F53D2F139EF8AD6F6A24CCB5B
                                                SHA-256:D983900CFDBB252F3927A02899AD58C4A4E8A24BE7F92BC3E4C0F4E8DF2D4519
                                                SHA-512:B6BABB61F13D503EF722ED6C67FD9B75C8F057A4B01545C355C4A62FE78A76FDC9268C834B672BAC4F6CA7F3F77E00085AD6C13BEE16C54B938D7A56F81D0E57
                                                Malicious:false
                                                Preview:L..................F.@.. .....>.....Q#..6)....>.....PPv..........................P.O. .:i.....+00.../C:\.....................1.....\Y;e..PROGRA~2.........O.I\Y;e....................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....z.1.....\Y<e..LITEMA~1..b......\Y;e\Y<e............................].L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.....h.2.PPv..Y%. .ROMSER~1.EXE..L.......Y%.\Y<e..............................R.O.M.S.e.r.v.e.r...e.x.e.......l...............-.......k...........[........C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe..L.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.\.R.O.M.S.e.r.v.e.r...e.x.e.0.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.\.../.s.t.o.p.l.C.:.\.W.i.n.d.o.w.s.\.I.n.s.t.a.l.l.e.r.\.{.7.1.F.F.A.4.7.5.-.2.4.D.5.-.4.4.F.B.-.A.5.1.F.-.3.9.B.6.9.9.E.3.D.8.2.C.}.\.s.t
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=0, Archive, ctime=Sat Dec 7 08:10:02 2019, mtime=Wed Oct 4 09:56:56 2023, atime=Sat Dec 7 08:10:02 2019, length=59904, window=hide
                                                Category:dropped
                                                Size (bytes):1953
                                                Entropy (8bit):3.867551442081923
                                                Encrypted:false
                                                SSDEEP:48:8Wn0lFWub0ZfHOn5qmjlt6ScWqmjltZwnt:8w0l/amn5qmjlmWqmjl
                                                MD5:8F76AA97C80932A3167E7E188EE8FEDE
                                                SHA1:391E7C47186585B2FF6B7BC10BD917F3EF4C3152
                                                SHA-256:60A6C016964660A48391804B1F8597ADAE0399396501DF720377E63EE4523547
                                                SHA-512:987D9D57472C87910B531E6730CD6E02F85A806DB141DD1BB99078262EEC7CD26D769A8C96640208A7FD23E62C2EEDB5870796ADD828DAC7B82B21547B90AEE2
                                                Malicious:false
                                                Preview:L..................F.@.. ...25.....1>.~....25.............................A....P.O. .:i.....+00.../C:\...................V.1.....DWR`..Windows.@......OwH\Y7e....3.........................W.i.n.d.o.w.s.....Z.1.....\Y4e..SysWOW64..B......O.I\Y7e....Y.......................$.S.y.s.W.O.W.6.4.....b.2......OBI .msiexec.exe.H......OBIDW.V................|.............m.s.i.e.x.e.c...e.x.e.......N...............-.......M...........[........C:\Windows\SysWOW64\msiexec.exe........\.....\.....\.....\.....\.....\.W.i.n.d.o.w.s.\.S.y.s.W.O.W.6.4.\.m.s.i.e.x.e.c...e.x.e.)./.x. .{.7.1.F.F.A.4.7.5.-.2.4.D.5.-.4.4.F.B.-.A.5.1.F.-.3.9.B.6.9.9.E.3.D.8.2.C.}.s.C.:.\.W.i.n.d.o.w.s.\.I.n.s.t.a.l.l.e.r.\.{.7.1.F.F.A.4.7.5.-.2.4.D.5.-.4.4.F.B.-.A.5.1.F.-.3.9.B.6.9.9.E.3.D.8.2.C.}.\.U.N.I.N.S.T._.U.n.i.n.s.t.a.l.l._.L._.7.8.A.A.5.B.6.6.6.2.5.1.4.D.9.4.A.8.4.7.D.6.C.6.0.3.A.F.0.8.9.5...e.x.e.........%SystemRoot%\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\UNINST_Uninstall_L_78AA5B6662514D94A847D6C6
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                File Type:ASCII text
                                                Category:dropped
                                                Size (bytes):289
                                                Entropy (8bit):5.182622480217121
                                                Encrypted:false
                                                SSDEEP:6:yMN+q2Pwkn2nKuAl9OmbnIFUt8hzKXZmw+hNd3VkwOwkn2nKuAl9OmbjLJ:VIvYfHAahFUt816/+j5JfHAaSJ
                                                MD5:DF3C88F714C13719B0DEF255FBDC093B
                                                SHA1:51D6AB81DB20B45FAC239DAAC24D574E2A5D0240
                                                SHA-256:2AF9E1BD1B574B2F9EFB38A0B5DC5C944F3F21CAD2234669DABB81F2F464EDE5
                                                SHA-512:3B63F1609D1FB4AD8AC058D2510EBC24F5C1E9529462772273388A94BA5EDFE5FD3066A6B91A9D229FC981F020BFF2FD24526D105647539C26926CC56A590E4B
                                                Malicious:false
                                                Preview:2024/10/28-08:41:50.426 cc8 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/10/28-08:41:50.428 cc8 Recovering log #3.2024/10/28-08:41:50.429 cc8 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                File Type:ASCII text
                                                Category:dropped
                                                Size (bytes):289
                                                Entropy (8bit):5.182622480217121
                                                Encrypted:false
                                                SSDEEP:6:yMN+q2Pwkn2nKuAl9OmbnIFUt8hzKXZmw+hNd3VkwOwkn2nKuAl9OmbjLJ:VIvYfHAahFUt816/+j5JfHAaSJ
                                                MD5:DF3C88F714C13719B0DEF255FBDC093B
                                                SHA1:51D6AB81DB20B45FAC239DAAC24D574E2A5D0240
                                                SHA-256:2AF9E1BD1B574B2F9EFB38A0B5DC5C944F3F21CAD2234669DABB81F2F464EDE5
                                                SHA-512:3B63F1609D1FB4AD8AC058D2510EBC24F5C1E9529462772273388A94BA5EDFE5FD3066A6B91A9D229FC981F020BFF2FD24526D105647539C26926CC56A590E4B
                                                Malicious:false
                                                Preview:2024/10/28-08:41:50.426 cc8 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/10/28-08:41:50.428 cc8 Recovering log #3.2024/10/28-08:41:50.429 cc8 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                File Type:ASCII text
                                                Category:dropped
                                                Size (bytes):336
                                                Entropy (8bit):5.162881725866635
                                                Encrypted:false
                                                SSDEEP:6:yWR4q2Pwkn2nKuAl9Ombzo2jMGIFUt8hURJZmw+h1DkwOwkn2nKuAl9Ombzo2jM4:xR4vYfHAa8uFUt86J/+bD5JfHAa8RJ
                                                MD5:DB682BF6ACDB5886D773BC12C9969068
                                                SHA1:FA0F09F94B2B11AC051DAA16E325F30514BC0970
                                                SHA-256:BD4C36A25AAEB72B2C15E254AA2B3C8517E1BA1D736E85B9EB0BD52C12F56AAC
                                                SHA-512:39FD461C60E4909E26B5749988226A7B9CBFC76BF8D5689AB9F846644E365B72B79984E5069DA27EBBADDA4928FF8A5CE577403F34ADBC018B88DF1FA1FA953A
                                                Malicious:false
                                                Preview:2024/10/28-08:41:50.471 1c20 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/10/28-08:41:50.473 1c20 Recovering log #3.2024/10/28-08:41:50.474 1c20 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                File Type:ASCII text
                                                Category:dropped
                                                Size (bytes):336
                                                Entropy (8bit):5.162881725866635
                                                Encrypted:false
                                                SSDEEP:6:yWR4q2Pwkn2nKuAl9Ombzo2jMGIFUt8hURJZmw+h1DkwOwkn2nKuAl9Ombzo2jM4:xR4vYfHAa8uFUt86J/+bD5JfHAa8RJ
                                                MD5:DB682BF6ACDB5886D773BC12C9969068
                                                SHA1:FA0F09F94B2B11AC051DAA16E325F30514BC0970
                                                SHA-256:BD4C36A25AAEB72B2C15E254AA2B3C8517E1BA1D736E85B9EB0BD52C12F56AAC
                                                SHA-512:39FD461C60E4909E26B5749988226A7B9CBFC76BF8D5689AB9F846644E365B72B79984E5069DA27EBBADDA4928FF8A5CE577403F34ADBC018B88DF1FA1FA953A
                                                Malicious:false
                                                Preview:2024/10/28-08:41:50.471 1c20 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/10/28-08:41:50.473 1c20 Recovering log #3.2024/10/28-08:41:50.474 1c20 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                File Type:JSON data
                                                Category:dropped
                                                Size (bytes):475
                                                Entropy (8bit):4.966073469579267
                                                Encrypted:false
                                                SSDEEP:12:YH/um3RA8sqsNRHxsBdOg2HlItAcaq3QYiubInP7E4T3y:Y2sRdsBRHidMH+J3QYhbG7nby
                                                MD5:4008866189CC80D8D01B7405BF9ADFD8
                                                SHA1:BA518FF75585D079A4DFD550A5BCB433EE276E10
                                                SHA-256:CE330C613D63C3D22C93ACCF695B7C9AC9FE44922D7688C4B33F8A30303A21B4
                                                SHA-512:6C6746B737ED0DDA6A99D69952D7155FE998007D8B6AACF4CE7699C3DAE4C0EE4E79BCFB8C697901FA42D6B984DAD8AD0E95256D987279895FE7BAD4F3FD2E74
                                                Malicious:false
                                                Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13374679316345408","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":246135},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.4","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                File Type:JSON data
                                                Category:modified
                                                Size (bytes):475
                                                Entropy (8bit):4.966073469579267
                                                Encrypted:false
                                                SSDEEP:12:YH/um3RA8sqsNRHxsBdOg2HlItAcaq3QYiubInP7E4T3y:Y2sRdsBRHidMH+J3QYhbG7nby
                                                MD5:4008866189CC80D8D01B7405BF9ADFD8
                                                SHA1:BA518FF75585D079A4DFD550A5BCB433EE276E10
                                                SHA-256:CE330C613D63C3D22C93ACCF695B7C9AC9FE44922D7688C4B33F8A30303A21B4
                                                SHA-512:6C6746B737ED0DDA6A99D69952D7155FE998007D8B6AACF4CE7699C3DAE4C0EE4E79BCFB8C697901FA42D6B984DAD8AD0E95256D987279895FE7BAD4F3FD2E74
                                                Malicious:false
                                                Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13374679316345408","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":246135},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.4","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):4320
                                                Entropy (8bit):5.256633690978405
                                                Encrypted:false
                                                SSDEEP:96:etJCV4FAsszrNamjTN/2rjYMta02fDtehgO7BtTgo7PQ62:etJCV4FiN/jTN/2r8Mta02fEhgO73goU
                                                MD5:E5D36F4BFA1D9BCBA12DBB5F1025B182
                                                SHA1:15FF7D5C4CC363AA51B036F4BC2DA2806C34D3B2
                                                SHA-256:3E38E9E58409BF438ED3D393663FCDD517688D66343E6CC29FF359C5362CF6A4
                                                SHA-512:0E828B375D7BC5AC719668DA188284319D3E7BAA1E54F2EDEDC450E07FCC139AD2EE0B29BC7446904E602C01703537C8FAF68D57D5ED40F5A52230E6B015035B
                                                Malicious:false
                                                Preview:*...#................version.1..namespace-['O.o................next-map-id.1.Pnamespace-158f4913_074a_4bdf_b463_eb784cc805b4-https://rna-resource.acrobat.com/.0>...r................next-map-id.2.Snamespace-fd2db5bd_ef7e_4124_bfa7_f036ce1d74e5-https://rna-v2-resource.acrobat.com/.1O..r................next-map-id.3.Snamespace-cd5be8d1_42d2_481d_ac0e_f904ae470bda-https://rna-v2-resource.acrobat.com/.2.\.o................next-map-id.4.Pnamespace-6070ce43_6a74_4d0a_9cb8_0db6c3126811-https://rna-resource.acrobat.com/.3....^...............Pnamespace-158f4913_074a_4bdf_b463_eb784cc805b4-https://rna-resource.acrobat.com/..|.^...............Pnamespace-6070ce43_6a74_4d0a_9cb8_0db6c3126811-https://rna-resource.acrobat.com/n..Fa...............Snamespace-fd2db5bd_ef7e_4124_bfa7_f036ce1d74e5-https://rna-v2-resource.acrobat.com/DQ..a...............Snamespace-cd5be8d1_42d2_481d_ac0e_f904ae470bda-https://rna-v2-resource.acrobat.com/i.`do................next-map-id.5.Pnamespace-de635bf2_6773_4d83_ad16_
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                File Type:ASCII text
                                                Category:dropped
                                                Size (bytes):324
                                                Entropy (8bit):5.16042718979107
                                                Encrypted:false
                                                SSDEEP:6:yu34q2Pwkn2nKuAl9OmbzNMxIFUt8hXJZmw+hXDkwOwkn2nKuAl9OmbzNMFLJ:h34vYfHAa8jFUt8xJ/+xD5JfHAa84J
                                                MD5:E4E14B8C23F28ADE7625601ECD3C490A
                                                SHA1:493F433C822F8C954002CF6471D62A3B97D62979
                                                SHA-256:5941ECC00CAFF7A694D52BDB314013131140DBA3098E4C56668F03A588A048DF
                                                SHA-512:DA63F3DBD600F45844E04AB64C6103DDFADE8FB6FE7F2F50FAE97A3136658134700E80A9F62FF965C24CBA96620D8B3FCD3DC4BB765F7271E990AAD69CE65DE2
                                                Malicious:false
                                                Preview:2024/10/28-08:41:50.590 1c20 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/10/28-08:41:50.591 1c20 Recovering log #3.2024/10/28-08:41:50.591 1c20 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                File Type:ASCII text
                                                Category:dropped
                                                Size (bytes):324
                                                Entropy (8bit):5.16042718979107
                                                Encrypted:false
                                                SSDEEP:6:yu34q2Pwkn2nKuAl9OmbzNMxIFUt8hXJZmw+hXDkwOwkn2nKuAl9OmbzNMFLJ:h34vYfHAa8jFUt8xJ/+xD5JfHAa84J
                                                MD5:E4E14B8C23F28ADE7625601ECD3C490A
                                                SHA1:493F433C822F8C954002CF6471D62A3B97D62979
                                                SHA-256:5941ECC00CAFF7A694D52BDB314013131140DBA3098E4C56668F03A588A048DF
                                                SHA-512:DA63F3DBD600F45844E04AB64C6103DDFADE8FB6FE7F2F50FAE97A3136658134700E80A9F62FF965C24CBA96620D8B3FCD3DC4BB765F7271E990AAD69CE65DE2
                                                Malicious:false
                                                Preview:2024/10/28-08:41:50.590 1c20 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/10/28-08:41:50.591 1c20 Recovering log #3.2024/10/28-08:41:50.591 1c20 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 16, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 16
                                                Category:dropped
                                                Size (bytes):86016
                                                Entropy (8bit):4.445218650180628
                                                Encrypted:false
                                                SSDEEP:384:Cexci5tIiBA7aDQPsknQ0UNCFOa14ocOUw6zyFzqFkdZ+EUTTcdUZ5yDQhJL:dvs3OazzU89UTTgUL
                                                MD5:A6C1E3D40F6344FF8F1EABAEF782E9EE
                                                SHA1:49FE33D0451205898B07A5AD60ECDDED87CFBEAD
                                                SHA-256:6FCD10FAD2F1F7684A0E405B64AB10E12AFF66F148938605044F968E52588290
                                                SHA-512:A6C21AF2E6446CFA9CE0B9D4356ECF37343F4EE71404B43A866B3FEBE016A6D77E7BD04129AAF13D919164C66DD2E67E708A821FBBA83182B23FE512B64CD420
                                                Malicious:false
                                                Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                File Type:SQLite Rollback Journal
                                                Category:dropped
                                                Size (bytes):8720
                                                Entropy (8bit):2.2083438934116018
                                                Encrypted:false
                                                SSDEEP:24:7+tKmnuwKXqL7zkrFsgIFsxX3pALXmnHpkDGjmcxBSkomXk+2m9RFTsyg+wmf9Mj:7MnnCXq/mFTIF3XmHjBoGGR+jMz+LhL6
                                                MD5:BF19276D1DD9A8BBAFE780DE9408FA68
                                                SHA1:5B7AC45EFBA2FC871AACF74963AEF9A2C27ED5AC
                                                SHA-256:1DAC5FD8B290EE83B5AD33B3425145CC509E2FBA75EBA695DDEBA9A3BAB6215B
                                                SHA-512:E85DFCA190881BEEDF1E06CF67BDE34F62FE926A15E94B290810638E63D7F6C4C80A0313CBD1256AC6F3D675E3C015F50EF0575848FE42CBBD89B1A15AD06C7D
                                                Malicious:false
                                                Preview:.... .c.....to.i........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                File Type:Certificate, Version=3
                                                Category:dropped
                                                Size (bytes):1391
                                                Entropy (8bit):7.705940075877404
                                                Encrypted:false
                                                SSDEEP:24:ooVdTH2NMU+I3E0Ulcrgdaf3sWrATrnkC4EmCUkmGMkfQo1fSZotWzD1:ooVguI3Kcx8WIzNeCUkJMmSuMX1
                                                MD5:0CD2F9E0DA1773E9ED864DA5E370E74E
                                                SHA1:CABD2A79A1076A31F21D253635CB039D4329A5E8
                                                SHA-256:96BCEC06264976F37460779ACF28C5A7CFE8A3C0AAE11A8FFCEE05C0BDDF08C6
                                                SHA-512:3B40F27E828323F5B91F8909883A78A21C86551761F27B38029FAAEC14AF5B7AA96FB9F9CC93EE201B5EB1D0FEF17B290747E8B839D2E49A8F36C5EBF3C7C910
                                                Malicious:false
                                                Preview:0..k0..S............@.YDc.c...0...*.H........0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10...150604110438Z..350604110438Z0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10.."0...*.H.............0..........$s..7.+W(.....8..n<.W.x.u...jn..O(..h.lD...c...k....1.!~.3<.H..y.....!.K...qiJffl.~<p..)"......K...~....G.|.H#S.8.O.o...IW..t../.8.{.p!.u.0<.....c...O..K~.....w...{J.L.%.p..)..S$........J.?..aQ.....cq...o[...\4ylv.;.by.../&.....................6....7..6u...r......I.....*.A..v........5/(.l....dwnG7..Y^h..r...A)>Y>.&.$...Z.L@.F....:Qn.;.}r...xY.>Qx....../..>{J.Ks......P.|C.t..t.....0.[q6....00\H..;..}`...).........A.......|.;F.H*..v.v..j.=...8.d..+..(.....B.".'].y...p..N..:..'Qn..d.3CO......B0@0...U...........0...U.......0....0...U......y.Y.{....s.....X..n0...*.H.............U.X....P.....i ')..au\.n...i/..VK..s.Y.!.~.Lq...`.9....!V..P.Y...Y.............b.E.f..|o..;.....'...}~.."......
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                Category:dropped
                                                Size (bytes):71954
                                                Entropy (8bit):7.996617769952133
                                                Encrypted:true
                                                SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                Malicious:false
                                                Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):192
                                                Entropy (8bit):2.7485180290352824
                                                Encrypted:false
                                                SSDEEP:3:kkFkl4LPpttfllXlE/HT8kN7vNNX8RolJuRdxLlGB9lQRYwpDdt:kKhLPDeT867VNMa8RdWBwRd
                                                MD5:40AAD61336A2C3AC131DBAB6B7EA6FDC
                                                SHA1:998F904E221E30237E00BFC8F4C26B45F8F9D152
                                                SHA-256:EA94B0CBAF212DD481F7E3D49945E51C1F231F3C752DC1B86B0DE13B27F57310
                                                SHA-512:8F1B05B33DC65A95598675D49D735EF703C2BF6320D7119BA5F08B4F1461A138D2089545E2B5DD28C1B5E75B55C7F5C1F75CC25E72B036D9B47707F58298F429
                                                Malicious:false
                                                Preview:p...... ........K...6)..(....................................................... ..........W....j...............o...h.t.t.p.:././.x.1...i...l.e.n.c.r...o.r.g./...".6.4.c.d.6.6.5.4.-.5.6.f."...
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):328
                                                Entropy (8bit):3.150184159866505
                                                Encrypted:false
                                                SSDEEP:6:kK+DL9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:GDiDnLNkPlE99SNxAhUe/3
                                                MD5:BA34A710DC79BE3958B7BD3EB877623A
                                                SHA1:D1FB8B088EE576905AADAB688D96C0F517DA4D8F
                                                SHA-256:ADA9A7F4A1637DEB5055B55BEBC7DEB68D4DDD8ECF930C1AC7AF10B1E13D8C16
                                                SHA-512:76113D4287F5627D24FD607900C5E75EB7A7F6F9BDD267C5D0B521E20C8372B6787978549FA8B8C894B3534D4C7EE788588A0B912D7BA76B001186C57DBDD6BD
                                                Malicious:false
                                                Preview:p...... ............6)..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                File Type:PostScript document text
                                                Category:dropped
                                                Size (bytes):185099
                                                Entropy (8bit):5.182478651346149
                                                Encrypted:false
                                                SSDEEP:1536:JsVoWFMWQNk1KUQII5J5lZRT95tFiQibVJDS+Stu/3IVQBrp3Mv9df0CXLhNHqTM:bViyFXE07ZmandGCyN2mM7IgOP0gC
                                                MD5:94185C5850C26B3C6FC24ABC385CDA58
                                                SHA1:42F042285037B0C35BC4226D387F88C770AB5CAA
                                                SHA-256:1D9979A98F7C4B3073BC03EE9D974CCE9FE265A1E2F8E9EE26A4A5528419E808
                                                SHA-512:652657C00DD6AED1A132E1DFD0B97B8DF233CDC257DA8F75AC9F2428F2F7715186EA8B3B24F8350D409CC3D49AFDD36E904B077E28B4AD3E4D08B4DBD5714344
                                                Malicious:false
                                                Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Reg.FamilyName:Agency FB.StyleName:Regular.MenuName:Agency FB.StyleBits:0.WeightClass:400.WidthClass:3.AngleClass:0.FullName:Agency FB.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB.FileLength:58920.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Bold.FamilyName:Agency FB.StyleName:Bold.MenuName:Agency FB.StyleBits:2.WeightClass:700.WidthClass:3.AngleClass:0.FullName:Agency FB Bold.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB Bold.FileLength:60656.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB Bold.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:Algerian.FamilyName:Algerian.StyleName:Regular.MenuName:Algerian.StyleBits:0.We
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                File Type:PostScript document text
                                                Category:dropped
                                                Size (bytes):185099
                                                Entropy (8bit):5.182478651346149
                                                Encrypted:false
                                                SSDEEP:1536:JsVoWFMWQNk1KUQII5J5lZRT95tFiQibVJDS+Stu/3IVQBrp3Mv9df0CXLhNHqTM:bViyFXE07ZmandGCyN2mM7IgOP0gC
                                                MD5:94185C5850C26B3C6FC24ABC385CDA58
                                                SHA1:42F042285037B0C35BC4226D387F88C770AB5CAA
                                                SHA-256:1D9979A98F7C4B3073BC03EE9D974CCE9FE265A1E2F8E9EE26A4A5528419E808
                                                SHA-512:652657C00DD6AED1A132E1DFD0B97B8DF233CDC257DA8F75AC9F2428F2F7715186EA8B3B24F8350D409CC3D49AFDD36E904B077E28B4AD3E4D08B4DBD5714344
                                                Malicious:false
                                                Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Reg.FamilyName:Agency FB.StyleName:Regular.MenuName:Agency FB.StyleBits:0.WeightClass:400.WidthClass:3.AngleClass:0.FullName:Agency FB.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB.FileLength:58920.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Bold.FamilyName:Agency FB.StyleName:Bold.MenuName:Agency FB.StyleBits:2.WeightClass:700.WidthClass:3.AngleClass:0.FullName:Agency FB Bold.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB Bold.FileLength:60656.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB Bold.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:Algerian.FamilyName:Algerian.StyleName:Regular.MenuName:Algerian.StyleBits:0.We
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):4
                                                Entropy (8bit):0.8112781244591328
                                                Encrypted:false
                                                SSDEEP:3:e:e
                                                MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                                                SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                                                SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                                                SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                                                Malicious:false
                                                Preview:....
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                File Type:JSON data
                                                Category:dropped
                                                Size (bytes):2145
                                                Entropy (8bit):5.0662198120036965
                                                Encrypted:false
                                                SSDEEP:48:Y12sL0/EY0bMSlMtCM5mMOpiMAW0MretMSMmkaMY:Jv/SYtt55V6AWLre6JmkhY
                                                MD5:C513BE3FF585771CDC3BA1965F89DD37
                                                SHA1:CDCA888D9A8EC2407436CF3D95BE432977C0139A
                                                SHA-256:E2585240A8D91E209E547A413703419C2E6DCA1F1AD0B25DA47A39A2826413F2
                                                SHA-512:F3FFDDFECB3A6FA9466F05EA1FDB3112F712CB0B49203952DD1E54B3248648F3E8D04A4FDCDA9528D4EDFF85CE55E366268901876382888D5B81F9A5DBAB795C
                                                Malicious:false
                                                Preview:{"all":[{"id":"TESTING","info":{"dg":"DG","sid":"TESTING"},"mimeType":"file","size":4,"ts":1730119313000},{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"23c88c8acf166d9fda5ae4d83df3db72","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":1250,"ts":1696420889000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"d5fa85f4cf271b5fa75367efd1b392fa","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":295,"ts":1696420884000},{"id":"DC_FirstMile_Right_Sec_Surface","info":{"dg":"7c2ad79e375e3ea39f82a389e8a5841f","sid":"DC_FirstMile_Right_Sec_Surface"},"mimeType":"file","size":294,"ts":1696420882000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"c3af48ba3dee086edbbf20dff46c7ee0","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1255,"ts":1696333862000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"7101e009d8bf8920d0a3dd3f5dc75ebc","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1250,"ts":1696333862000},{"id":"DC_Reader_Edit_LHP_Banner"
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
                                                Category:dropped
                                                Size (bytes):12288
                                                Entropy (8bit):1.1871285333041803
                                                Encrypted:false
                                                SSDEEP:48:TGufl2GL7msEHUUUUUUUU02SvR9H9vxFGiDIAEkGVvpww:lNVmswUUUUUUUU02+FGSIt0w
                                                MD5:FF8F8E56A90722A5142362963C34F999
                                                SHA1:707197912AC05661C1054D73A3316A6EF5527271
                                                SHA-256:72B4E94215F669334819179F97501A54AAFF77F88C8CE77E030185148ECA3599
                                                SHA-512:0795D5D0AC813A2F6CB57A428F16C1478B9D94970BB45B1354402B3FA874C15153D3E150A16AA38602FAFACE80B01C69E9B9D1E1A9BCB84961B47F98E019FBA1
                                                Malicious:false
                                                Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                File Type:SQLite Rollback Journal
                                                Category:dropped
                                                Size (bytes):8720
                                                Entropy (8bit):1.6061725053394198
                                                Encrypted:false
                                                SSDEEP:48:7M4KUUUUUUUUUU0UvR9H9vxFGiDIAEkGVvkqFl2GL7msl:7sUUUUUUUUUU0EFGSItWKVmsl
                                                MD5:79D72CD66C20DF58AE6DFB96F03A0A76
                                                SHA1:16AAB5B93A738C100BBAB73B90B70341FBF92BCB
                                                SHA-256:84342EE3009AEDAEA91465A741DFE18C9CFC22E89F44B7C72ABBBA932BD2178D
                                                SHA-512:13321C6367601EAFB68D216473C48392EF2B23A57C1090A533E3D34FE1C22863E979C4728BD5058FC47CBBCC59C5E794BAFBD86022EDBBA9056DFDB14CDD91C4
                                                Malicious:false
                                                Preview:.... .c.......0.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................f.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\0438.pdf.exe
                                                File Type:PDF document, version 1.7, 1 pages (zip deflate encoded)
                                                Category:dropped
                                                Size (bytes):125552
                                                Entropy (8bit):7.579988719622451
                                                Encrypted:false
                                                SSDEEP:1536:N0N5xSlECZcbZ42IlWpy67H/AvLpMpBXCF4KMvX6UkMZdEMLHMgifPdEoLIeLA+6:CNPSiJZ4xy8DlivXREMBOlEoMeLjCiQ
                                                MD5:7827620BA2CD12D54B41C006BA4D686C
                                                SHA1:F6B40CB23006AD0E1AFD4C08CA943A75258FAB34
                                                SHA-256:9DAA46F8D84B0E65E2D5FDF7FCD80FF6CA922278C32A2B5C9425C0C5EF7D2096
                                                SHA-512:9782FB4DBA6F62A589BF213AE5CCE3F66514319363F499B584DC854ACC1DCD94221102BDDAC982AA9DB36C5B7696BD1ABACF7C15771CDECC317B2F3421CCA321
                                                Malicious:false
                                                Preview:%PDF-1.7..%......1 0 obj..<</Type/Catalog/Pages 2 0 R/Lang(en) /StructTreeRoot 11 0 R/MarkInfo<</Marked true>>/Metadata 22 0 R/ViewerPreferences 23 0 R>>..endobj..2 0 obj..<</Type/Pages/Count 1/Kids[ 3 0 R] >>..endobj..3 0 obj..<</Type/Page/Parent 2 0 R/Resources<</Font<</F1 5 0 R>>/ExtGState<</GS7 7 0 R/GS8 8 0 R>>/XObject<</Image9 9 0 R>>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<</Type/Group/S/Transparency/CS/DeviceRGB>>/Tabs/S/StructParents 0>>..endobj..4 0 obj..<</Filter/FlateDecode/Length 188>>..stream..x.E.K..@.......R..!.4 .|$FB.."ZH.+............x.h..!/."..f....X.Q.8M.D0aGK..+.J{x.....(.kJ.FBJ&|.7J...H..f..%..Nory..M'...m9%g.......4.(AV&............2...H..B...Z..o.V#.c.....6k..endstream..endobj..5 0 obj..<</Type/Font/Subtype/TrueType/Name/F1/BaseFont/BCDEEE+Calibri/Encoding/WinAnsiEncoding/FontDescriptor 6 0 R/FirstChar 32/LastChar 32/Widths 20 0 R>>..endobj..6 0 obj..<</Type/FontDescriptor/FontName/BCDEEE+Calibri/Flags 3
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                File Type:Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
                                                Category:dropped
                                                Size (bytes):144514
                                                Entropy (8bit):7.992637131260696
                                                Encrypted:true
                                                SSDEEP:3072:OvjeSq37BcXWpJ/PwBI4lsRMoZVaJctHtTx8EOyhnL:Cjc7BcePUsSSt38snL
                                                MD5:BA1716D4FB435DA6C47CE77E3667E6A8
                                                SHA1:AF6ADF9F1A53033CF28506F33975A3D1BC0C4ECF
                                                SHA-256:AD771EC5D244D9815762116D5C77BA53A1D06CEBA42D348160790DBBE4B6769D
                                                SHA-512:65249DB52791037E9CC0EEF2D07A9CB1895410623345F2646D7EA4ED7001F7273C799275C3342081097AF2D231282D6676F4DBC4D33C5E902993BE89B4A678FD
                                                Malicious:false
                                                Preview:PK.........D.Y...>)...).......mimetypeapplication/vnd.adobe.air-ucf-package+zipPK.........D.Y.+.`............message.xml.]is.8...[.....Oq.'...S...g.X+;....%X."U$.....}.P.%....8.tl. ...../..}......A.......,...a...r.....=..i{......0H..v.g.c0.3~....G.b....,.BvJ.'./.`xJ]..O./.!K...XG?.$.,=.Z...q.f~...,..:b.Pl..f..|....,.A.....Z..a<.C._..../G|....q.....~.?...G.............y+.. ...s.,.2...^uon..:....~....C....i.>.<hy..x..?....F.w..4e.|.'...#?..a......i...W.".+...'.......,..6..... ..}.........llj.>.3v.."..CdA.".....v...4H..C]>........4..$.O........9._..C{(....A~.k...f.x8.<... l!..}...ol.q.......2.s.Y..&:....>...l.S..w.t^D.C....]0......L...z[`J<.....L.1t-.Z.n..7.)...aj;.0.r|.._.V......JWT.>.p.?s....boN.....X.jkN.9..3jN.9..t...o..c.nX4......0.D.....Cv .....!k..........d.1B....=3.Bq.E.bo.....6..r..6@.b...T......Ig...(..(K].:...#..k..q2G."o.Tz...qJ.......;?|~..1...J...RA...'..*C...T...dNMZ.3.z-..LCI..I..-.,.Y.J.....m.KY}.Lw......G........-.(E....b..^..}..
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                File Type:ASCII text, with very long lines (393)
                                                Category:dropped
                                                Size (bytes):16525
                                                Entropy (8bit):5.345946398610936
                                                Encrypted:false
                                                SSDEEP:384:zHIq8qrq0qoq/qUILImCIrImI9IWdFdDdoPtPTPtP7ygyAydy0yGV///X/J/VokV:nNW
                                                MD5:8947C10F5AB6CFFFAE64BCA79B5A0BE3
                                                SHA1:70F87EEB71BA1BE43D2ABAB7563F94C73AB5F778
                                                SHA-256:4F3449101521DA7DF6B58A2C856592E1359BA8BD1ACD0688ECF4292BA5388485
                                                SHA-512:B76DB9EF3AE758F00CAF0C1705105C875838C7801F7265B17396466EECDA4BCD915DA4611155C5F2AD1C82A800C1BEC855E52E2203421815F915B77AA7331CA0
                                                Malicious:false
                                                Preview:SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:088+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="SetConfig:
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                File Type:ASCII text, with very long lines (393), with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):15114
                                                Entropy (8bit):5.343438421198478
                                                Encrypted:false
                                                SSDEEP:384:sT/O6+HiPD4AZbeS0+c68SX6SxGy+3LKR+FxHj3k1qF8GovFd53tMLMdUBrGm7jL:mLa
                                                MD5:3BEF3B4396AE411BAC3AA5C998A63902
                                                SHA1:F9E20DE34ACE206339F41E2EC396818FE3F0EDD4
                                                SHA-256:DDA53BC32E47F402F4F8E8A1BF102E77649360B45A4B88352EF29D829FE27EDF
                                                SHA-512:82DECB69BDDE4E120937748E0A4C0726BBDAB7DC7E5C31743193126D53C7EAEFAE3BF2DCB488EF13064F89404B1BFDD6033D9B20960480F736F0593E95831315
                                                Malicious:false
                                                Preview:SessionID=f1b85d4c-1bd5-4454-bb04-bd7f94ce0be9.1730119312439 Timestamp=2024-10-28T08:41:52:439-0400 ThreadID=7624 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------"..SessionID=f1b85d4c-1bd5-4454-bb04-bd7f94ce0be9.1730119312439 Timestamp=2024-10-28T08:41:52:458-0400 ThreadID=7624 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found"..SessionID=f1b85d4c-1bd5-4454-bb04-bd7f94ce0be9.1730119312439 Timestamp=2024-10-28T08:41:52:458-0400 ThreadID=7624 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!"..SessionID=f1b85d4c-1bd5-4454-bb04-bd7f94ce0be9.1730119312439 Timestamp=2024-10-28T08:41:52:458-0400 ThreadID=7624 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1"..SessionID=f1b85d4c-1bd5-4454-bb04-bd7f94ce0be9.1730119312439 Timestamp=2024-10-28T08:41:52:459-0400 ThreadID=7624 Component=ngl-lib_NglAppLib Description="SetConf
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):29752
                                                Entropy (8bit):5.388218891859777
                                                Encrypted:false
                                                SSDEEP:768:anddBuBYZwcfCnwZCnR8Bu5hx18HoCnLlAY+iCBuzhLCnx1CnPrRRFS10l8gT2rk:w
                                                MD5:79BDFFD03E064B88A6271A859BBAD214
                                                SHA1:706E3FEA7BCD81A700686F9090B7C4DE119B0FAD
                                                SHA-256:96B624CA937A026C38CB7E16CF118ACFF98449F0DFF291F4845D015B202A03D3
                                                SHA-512:099CE03E95EEFA0AAAE54C0497B995BC9D585810582B328F9DD5D7990B717E4F5123ADB19E210E129E1413FD94774C9A088F40270ABB3A5012012EFDCCB17C43
                                                Malicious:false
                                                Preview:03-10-2023 12:50:40:.---2---..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ***************************************..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ***************************************..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : Starting NGL..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..03-10-2023 12:50:40:.Closing File..03-10-
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
                                                Category:dropped
                                                Size (bytes):1407294
                                                Entropy (8bit):7.97605879016224
                                                Encrypted:false
                                                SSDEEP:24576:/M7o5dpy6mlind9j2kvhsfFXpAXDgrFBU2/R077WLaGZjZwYIGNPJe:RB3mlind9i4ufFXpAXkrfUs03WLaGZje
                                                MD5:716C2C392DCD15C95BBD760EEBABFCD0
                                                SHA1:4B4CE9C6AED6A7F809236B2DAFA9987CA886E603
                                                SHA-256:DD3E6CFC38DA1B30D5250B132388EF73536D00628267E7F9C7E21603388724D8
                                                SHA-512:E164702386F24FF72111A53DA48DC57866D10DAE50A21D4737B5687E149FF9D673729C5D2F2B8DA9EB76A2E5727A2AFCFA5DE6CC0EEEF7D6EBADE784385460AF
                                                Malicious:false
                                                Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
                                                Category:dropped
                                                Size (bytes):386528
                                                Entropy (8bit):7.9736851559892425
                                                Encrypted:false
                                                SSDEEP:6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m
                                                MD5:5C48B0AD2FEF800949466AE872E1F1E2
                                                SHA1:337D617AE142815EDDACB48484628C1F16692A2F
                                                SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
                                                SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
                                                Malicious:false
                                                Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
                                                Category:dropped
                                                Size (bytes):758601
                                                Entropy (8bit):7.98639316555857
                                                Encrypted:false
                                                SSDEEP:12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg
                                                MD5:3A49135134665364308390AC398006F1
                                                SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
                                                SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
                                                SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
                                                Malicious:false
                                                Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
                                                Category:dropped
                                                Size (bytes):1419751
                                                Entropy (8bit):7.976496077007677
                                                Encrypted:false
                                                SSDEEP:24576:/rwYIGNP4mOWL07oBGZ1dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07D:TwZG6bWLxBGZN3mlind9i4ufFXpAXkru
                                                MD5:95F182500FC92778102336D2D5AADCC8
                                                SHA1:BEC510B6B3D595833AF46B04C5843B95D2A0A6C9
                                                SHA-256:9F9C041D7EE1DA404E53022D475B9E6D5924A17C08D5FDEC58C0A1DCDCC4D4C9
                                                SHA-512:D7C022459486D124CC6CDACEAD8D46E16EDC472F4780A27C29D98B35AD01A9BA95F62155433264CC12C32BFF384C7ECAFCE0AC45853326CBC622AE65EE0D90BA
                                                Malicious:false
                                                Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                                Process:C:\Users\user\Desktop\0438.pdf.exe
                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: LiteManager - Server 5.0 installation package, Comments: This installer contains the logic and data to install LiteManager Pro - Server 5.0, Keywords: Installer,MSI,Database, Subject: LiteManager Pro - Server, Author: LiteManagerTeam, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2015 - Premier Edition with Virtualization Pack 22, Last Saved Time/Date: Thu Aug 22 15:43:08 2024, Create Time/Date: Thu Aug 22 15:43:08 2024, Last Printed: Thu Aug 22 15:43:08 2024, Revision Number: {9EF586E9-112B-4AAE-B439-5B62B7A0B1DE}, Code page: 0, Template: Intel;0,1033,1049
                                                Category:dropped
                                                Size (bytes):11554816
                                                Entropy (8bit):7.9382387394429115
                                                Encrypted:false
                                                SSDEEP:196608:9Jg0ovdgTGOk/J1yr/A9ODMlWyFISx8/191nYHiT88o8En03yEoH8WkJDFa:bAJoLA9OIlWy58/19J+iYNPEoHg0
                                                MD5:0C88F651EEA7EBD95DF08F6A492FCB38
                                                SHA1:93E622BB18056BB61DD11805D91AB1F9267CBD67
                                                SHA-256:A1FAAE4E2B695C7DF3846179192F4E67BD8DD05E7E5C6D0B4B72DB175F629076
                                                SHA-512:41F69CFCDA6EBB6DD6984D21B19E952BA25C78404B138FF25A8E16283D9080B5E2A85AF4973EC25A4F45F8D402163CCE96906F06F3FBA2068571F1F1ACBEA86C
                                                Malicious:false
                                                Preview:......................>...................................8........6..................}.................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5...6..........<................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...@...M...:...;...=...........?...N...A...B...C...D...E...F...G...H...I...J...O...L...N...D.......P...Q...R...S...T...Z...V...W...X...Y....X..[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):98682
                                                Entropy (8bit):6.445287254681573
                                                Encrypted:false
                                                SSDEEP:1536:0tlkIi4M2MXZcFVZNt0zfIagnbSLDII+D61S8:03kf4MlpyZN+gbE8pD61L
                                                MD5:7113425405A05E110DC458BBF93F608A
                                                SHA1:88123C4AD0C5E5AFB0A3D4E9A43EAFDF7C4EBAAF
                                                SHA-256:7E5C3C23B9F730818CDC71D7A2EA01FE57F03C03118D477ADB18FA6A8DBDBC46
                                                SHA-512:6AFE246B0B5CD5DE74F60A19E31822F83CCA274A61545546BDA90DDE97C84C163CB1D4277D0F4E0F70F1E4DE4B76D1DEB22992E44030E28EB9E56A7EA2AB5E8D
                                                Malicious:false
                                                Preview:0...u0...\...0...*.H........0i1.0...U....US1.0...U....DigiCert, Inc.1A0?..U...8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1..240807121815Z..240814121815Z0..~.0!.......0.E....[0...210531000001Z0!...7g...(..^`.x.l...210531000001Z0!...\./M.8..>.f.....210531000001Z0!...*B.Sh...f...s.0..210531000001Z0!..../n...h..7....>..210601000001Z0!....0..>5..aN.u{D..210601000001Z0!...-...qpWa.!n.....210601000001Z0!..."f...\..N.....X..210601000001Z0!...in.H...[u...]....210602000001Z0!......`......._.]...210602000001Z0!...{..e..i......=..210602000001Z0!......S....fNj'.wy..210602000001Z0!......C.lm..B.*.....210602000001Z0!... .}...|.,dk...+..210603000001Z0!...U.K....o.".Rj..210603000001Z0!.....A...K.ZpK..'h..210603000001Z0!.....&}{ ......l..210603000001Z0!...:.m...I.p.;..v..210604000001Z0!...1"uw3..Gou.qg.q..210607000001Z0!...1.o}...c/...-R}..210608000001Z0!................210608000001Z0!...[.N.d............210609000001Z0!......x..i........210610000001Z0!...(... (..#.^.f...210
                                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):737
                                                Entropy (8bit):7.501268097735403
                                                Encrypted:false
                                                SSDEEP:12:yeRLaWQMnFQlRKfdFfBy6T6FYoX0fH8PkwWWOxPLA3jw/fQMlNdP8LOUa:y2GWnSKfdtw46FYfP1icPLHCfa
                                                MD5:5274D23C3AB7C3D5A4F3F86D4249A545
                                                SHA1:8A3778F5083169B281B610F2036E79AEA3020192
                                                SHA-256:8FEF0EEC745051335467846C2F3059BD450048E744D83EBE6B7FD7179A5E5F97
                                                SHA-512:FC3E30422A35A78C93EDB2DAD6FAF02058FC37099E9CACD639A079DF70E650FEC635CF7592FFB069F23E90B47B0D7CF3518166848494A35AF1E10B50BB177574
                                                Malicious:false
                                                Preview:0...0.....0...*.H........0b1.0...U....US1.0...U....DigiCert Inc1.0...U....www.digicert.com1!0...U....DigiCert Trusted Root G4..240806194648Z..240827194648Z.00.0...U.#..0.......q]dL..g?....O0...U........0...*.H.............vz..@.Nm...6d...t;.Jx?....6...p...#.[.......o.q...;.........?......o...^p0R*.......~....)....i.*n;A.n.z..O~..%=..s..W.4.+........G...*..=....xen$_i"s..\...L..4../<.4...G.....L...c..k@.J.rC.4h.c.ck./.Q-r53..a#.8#......0.n......a.-'..S. .>..xAKo.k.....;.D>....sb '<..-o.KE...X!i.].c.....o~.q........D...`....N... W:{.3......a@....i....#./..eQ...e.......W.s..V:.38..U.H{.>.....#....?{.....bYAk'b0on..Gb..-..).."q2GO<S.C...FsY!D....x..]4.....X....Y...Rj.....I.96$.4ZQ&..$,hC..H.%..hE....
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: LiteManager - Server 5.0 installation package, Comments: This installer contains the logic and data to install LiteManager Pro - Server 5.0, Keywords: Installer,MSI,Database, Subject: LiteManager Pro - Server, Author: LiteManagerTeam, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2015 - Premier Edition with Virtualization Pack 22, Last Saved Time/Date: Thu Aug 22 15:43:08 2024, Create Time/Date: Thu Aug 22 15:43:08 2024, Last Printed: Thu Aug 22 15:43:08 2024, Revision Number: {9EF586E9-112B-4AAE-B439-5B62B7A0B1DE}, Code page: 0, Template: Intel;0,1033,1049
                                                Category:dropped
                                                Size (bytes):11554816
                                                Entropy (8bit):7.9382387394429115
                                                Encrypted:false
                                                SSDEEP:196608:9Jg0ovdgTGOk/J1yr/A9ODMlWyFISx8/191nYHiT88o8En03yEoH8WkJDFa:bAJoLA9OIlWy58/19J+iYNPEoHg0
                                                MD5:0C88F651EEA7EBD95DF08F6A492FCB38
                                                SHA1:93E622BB18056BB61DD11805D91AB1F9267CBD67
                                                SHA-256:A1FAAE4E2B695C7DF3846179192F4E67BD8DD05E7E5C6D0B4B72DB175F629076
                                                SHA-512:41F69CFCDA6EBB6DD6984D21B19E952BA25C78404B138FF25A8E16283D9080B5E2A85AF4973EC25A4F45F8D402163CCE96906F06F3FBA2068571F1F1ACBEA86C
                                                Malicious:false
                                                Preview:......................>...................................8........6..................}.................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5...6..........<................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...@...M...:...;...=...........?...N...A...B...C...D...E...F...G...H...I...J...O...L...N...D.......P...Q...R...S...T...Z...V...W...X...Y....X..[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: LiteManager - Server 5.0 installation package, Comments: This installer contains the logic and data to install LiteManager Pro - Server 5.0, Keywords: Installer,MSI,Database, Subject: LiteManager Pro - Server, Author: LiteManagerTeam, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2015 - Premier Edition with Virtualization Pack 22, Last Saved Time/Date: Thu Aug 22 15:43:08 2024, Create Time/Date: Thu Aug 22 15:43:08 2024, Last Printed: Thu Aug 22 15:43:08 2024, Revision Number: {9EF586E9-112B-4AAE-B439-5B62B7A0B1DE}, Code page: 0, Template: Intel;0,1033,1049
                                                Category:dropped
                                                Size (bytes):11554816
                                                Entropy (8bit):7.9382387394429115
                                                Encrypted:false
                                                SSDEEP:196608:9Jg0ovdgTGOk/J1yr/A9ODMlWyFISx8/191nYHiT88o8En03yEoH8WkJDFa:bAJoLA9OIlWy58/19J+iYNPEoHg0
                                                MD5:0C88F651EEA7EBD95DF08F6A492FCB38
                                                SHA1:93E622BB18056BB61DD11805D91AB1F9267CBD67
                                                SHA-256:A1FAAE4E2B695C7DF3846179192F4E67BD8DD05E7E5C6D0B4B72DB175F629076
                                                SHA-512:41F69CFCDA6EBB6DD6984D21B19E952BA25C78404B138FF25A8E16283D9080B5E2A85AF4973EC25A4F45F8D402163CCE96906F06F3FBA2068571F1F1ACBEA86C
                                                Malicious:false
                                                Preview:......................>...................................8........6..................}.................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5...6..........<................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...@...M...:...;...=...........?...N...A...B...C...D...E...F...G...H...I...J...O...L...N...D.......P...Q...R...S...T...Z...V...W...X...Y....X..[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):294216
                                                Entropy (8bit):4.850874479817921
                                                Encrypted:false
                                                SSDEEP:3072:yAoy2KjcC2jcmFDX/vjcJGUjcmFDX/rjcmFDX/dZ+oNbynfm:yAoy25DXmNDXLDXX+oNbynfm
                                                MD5:76A016F2C6F54EA70B2F4C87818724B4
                                                SHA1:4BE9E65E3A531C529230DECB412AD48E1060F842
                                                SHA-256:7F0F87F31BFE161CCB0C3654E6D98FE6C790E96879DD4558F142F2D4DE154979
                                                SHA-512:4A626D65D4D74EEAC60E5FA886C484797B7EB39ECF9D8106E4BB7FD487B53BA7B1E26BB38702623D75576FC00F4BDE3C1C19E8972886104FFB36478290BE2359
                                                Malicious:false
                                                Preview:...@IXOS.@.....@:E\Y.@.....@.....@.....@.....@.....@......&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}..LiteManager Pro - Server..pdf.msi.@.....@.....@.....@......ARPPRODUCTICON.exe..&.{9EF586E9-112B-4AAE-B439-5B62B7A0B1DE}.....@.....@.....@.....@.......@.....@.....@.......@......LiteManager Pro - Server......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration...@.....@.....@.]....&.{3244CDE6-6414-4399-B0D5-424562747210}0.C:\Program Files (x86)\LiteManager Pro - Server\.@.......@.....@.....@......&.{4D4D18AA-F74D-4291-B5A9-93C3CC48B75F}5.C:\Program Files (x86)\LiteManager Pro - Server\Lang\.@.......@.....@.....@......&.{641F154A-FEEF-4FA7-B5BF-414DB1DB8390}C.C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exe.@.......@.....@.....@......&.{26EAB54E-4659-47E8-86F9-4CB74F7E03BE}0.C:\Program Files (x86)\LiteManager Pro - Server\.@.......@.....@.....@......&.{596F4636-5D51-49
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                Category:dropped
                                                Size (bytes):20480
                                                Entropy (8bit):1.1622461780365712
                                                Encrypted:false
                                                SSDEEP:12:JSbX72Fj6eAGiLIlHVRpqh/7777777777777777777777777vDHFGpZl0i8Q:JfQI56dF
                                                MD5:B8C231DAE3C1425390652975B255320A
                                                SHA1:64F075E2C45AE33542D8832C59E4E263E59C213D
                                                SHA-256:77B1314CA82B2B5DB43FCC2EC067A315F8E6B3BD36B89071F02B165D97F46969
                                                SHA-512:03CAAC1B84335DAD00C9C76C2C20636696E595B874DF0EC2CC3C7CB861953F3DB304CA9EE8378789E825516736912D01C8C0BB325EAE5ECDD429CE18AD50F703
                                                Malicious:false
                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                Category:dropped
                                                Size (bytes):20480
                                                Entropy (8bit):1.7846940447898487
                                                Encrypted:false
                                                SSDEEP:48:oV8Ph+uRc06WXJMjT53X9gBd9mSvOd5YpRXd5YNd5YGd5YMd5YP6Ad5Y1o9ISB22:/h+1vjTEB+m0WlfPuPqC0WlfIF/
                                                MD5:CA4859F4EC68FE57D7033C82A852BE54
                                                SHA1:06F015F8E84A24EC929E526BED16A18C36AFAFA1
                                                SHA-256:B678F28A277B9D36938BCF9BCB9421143DF494D5AB262B34EDD5DD24CF984FEF
                                                SHA-512:4BED66AA13BEEFCF779805D2F22F5C85B4DCDCC75A4615F4E4F52C76ED7ADCCCCFDDA83C034333ADF353B255E34FB97C081409F1286B39A32EAF2FD5677C88C5
                                                Malicious:false
                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):53248
                                                Entropy (8bit):4.351781833522881
                                                Encrypted:false
                                                SSDEEP:384:AvFMAyDNOdTdFCxfrwntajXjDWLi9Y+C5vy/Q1nDcZUNeLNek+vDFNe+TNy:+MAyYdTmPJbgqcnDcCNy
                                                MD5:CA680899D9330BEB85E6351E6DC0D27B
                                                SHA1:41E89E582F58FB2A4ED06FA3BF796A1DAAC5CB6C
                                                SHA-256:EAB5DC45781E92CD5CF953016757B1E6F2ED7A0B5A97CC0945B19A8FBC1A85F2
                                                SHA-512:3817BD6EC345F96631E6CBF6C8DD384ACB17D912B1EC69D959F3AA15C05226D5FE3B5E9807D42D0E63589AABCEADFBE8BD5F293D8069DF689D12498E05842286
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L...J&uU.................@...................P....@.........................................................................4T..(........0...........................................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc....0.......@..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):57344
                                                Entropy (8bit):4.774504587732323
                                                Encrypted:false
                                                SSDEEP:768:SMAyYdTmPJbgqcnDcZTw0gpEeO4tZZz+0pQTk/N0:S1U81cmpjDX/N0
                                                MD5:5EBCB54B76FBE24FFF9D3BD74E274234
                                                SHA1:6CD72F044F36B7A3A79B7D77AAE59F274A66CE95
                                                SHA-256:504AEB909BBA186D4298AA97DCD6A09CCDD42217AF1F6210BC5EBD23B3DFCCBF
                                                SHA-512:5FF61D724B77B6EDC67D33B0F1EE1C3CB01F2A03251D0BE83FF10A80A99DBA08E3A0E0F985DEED6358E467B2E9B6A837E894513D1B5E68AF253C0BBDD68539D0
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 5%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L...J&uU.................@...................P....@.........................................................................4T..(.......xC...........................................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc...xC.......P..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):49152
                                                Entropy (8bit):4.31126714354722
                                                Encrypted:false
                                                SSDEEP:384:EvFMAyDNOdTdFCxfrwntajXjDWLi9Y+C5vy/Q1nDcZMwQE3vGYksuektm6yysZc8:SMAyYdTmPJbgqcnDcmwQE/RkHRRNS
                                                MD5:6A4AFFF2CD33613166B37A0DAB99BD41
                                                SHA1:FBC0F1696213B459D099A5809D79CFC01253880F
                                                SHA-256:53C1AE4962663E82D3AAC7C4A6CBE3D53E05D6948ADAE6391A2748396ACF98FE
                                                SHA-512:7B61D32E4AD38BC21E86559BFFA49A334CCB6184E595CB43F2D60A2A77C86B31D07B1A9D1F8FBE69E9AAD7E096952D765404BEBC494E73BD992642EB6B82E3A7
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L...J&uU.................@...p...............P....@.........................................................................4T..(........+...........................................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc....+.......0..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):57344
                                                Entropy (8bit):4.774504587732323
                                                Encrypted:false
                                                SSDEEP:768:SMAyYdTmPJbgqcnDcZTw0gpEeO4tZZz+0pQTk/N0:S1U81cmpjDX/N0
                                                MD5:5EBCB54B76FBE24FFF9D3BD74E274234
                                                SHA1:6CD72F044F36B7A3A79B7D77AAE59F274A66CE95
                                                SHA-256:504AEB909BBA186D4298AA97DCD6A09CCDD42217AF1F6210BC5EBD23B3DFCCBF
                                                SHA-512:5FF61D724B77B6EDC67D33B0F1EE1C3CB01F2A03251D0BE83FF10A80A99DBA08E3A0E0F985DEED6358E467B2E9B6A837E894513D1B5E68AF253C0BBDD68539D0
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 5%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L...J&uU.................@...................P....@.........................................................................4T..(.......xC...........................................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc...xC.......P..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):57344
                                                Entropy (8bit):4.774504587732323
                                                Encrypted:false
                                                SSDEEP:768:SMAyYdTmPJbgqcnDcZTw0gpEeO4tZZz+0pQTk/N0:S1U81cmpjDX/N0
                                                MD5:5EBCB54B76FBE24FFF9D3BD74E274234
                                                SHA1:6CD72F044F36B7A3A79B7D77AAE59F274A66CE95
                                                SHA-256:504AEB909BBA186D4298AA97DCD6A09CCDD42217AF1F6210BC5EBD23B3DFCCBF
                                                SHA-512:5FF61D724B77B6EDC67D33B0F1EE1C3CB01F2A03251D0BE83FF10A80A99DBA08E3A0E0F985DEED6358E467B2E9B6A837E894513D1B5E68AF253C0BBDD68539D0
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 5%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L...J&uU.................@...................P....@.........................................................................4T..(.......xC...........................................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc...xC.......P..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):432221
                                                Entropy (8bit):5.375180556756989
                                                Encrypted:false
                                                SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgauy:zTtbmkExhMJCIpErr
                                                MD5:F7B47ED5B5A89CFF3162788AA8D26966
                                                SHA1:740FD8B56196C652A4C6BC7D8637AC65A548698A
                                                SHA-256:51E46FC7FAC5D8BDBD925D59B4E0174AF8F2404444F44823EEE8D5C03DD0298B
                                                SHA-512:EB68DEE35A259777397651147B04DD361942B78D949C9DF0CB671086C0B894F909A8F00CBF8C0887126E66E4C69ABC18DD18C964B593C1A51BA94C40442EC337
                                                Malicious:false
                                                Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                Process:C:\Windows\System32\svchost.exe
                                                File Type:JSON data
                                                Category:dropped
                                                Size (bytes):55
                                                Entropy (8bit):4.306461250274409
                                                Encrypted:false
                                                SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                Malicious:false
                                                Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):512
                                                Entropy (8bit):0.0
                                                Encrypted:false
                                                SSDEEP:3::
                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                Malicious:false
                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                Category:dropped
                                                Size (bytes):32768
                                                Entropy (8bit):1.4141545401105469
                                                Encrypted:false
                                                SSDEEP:48:SlWuDI+CFXJnT55qQX9gBd9mSvOd5YpRXd5YNd5YGd5YMd5YP6Ad5Y1o9ISB29l2:eWl/T3MB+m0WlfPuPqC0WlfIF/
                                                MD5:354BDF18CA8D055AEF723CC6ED7EA742
                                                SHA1:9EEF86B1939DEE60F6F6F013EB1172CDCC32ED30
                                                SHA-256:2E4A59658A25FD45D6BB3E53577577900552EE2E4136F514FCF2450B101C77A9
                                                SHA-512:9E6EFD34AFFBF6DE452534237B6A444FD6AD943E536383CB2733A38A643442F3AB443A800F6753F0258539590048A2FAC5F3A324647490989AF1FA234BDC0381
                                                Malicious:false
                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):512
                                                Entropy (8bit):0.0
                                                Encrypted:false
                                                SSDEEP:3::
                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                Malicious:false
                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                Category:dropped
                                                Size (bytes):32768
                                                Entropy (8bit):1.4141545401105469
                                                Encrypted:false
                                                SSDEEP:48:SlWuDI+CFXJnT55qQX9gBd9mSvOd5YpRXd5YNd5YGd5YMd5YP6Ad5Y1o9ISB29l2:eWl/T3MB+m0WlfPuPqC0WlfIF/
                                                MD5:354BDF18CA8D055AEF723CC6ED7EA742
                                                SHA1:9EEF86B1939DEE60F6F6F013EB1172CDCC32ED30
                                                SHA-256:2E4A59658A25FD45D6BB3E53577577900552EE2E4136F514FCF2450B101C77A9
                                                SHA-512:9E6EFD34AFFBF6DE452534237B6A444FD6AD943E536383CB2733A38A643442F3AB443A800F6753F0258539590048A2FAC5F3A324647490989AF1FA234BDC0381
                                                Malicious:false
                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):512
                                                Entropy (8bit):0.0
                                                Encrypted:false
                                                SSDEEP:3::
                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                Malicious:false
                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):512
                                                Entropy (8bit):0.0
                                                Encrypted:false
                                                SSDEEP:3::
                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                Malicious:false
                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):512
                                                Entropy (8bit):0.0
                                                Encrypted:false
                                                SSDEEP:3::
                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                Malicious:false
                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):32768
                                                Entropy (8bit):0.06823846717123914
                                                Encrypted:false
                                                SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOYYbmc6Vky6lZ:2F0i8n0itFzDHFTZ
                                                MD5:43121AF9C0468049B811D5DE9EE986C6
                                                SHA1:3D65F87A3C467D0DE2BF8F07A60621B947A9CE4C
                                                SHA-256:592C5B6D2ADD44B5EFCE1D5A353279925147188A1C15B56B1189E89FE97374E0
                                                SHA-512:0B09D5648F1374083996F24FF71AE87B22F152D907C91B84567CA27B985F05C447AF27527A3E760F44817300DB8680F73F5D86A36B9DC157AA3E6C5BB6BC6831
                                                Malicious:false
                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):73728
                                                Entropy (8bit):0.22085979916430115
                                                Encrypted:false
                                                SSDEEP:48:PHwmFSB29lOd5YpRXd5YNd5YGd5YMd5Yu9mSvOd5YpRXd5YNd5YGd5YMd5YP6Adu:PH5FqC0WlfVm0WlfPu4B
                                                MD5:0257BC64C1D8894C45B02617960A5299
                                                SHA1:2AAD9C93AF67112974E179B26DB9148FA1BF8C8D
                                                SHA-256:DA121E441DC8C2F3FBD07C7665317337619E4FA6F4C8FFE3D9AB519695FC4C45
                                                SHA-512:BCB67D0426954AD2CC9E66979B7CC5F515F5BBC43EE3EFF5496569162496BAF87DDA25E5DFD24EFFA2313E84928626E7C546F2CF48E2340310AFDB4FB1D3D6AE
                                                Malicious:false
                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                Category:dropped
                                                Size (bytes):32768
                                                Entropy (8bit):1.4141545401105469
                                                Encrypted:false
                                                SSDEEP:48:SlWuDI+CFXJnT55qQX9gBd9mSvOd5YpRXd5YNd5YGd5YMd5YP6Ad5Y1o9ISB29l2:eWl/T3MB+m0WlfPuPqC0WlfIF/
                                                MD5:354BDF18CA8D055AEF723CC6ED7EA742
                                                SHA1:9EEF86B1939DEE60F6F6F013EB1172CDCC32ED30
                                                SHA-256:2E4A59658A25FD45D6BB3E53577577900552EE2E4136F514FCF2450B101C77A9
                                                SHA-512:9E6EFD34AFFBF6DE452534237B6A444FD6AD943E536383CB2733A38A643442F3AB443A800F6753F0258539590048A2FAC5F3A324647490989AF1FA234BDC0381
                                                Malicious:false
                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                Category:dropped
                                                Size (bytes):20480
                                                Entropy (8bit):1.7846940447898487
                                                Encrypted:false
                                                SSDEEP:48:oV8Ph+uRc06WXJMjT53X9gBd9mSvOd5YpRXd5YNd5YGd5YMd5YP6Ad5Y1o9ISB22:/h+1vjTEB+m0WlfPuPqC0WlfIF/
                                                MD5:CA4859F4EC68FE57D7033C82A852BE54
                                                SHA1:06F015F8E84A24EC929E526BED16A18C36AFAFA1
                                                SHA-256:B678F28A277B9D36938BCF9BCB9421143DF494D5AB262B34EDD5DD24CF984FEF
                                                SHA-512:4BED66AA13BEEFCF779805D2F22F5C85B4DCDCC75A4615F4E4F52C76ED7ADCCCCFDDA83C034333ADF353B255E34FB97C081409F1286B39A32EAF2FD5677C88C5
                                                Malicious:false
                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\msiexec.exe
                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                Category:dropped
                                                Size (bytes):20480
                                                Entropy (8bit):1.7846940447898487
                                                Encrypted:false
                                                SSDEEP:48:oV8Ph+uRc06WXJMjT53X9gBd9mSvOd5YpRXd5YNd5YGd5YMd5YP6Ad5Y1o9ISB22:/h+1vjTEB+m0WlfPuPqC0WlfIF/
                                                MD5:CA4859F4EC68FE57D7033C82A852BE54
                                                SHA1:06F015F8E84A24EC929E526BED16A18C36AFAFA1
                                                SHA-256:B678F28A277B9D36938BCF9BCB9421143DF494D5AB262B34EDD5DD24CF984FEF
                                                SHA-512:4BED66AA13BEEFCF779805D2F22F5C85B4DCDCC75A4615F4E4F52C76ED7ADCCCCFDDA83C034333ADF353B255E34FB97C081409F1286B39A32EAF2FD5677C88C5
                                                Malicious:false
                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                Entropy (8bit):7.9367051756500695
                                                TrID:
                                                • Win64 Executable GUI (202006/5) 92.65%
                                                • Win64 Executable (generic) (12005/4) 5.51%
                                                • Generic Win/DOS Executable (2004/3) 0.92%
                                                • DOS Executable Generic (2002/1) 0.92%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:0438.pdf.exe
                                                File size:11'654'747 bytes
                                                MD5:2d11dba46735af1cb1c0a42e9564e20d
                                                SHA1:b2e17960c6d080f7aba7df87f57c08b4bc2e7051
                                                SHA256:e19477a56b247e6cc435fee367abcf6e0c3db21de91ae2514b4a6b1807233c53
                                                SHA512:f053c18333c256c87492e7e74832f2ba695c1633cc80d59e4d426eda82d27d7402a22803e439bb2453f4fa12f00697de355edd61c300b7624c66723d7e54dad0
                                                SSDEEP:196608:tqwvI8YbsGBCEfbi57P6mCRTMFCxZ9zzvHLbax3QS+hbEPjwDhZzczDlUxMUd:ZIRwGjfbi5DCRoOPzzvfaEAPgOHm5d
                                                TLSH:42C6331BFF5D04EAF1AF99F899415022D7B57CC51720868F23B43E4AED736A1AA35302
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$.2.`.\.`.\.`.\..y..h.\..y....\..y..m.\.....b.\...X.r.\..._.j.\...Y.Y.\.i...i.\.i...b.\.i...g.\.`.].C.\...Y.R.\...\.a.\.....a.\
                                                Icon Hash:3570b080889388e1
                                                Entrypoint:0x140032ee0
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x140000000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x66409723 [Sun May 12 10:17:07 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:5
                                                OS Version Minor:2
                                                File Version Major:5
                                                File Version Minor:2
                                                Subsystem Version Major:5
                                                Subsystem Version Minor:2
                                                Import Hash:b1c5b1beabd90d9fdabd1df0779ea832
                                                Instruction
                                                dec eax
                                                sub esp, 28h
                                                call 00007FDB104E78F8h
                                                dec eax
                                                add esp, 28h
                                                jmp 00007FDB104E728Fh
                                                int3
                                                int3
                                                dec eax
                                                mov eax, esp
                                                dec eax
                                                mov dword ptr [eax+08h], ebx
                                                dec eax
                                                mov dword ptr [eax+10h], ebp
                                                dec eax
                                                mov dword ptr [eax+18h], esi
                                                dec eax
                                                mov dword ptr [eax+20h], edi
                                                inc ecx
                                                push esi
                                                dec eax
                                                sub esp, 20h
                                                dec ebp
                                                mov edx, dword ptr [ecx+38h]
                                                dec eax
                                                mov esi, edx
                                                dec ebp
                                                mov esi, eax
                                                dec eax
                                                mov ebp, ecx
                                                dec ecx
                                                mov edx, ecx
                                                dec eax
                                                mov ecx, esi
                                                dec ecx
                                                mov edi, ecx
                                                inc ecx
                                                mov ebx, dword ptr [edx]
                                                dec eax
                                                shl ebx, 04h
                                                dec ecx
                                                add ebx, edx
                                                dec esp
                                                lea eax, dword ptr [ebx+04h]
                                                call 00007FDB104E6713h
                                                mov eax, dword ptr [ebp+04h]
                                                and al, 66h
                                                neg al
                                                mov eax, 00000001h
                                                sbb edx, edx
                                                neg edx
                                                add edx, eax
                                                test dword ptr [ebx+04h], edx
                                                je 00007FDB104E7423h
                                                dec esp
                                                mov ecx, edi
                                                dec ebp
                                                mov eax, esi
                                                dec eax
                                                mov edx, esi
                                                dec eax
                                                mov ecx, ebp
                                                call 00007FDB104E9437h
                                                dec eax
                                                mov ebx, dword ptr [esp+30h]
                                                dec eax
                                                mov ebp, dword ptr [esp+38h]
                                                dec eax
                                                mov esi, dword ptr [esp+40h]
                                                dec eax
                                                mov edi, dword ptr [esp+48h]
                                                dec eax
                                                add esp, 20h
                                                inc ecx
                                                pop esi
                                                ret
                                                int3
                                                int3
                                                int3
                                                dec eax
                                                sub esp, 48h
                                                dec eax
                                                lea ecx, dword ptr [esp+20h]
                                                call 00007FDB104D5CA3h
                                                dec eax
                                                lea edx, dword ptr [00025747h]
                                                dec eax
                                                lea ecx, dword ptr [esp+20h]
                                                call 00007FDB104E84F2h
                                                int3
                                                jmp 00007FDB104EE6D4h
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                Programming Language:
                                                • [ C ] VS2008 SP1 build 30729
                                                • [IMP] VS2008 SP1 build 30729
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x597a00x34.rdata
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x597d40x50.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000x5f334.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6a0000x306c.pdata
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xd00000x970.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x536c00x54.rdata
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x537800x28.rdata
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4b3f00x140.rdata
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x480000x508.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x588bc0x120.rdata
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x4676e0x46800f06bb06e02377ae8b223122e53be35c2False0.5372340425531915data6.47079645411382IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x480000x128c40x12a002de06d4a6920a6911e64ff20000ea72fFalse0.4499003775167785data5.273999097784603IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x5b0000xe75c0x1a000dbdb901a7d477980097e42e511a94fbFalse0.28275240384615385data3.2571023907881185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .pdata0x6a0000x306c0x3200b0ce0f057741ad2a4ef4717079fa34e9False0.483359375data5.501810413666288IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .didat0x6e0000x3600x4001fcc7b1d7a02443319f8fcc2be4ca936False0.2578125data3.0459938492946015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                _RDATA0x6f0000x15c0x2003f331ec50f09ba861beaf955b33712d5False0.408203125data3.3356393424384843IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .rsrc0x700000x5f3340x5f400ac83509a9abddcfebcee4527be350f1aFalse0.06483503526902887data2.1781366278912278IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0xd00000x9700xa0077a9ddfc47a5650d6eebbcc823e39532False0.52421875data5.336289720085303IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                PNG0x706440xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                                                PNG0x7118c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                                                RT_ICON0x727380x42028Device independent bitmap graphic, 256 x 512 x 32, image size 262144, resolution 2835 x 2835 px/m0.023615261709619195
                                                RT_ICON0xb47600x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m0.3191489361702128
                                                RT_ICON0xb4bc80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/m0.11867219917012448
                                                RT_ICON0xb71700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m0.17284240150093808
                                                RT_ICON0xb82180x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/m0.04436294806577547
                                                RT_ICON0xc8a400x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/m0.08644307982994803
                                                RT_DIALOG0xccc680x286dataEnglishUnited States0.5092879256965944
                                                RT_DIALOG0xccef00x13adataEnglishUnited States0.60828025477707
                                                RT_DIALOG0xcd02c0xecdataEnglishUnited States0.6991525423728814
                                                RT_DIALOG0xcd1180x12edataEnglishUnited States0.5927152317880795
                                                RT_DIALOG0xcd2480x338dataEnglishUnited States0.45145631067961167
                                                RT_DIALOG0xcd5800x252dataEnglishUnited States0.5757575757575758
                                                RT_STRING0xcd7d40x1e2dataEnglishUnited States0.3900414937759336
                                                RT_STRING0xcd9b80x1ccdataEnglishUnited States0.4282608695652174
                                                RT_STRING0xcdb840x1b8dataEnglishUnited States0.45681818181818185
                                                RT_STRING0xcdd3c0x146dataEnglishUnited States0.5153374233128835
                                                RT_STRING0xcde840x46cdataEnglishUnited States0.3454063604240283
                                                RT_STRING0xce2f00x166dataEnglishUnited States0.49162011173184356
                                                RT_STRING0xce4580x152dataEnglishUnited States0.5059171597633136
                                                RT_STRING0xce5ac0x10adataEnglishUnited States0.49624060150375937
                                                RT_STRING0xce6b80xbcdataEnglishUnited States0.6329787234042553
                                                RT_STRING0xce7740x1c0dataEnglishUnited States0.5178571428571429
                                                RT_STRING0xce9340x250dataEnglishUnited States0.44256756756756754
                                                RT_GROUP_ICON0xceb840x5adata0.7555555555555555
                                                RT_MANIFEST0xcebe00x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.39786666666666665
                                                DLLImport
                                                KERNEL32.dllLocalFree, GetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, GetCurrentProcessId, CreateDirectoryW, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetModuleFileNameW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExpandEnvironmentStringsW, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, GlobalMemoryStatusEx, LoadResource, SizeofResource, GetTimeFormatW, GetDateFormatW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindNextFileA, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, WaitForSingleObjectEx, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlPcToFileHeader, RtlUnwindEx, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, GetStringTypeW, HeapReAlloc, LCMapStringW, FindFirstFileExA
                                                OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                                gdiplus.dllGdipCloneImage, GdipFree, GdipDisposeImage, GdipCreateBitmapFromStream, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipAlloc
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 28, 2024 13:43:02.892199993 CET498715651192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:02.897785902 CET565149871111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:02.897866011 CET498715651192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:02.907253027 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:02.912683964 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:02.912760019 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:02.923137903 CET4987380192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:02.928739071 CET8049873111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:02.928817987 CET4987380192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:02.939030886 CET49874465192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:02.944648027 CET46549874111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:02.944725037 CET49874465192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:02.958770990 CET4987580192.168.2.465.21.245.7
                                                Oct 28, 2024 13:43:02.967008114 CET804987565.21.245.7192.168.2.4
                                                Oct 28, 2024 13:43:02.967078924 CET4987580192.168.2.465.21.245.7
                                                Oct 28, 2024 13:43:03.001534939 CET498765555192.168.2.465.21.245.7
                                                Oct 28, 2024 13:43:03.007056952 CET55554987665.21.245.7192.168.2.4
                                                Oct 28, 2024 13:43:03.007133007 CET498765555192.168.2.465.21.245.7
                                                Oct 28, 2024 13:43:03.031779051 CET498715651192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:03.031779051 CET498715651192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:03.039402008 CET565149871111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:03.039419889 CET565149871111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:03.045706987 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:03.045742035 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:03.053215981 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:03.053231955 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:03.061367989 CET4987380192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:03.061419964 CET4987380192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:03.066819906 CET8049873111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:03.066837072 CET8049873111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:03.076911926 CET49874465192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:03.076944113 CET49874465192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:03.082385063 CET46549874111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:03.082402945 CET46549874111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:03.092282057 CET4987580192.168.2.465.21.245.7
                                                Oct 28, 2024 13:43:03.092322111 CET4987580192.168.2.465.21.245.7
                                                Oct 28, 2024 13:43:03.097739935 CET804987565.21.245.7192.168.2.4
                                                Oct 28, 2024 13:43:03.097768068 CET804987565.21.245.7192.168.2.4
                                                Oct 28, 2024 13:43:03.123579025 CET498765555192.168.2.465.21.245.7
                                                Oct 28, 2024 13:43:03.123630047 CET498765555192.168.2.465.21.245.7
                                                Oct 28, 2024 13:43:03.129085064 CET55554987665.21.245.7192.168.2.4
                                                Oct 28, 2024 13:43:03.129097939 CET55554987665.21.245.7192.168.2.4
                                                Oct 28, 2024 13:43:03.598997116 CET565149871111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:03.599271059 CET498715651192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:03.599272013 CET498715651192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:03.604805946 CET565149871111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:03.623183012 CET8049873111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:03.623838902 CET4987380192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:03.624069929 CET4987380192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:03.629524946 CET8049873111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:03.858572006 CET804987565.21.245.7192.168.2.4
                                                Oct 28, 2024 13:43:03.858771086 CET4987580192.168.2.465.21.245.7
                                                Oct 28, 2024 13:43:03.858829021 CET4987580192.168.2.465.21.245.7
                                                Oct 28, 2024 13:43:03.858829021 CET4987580192.168.2.465.21.245.7
                                                Oct 28, 2024 13:43:03.858829021 CET4987580192.168.2.465.21.245.7
                                                Oct 28, 2024 13:43:03.858861923 CET4987580192.168.2.465.21.245.7
                                                Oct 28, 2024 13:43:03.864520073 CET804987565.21.245.7192.168.2.4
                                                Oct 28, 2024 13:43:03.864533901 CET804987565.21.245.7192.168.2.4
                                                Oct 28, 2024 13:43:03.864566088 CET804987565.21.245.7192.168.2.4
                                                Oct 28, 2024 13:43:03.864578962 CET804987565.21.245.7192.168.2.4
                                                Oct 28, 2024 13:43:03.865679979 CET804987565.21.245.7192.168.2.4
                                                Oct 28, 2024 13:43:03.865742922 CET4987580192.168.2.465.21.245.7
                                                Oct 28, 2024 13:43:03.944004059 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:03.944142103 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:03.944142103 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:03.944190979 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:03.944344997 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:03.949676991 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:03.949721098 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:03.949743032 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:03.949755907 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:04.387063980 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:04.435858011 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:05.426808119 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:05.467067957 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:06.402539968 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:06.451430082 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:07.417779922 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:07.467062950 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:08.419399977 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:08.467050076 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:09.427175045 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:09.482680082 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:10.434030056 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:10.482705116 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:11.430047035 CET46549874111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:11.430143118 CET49874465192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:11.430237055 CET49874465192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:11.435683966 CET46549874111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:11.449872017 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:11.475837946 CET55554987665.21.245.7192.168.2.4
                                                Oct 28, 2024 13:43:11.477155924 CET498765555192.168.2.465.21.245.7
                                                Oct 28, 2024 13:43:11.477209091 CET498765555192.168.2.465.21.245.7
                                                Oct 28, 2024 13:43:11.483652115 CET55554987665.21.245.7192.168.2.4
                                                Oct 28, 2024 13:43:11.498408079 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:12.466692924 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:12.513927937 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:13.787404060 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:13.842056990 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:14.489007950 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:14.529556990 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:16.129427910 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:16.170284986 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:16.513534069 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:16.560888052 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:17.511451960 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:17.560812950 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:18.515419960 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:18.560837984 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:19.529264927 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:19.576443911 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:20.537806034 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:20.592092037 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:20.822309971 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:20.822487116 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:21.852066040 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:21.900517941 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:22.563579082 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:22.607697964 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:23.579389095 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:23.623368025 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:24.593749046 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:24.642623901 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:25.605489969 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:25.658346891 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:26.622419119 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:26.674024105 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:27.633970022 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:27.673999071 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:28.955413103 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:29.002151012 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:29.652100086 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:29.705271959 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:30.663033962 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:30.705147028 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:31.725622892 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:31.767752886 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:32.738567114 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:32.783412933 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:33.811862946 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:33.861413002 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:35.108922005 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:35.158387899 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:35.832853079 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:35.877005100 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:36.830401897 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:36.877090931 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:37.844845057 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:37.892746925 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:38.856595039 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:38.908298016 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:39.871014118 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:39.923912048 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:40.879487038 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:40.924056053 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:41.891376972 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:41.939584970 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:42.902249098 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:42.955162048 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:43.902328968 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:43.955153942 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:44.902637005 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:44.955142021 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:46.230385065 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:46.283277988 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:46.918623924 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:46.970814943 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:47.933109999 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:47.986438990 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:48.950627089 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:49.002079010 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:49.949815035 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:50.002038002 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:50.956368923 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:51.002054930 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:51.965483904 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:52.017764091 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:52.980241060 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:53.033430099 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:53.987030983 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:54.033458948 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:54.996140003 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:55.049024105 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:56.008806944 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:56.048918009 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:57.023207903 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:57.080182076 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:58.027380943 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:58.080192089 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:43:59.041826010 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:43:59.095933914 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:00.043157101 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:00.095808983 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:01.057730913 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:01.111454010 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:02.060014963 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:02.111679077 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:02.913391113 CET562965651192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:02.919008970 CET565156296111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:02.919121027 CET562965651192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:02.929214954 CET5629780192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:02.934839964 CET8056297111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:02.934921980 CET5629780192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:02.942845106 CET56298465192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:02.948364973 CET46556298111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:02.948435068 CET56298465192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:02.957793951 CET5629980192.168.2.465.21.245.7
                                                Oct 28, 2024 13:44:02.964422941 CET805629965.21.245.7192.168.2.4
                                                Oct 28, 2024 13:44:02.964618921 CET5629980192.168.2.465.21.245.7
                                                Oct 28, 2024 13:44:02.973524094 CET563005555192.168.2.465.21.245.7
                                                Oct 28, 2024 13:44:02.979072094 CET55555630065.21.245.7192.168.2.4
                                                Oct 28, 2024 13:44:02.979233980 CET563005555192.168.2.465.21.245.7
                                                Oct 28, 2024 13:44:03.049498081 CET562965651192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:03.049498081 CET562965651192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:03.054987907 CET565156296111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:03.055021048 CET565156296111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:03.064752102 CET5629780192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:03.064812899 CET5629780192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:03.070360899 CET8056297111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:03.070389032 CET8056297111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:03.082377911 CET56298465192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:03.082412004 CET56298465192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:03.083745003 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:03.089584112 CET46556298111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:03.089613914 CET46556298111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:03.099005938 CET5629980192.168.2.465.21.245.7
                                                Oct 28, 2024 13:44:03.099030018 CET5629980192.168.2.465.21.245.7
                                                Oct 28, 2024 13:44:03.106156111 CET805629965.21.245.7192.168.2.4
                                                Oct 28, 2024 13:44:03.106199980 CET805629965.21.245.7192.168.2.4
                                                Oct 28, 2024 13:44:03.116055965 CET563005555192.168.2.465.21.245.7
                                                Oct 28, 2024 13:44:03.116055965 CET563005555192.168.2.465.21.245.7
                                                Oct 28, 2024 13:44:03.121609926 CET55555630065.21.245.7192.168.2.4
                                                Oct 28, 2024 13:44:03.121638060 CET55555630065.21.245.7192.168.2.4
                                                Oct 28, 2024 13:44:03.127062082 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:03.629430056 CET565156296111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:03.629498959 CET562965651192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:03.629581928 CET562965651192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:03.635097980 CET565156296111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:03.657219887 CET8056297111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:03.657277107 CET5629780192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:03.657358885 CET5629780192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:03.662888050 CET8056297111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:03.831451893 CET805629965.21.245.7192.168.2.4
                                                Oct 28, 2024 13:44:03.833703995 CET5629980192.168.2.465.21.245.7
                                                Oct 28, 2024 13:44:03.833704948 CET5629980192.168.2.465.21.245.7
                                                Oct 28, 2024 13:44:03.833753109 CET5629980192.168.2.465.21.245.7
                                                Oct 28, 2024 13:44:03.833753109 CET5629980192.168.2.465.21.245.7
                                                Oct 28, 2024 13:44:03.833775997 CET5629980192.168.2.465.21.245.7
                                                Oct 28, 2024 13:44:03.839287996 CET805629965.21.245.7192.168.2.4
                                                Oct 28, 2024 13:44:03.839342117 CET805629965.21.245.7192.168.2.4
                                                Oct 28, 2024 13:44:03.839356899 CET805629965.21.245.7192.168.2.4
                                                Oct 28, 2024 13:44:03.839370012 CET805629965.21.245.7192.168.2.4
                                                Oct 28, 2024 13:44:03.839752913 CET805629965.21.245.7192.168.2.4
                                                Oct 28, 2024 13:44:03.840037107 CET5629980192.168.2.465.21.245.7
                                                Oct 28, 2024 13:44:04.090467930 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:04.142699957 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:05.136392117 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:05.189577103 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:06.137284040 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:06.190021992 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:07.151722908 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:07.205188036 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:08.209809065 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:08.252077103 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:09.249839067 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:09.299041986 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:10.261694908 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:10.314657927 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:11.278834105 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:11.330384970 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:11.441320896 CET46556298111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:11.441423893 CET56298465192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:11.441642046 CET56298465192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:11.447130919 CET46556298111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:11.470680952 CET55555630065.21.245.7192.168.2.4
                                                Oct 28, 2024 13:44:11.470752954 CET563005555192.168.2.465.21.245.7
                                                Oct 28, 2024 13:44:11.471240997 CET563005555192.168.2.465.21.245.7
                                                Oct 28, 2024 13:44:11.477570057 CET55555630065.21.245.7192.168.2.4
                                                Oct 28, 2024 13:44:12.277056932 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:12.330329895 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:13.294754982 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:13.345973015 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:14.621598959 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:14.673988104 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:15.328911066 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:15.377253056 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:16.339093924 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:16.392909050 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:17.339431047 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:17.392925024 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:18.374725103 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:18.423978090 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:19.378865004 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:19.423980951 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:20.386046886 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:20.439616919 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:21.401859045 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:21.580233097 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:22.402846098 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:22.580236912 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:23.420329094 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:23.580252886 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:24.615616083 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:24.674123049 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:25.456891060 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:25.580359936 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:26.465065956 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:26.580239058 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:27.472227097 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:27.568680048 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:28.480071068 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:28.580365896 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:29.495827913 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:29.580416918 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:30.521939993 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:30.580363989 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:31.526882887 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:31.580337048 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:32.619806051 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:32.673993111 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:33.542720079 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:33.595895052 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:34.565937996 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:34.611515045 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:35.573834896 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:35.627125025 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:36.589847088 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:36.642777920 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:37.602545977 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:37.658394098 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:38.607212067 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:38.658385992 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:39.620681047 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:39.674020052 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:40.624696016 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:40.674007893 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:41.641798973 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:41.689667940 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:42.653274059 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:42.705281973 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:43.658868074 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:43.705291986 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:44.684421062 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:44.736525059 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:45.756088972 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:45.799156904 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:46.727781057 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:46.783525944 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:47.845698118 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:47.890636921 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:48.896909952 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:48.939785004 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:49.909080029 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:49.955374002 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:50.917670012 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:50.970913887 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:51.933783054 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:51.986618042 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:52.948299885 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:53.002157927 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:53.948717117 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:53.991772890 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:54.963901043 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:55.017786026 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:56.130871058 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:56.174134016 CET498728080192.168.2.4111.90.140.76
                                                Oct 28, 2024 13:44:57.042428970 CET808049872111.90.140.76192.168.2.4
                                                Oct 28, 2024 13:44:57.095906019 CET498728080192.168.2.4111.90.140.76
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 28, 2024 13:42:02.992033958 CET5264553192.168.2.41.1.1.1
                                                Oct 28, 2024 13:43:21.570112944 CET53548981.1.1.1192.168.2.4
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Oct 28, 2024 13:42:02.992033958 CET192.168.2.41.1.1.10x12a2Standard query (0)x1.i.lencr.orgA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Oct 28, 2024 13:42:03.000487089 CET1.1.1.1192.168.2.40x12a2No error (0)x1.i.lencr.orgcrl.root-x1.letsencrypt.org.edgekey.netCNAME (Canonical name)IN (0x0001)false
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.449873111.90.140.76807076C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 28, 2024 13:43:03.061367989 CET6OUTData Raw: 00 00 00 01
                                                Data Ascii:
                                                Oct 28, 2024 13:43:03.061419964 CET6OUTData Raw: 00 00 00 03
                                                Data Ascii:


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                1192.168.2.44987565.21.245.7807076C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 28, 2024 13:43:03.092282057 CET6OUTData Raw: 00 00 00 01
                                                Data Ascii:
                                                Oct 28, 2024 13:43:03.092322111 CET6OUTData Raw: 00 00 00 03
                                                Data Ascii:
                                                Oct 28, 2024 13:43:03.858572006 CET505INHTTP/1.1 400 Bad Request
                                                Content-Type: text/html; charset=us-ascii
                                                Server: Microsoft-HTTPAPI/2.0
                                                Date: Mon, 28 Oct 2024 12:43:02 GMT
                                                Connection: close
                                                Content-Length: 326
                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 42 61 64 20 52 65 71 75 65 73 74 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 42 61 64 20 52 65 71 75 65 73 74 20 2d 20 49 6e 76 61 6c 69 64 20 56 65 72 62 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 30 2e 20 54 68 65 20 72 65 71 75 65 73 74 20 76 65 72 62 20 69 73 20 69 6e 76 61 6c 69 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Bad Request</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Bad Request - Invalid Verb</h2><hr><p>HTTP Error 400. The request verb is invalid.</p></BODY></HTML>
                                                Oct 28, 2024 13:43:03.858771086 CET6OUTData Raw: 00 00 10 18
                                                Data Ascii:
                                                Oct 28, 2024 13:43:03.858829021 CET6OUTData Raw: 00 00 00 01
                                                Data Ascii:
                                                Oct 28, 2024 13:43:03.858829021 CET6OUTData Raw: 2d 2d 0d 0a
                                                Data Ascii: --
                                                Oct 28, 2024 13:43:03.858829021 CET6OUTData Raw: 00 00 00 00
                                                Data Ascii:


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                2192.168.2.456297111.90.140.76807076C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 28, 2024 13:44:03.064752102 CET6OUTData Raw: 00 00 00 01
                                                Data Ascii:
                                                Oct 28, 2024 13:44:03.064812899 CET6OUTData Raw: 00 00 00 03
                                                Data Ascii:


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                3192.168.2.45629965.21.245.7807076C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                                TimestampBytes transferredDirectionData
                                                Oct 28, 2024 13:44:03.099005938 CET6OUTData Raw: 00 00 00 01
                                                Data Ascii:
                                                Oct 28, 2024 13:44:03.099030018 CET6OUTData Raw: 00 00 00 03
                                                Data Ascii:
                                                Oct 28, 2024 13:44:03.831451893 CET505INHTTP/1.1 400 Bad Request
                                                Content-Type: text/html; charset=us-ascii
                                                Server: Microsoft-HTTPAPI/2.0
                                                Date: Mon, 28 Oct 2024 12:44:02 GMT
                                                Connection: close
                                                Content-Length: 326
                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 42 61 64 20 52 65 71 75 65 73 74 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 42 61 64 20 52 65 71 75 65 73 74 20 2d 20 49 6e 76 61 6c 69 64 20 56 65 72 62 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 30 2e 20 54 68 65 20 72 65 71 75 65 73 74 20 76 65 72 62 20 69 73 20 69 6e 76 61 6c 69 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Bad Request</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Bad Request - Invalid Verb</h2><hr><p>HTTP Error 400. The request verb is invalid.</p></BODY></HTML>
                                                Oct 28, 2024 13:44:03.833703995 CET6OUTData Raw: 00 00 10 18
                                                Data Ascii:
                                                Oct 28, 2024 13:44:03.833704948 CET6OUTData Raw: 00 00 00 01
                                                Data Ascii:
                                                Oct 28, 2024 13:44:03.833753109 CET6OUTData Raw: 2d 2d 0d 0a
                                                Data Ascii: --
                                                Oct 28, 2024 13:44:03.833753109 CET6OUTData Raw: 00 00 00 00
                                                Data Ascii:


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:08:41:46
                                                Start date:28/10/2024
                                                Path:C:\Users\user\Desktop\0438.pdf.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\Desktop\0438.pdf.exe"
                                                Imagebase:0x7ff665ec0000
                                                File size:11'654'747 bytes
                                                MD5 hash:2D11DBA46735AF1CB1C0A42E9564E20D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:1
                                                Start time:08:41:48
                                                Start date:28/10/2024
                                                Path:C:\Windows\System32\msiexec.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\pdf.msi" /qn
                                                Imagebase:0x7ff77fd90000
                                                File size:69'632 bytes
                                                MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:2
                                                Start time:08:41:48
                                                Start date:28/10/2024
                                                Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\Doc.pdf"
                                                Imagebase:0x7ff6bc1b0000
                                                File size:5'641'176 bytes
                                                MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:false

                                                Target ID:3
                                                Start time:08:41:48
                                                Start date:28/10/2024
                                                Path:C:\Windows\System32\msiexec.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\msiexec.exe /V
                                                Imagebase:0x7ff77fd90000
                                                File size:69'632 bytes
                                                MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:false

                                                Target ID:4
                                                Start time:08:41:49
                                                Start date:28/10/2024
                                                Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                                                Imagebase:0x7ff74bb60000
                                                File size:3'581'912 bytes
                                                MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:false

                                                Target ID:5
                                                Start time:08:41:50
                                                Start date:28/10/2024
                                                Path:C:\Windows\System32\svchost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                Imagebase:0x7ff6eef20000
                                                File size:55'320 bytes
                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:6
                                                Start time:08:41:50
                                                Start date:28/10/2024
                                                Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2068 --field-trial-handle=1576,i,6061207058783302797,5194887840937353,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                                                Imagebase:0x7ff74bb60000
                                                File size:3'581'912 bytes
                                                MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:false

                                                Target ID:7
                                                Start time:08:41:56
                                                Start date:28/10/2024
                                                Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /siex /silentinstall
                                                Imagebase:0x400000
                                                File size:6'307'408 bytes
                                                MD5 hash:63D0964168B927D00064AA684E79A300
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:Borland Delphi
                                                Yara matches:
                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000007.00000000.1833595645.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe, Author: Joe Security
                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe, Author: Joe Security
                                                Antivirus matches:
                                                • Detection: 3%, ReversingLabs
                                                Reputation:low
                                                Has exited:true

                                                Target ID:9
                                                Start time:08:41:57
                                                Start date:28/10/2024
                                                Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /siex /silentinstall
                                                Imagebase:0x400000
                                                File size:7'753'808 bytes
                                                MD5 hash:F3D74B072B9697CF64B0B8445FDC8128
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:Borland Delphi
                                                Yara matches:
                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000009.00000000.1843565844.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe, Author: Joe Security
                                                Antivirus matches:
                                                • Detection: 3%, ReversingLabs
                                                Reputation:low
                                                Has exited:true

                                                Target ID:10
                                                Start time:08:41:59
                                                Start date:28/10/2024
                                                Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /firewall
                                                Imagebase:0x400000
                                                File size:6'307'408 bytes
                                                MD5 hash:63D0964168B927D00064AA684E79A300
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:Borland Delphi
                                                Reputation:low
                                                Has exited:true

                                                Target ID:11
                                                Start time:08:41:59
                                                Start date:28/10/2024
                                                Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /firewall
                                                Imagebase:0x400000
                                                File size:7'753'808 bytes
                                                MD5 hash:F3D74B072B9697CF64B0B8445FDC8128
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:Borland Delphi
                                                Reputation:low
                                                Has exited:true

                                                Target ID:13
                                                Start time:08:42:00
                                                Start date:28/10/2024
                                                Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /start
                                                Imagebase:0x400000
                                                File size:6'307'408 bytes
                                                MD5 hash:63D0964168B927D00064AA684E79A300
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:Borland Delphi
                                                Has exited:true

                                                Target ID:14
                                                Start time:08:42:01
                                                Start date:28/10/2024
                                                Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /start
                                                Imagebase:0x400000
                                                File size:7'753'808 bytes
                                                MD5 hash:F3D74B072B9697CF64B0B8445FDC8128
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:Borland Delphi
                                                Has exited:true

                                                Target ID:15
                                                Start time:08:42:01
                                                Start date:28/10/2024
                                                Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe"
                                                Imagebase:0x400000
                                                File size:7'753'808 bytes
                                                MD5 hash:F3D74B072B9697CF64B0B8445FDC8128
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:Borland Delphi
                                                Has exited:false

                                                Target ID:16
                                                Start time:08:42:03
                                                Start date:28/10/2024
                                                Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /tray
                                                Imagebase:0x400000
                                                File size:6'307'408 bytes
                                                MD5 hash:63D0964168B927D00064AA684E79A300
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:Borland Delphi
                                                Has exited:false

                                                Target ID:17
                                                Start time:08:42:03
                                                Start date:28/10/2024
                                                Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe"
                                                Imagebase:0x400000
                                                File size:6'307'408 bytes
                                                MD5 hash:63D0964168B927D00064AA684E79A300
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:Borland Delphi
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:12.2%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:27.4%
                                                  Total number of Nodes:2000
                                                  Total number of Limit Nodes:28
                                                  execution_graph 26345 7ff665efbf2c 41 API calls 2 library calls 28369 7ff665efbdf8 28370 7ff665efbe1e GetModuleHandleW 28369->28370 28371 7ff665efbe68 28369->28371 28370->28371 28379 7ff665efbe2b 28370->28379 28386 7ff665eff398 EnterCriticalSection 28371->28386 28379->28371 28387 7ff665efbfb0 GetModuleHandleExW 28379->28387 28388 7ff665efc001 28387->28388 28389 7ff665efbfda GetProcAddress 28387->28389 28391 7ff665efc011 28388->28391 28392 7ff665efc00b FreeLibrary 28388->28392 28389->28388 28390 7ff665efbff4 28389->28390 28390->28388 28391->28371 28392->28391 25419 7ff665ef20f0 25420 7ff665ef2106 _com_error::_com_error 25419->25420 25425 7ff665ef4078 25420->25425 25422 7ff665ef2117 25430 7ff665ef1900 25422->25430 25426 7ff665ef40b4 RtlPcToFileHeader 25425->25426 25427 7ff665ef4097 25425->25427 25428 7ff665ef40db RaiseException 25426->25428 25429 7ff665ef40cc 25426->25429 25427->25426 25428->25422 25429->25428 25456 7ff665ef1558 25430->25456 25433 7ff665ef198b 25434 7ff665ef1868 DloadReleaseSectionWriteAccess 6 API calls 25433->25434 25435 7ff665ef1998 RaiseException 25434->25435 25436 7ff665ef1bb5 25435->25436 25437 7ff665ef1a3d LoadLibraryExA 25439 7ff665ef1a54 GetLastError 25437->25439 25440 7ff665ef1aa9 25437->25440 25438 7ff665ef1b85 25464 7ff665ef1868 25438->25464 25445 7ff665ef1a7e 25439->25445 25446 7ff665ef1a69 25439->25446 25441 7ff665ef1ab4 FreeLibrary 25440->25441 25443 7ff665ef1abd 25440->25443 25441->25443 25442 7ff665ef19b4 25442->25437 25442->25438 25442->25440 25442->25443 25443->25438 25444 7ff665ef1b1b GetProcAddress 25443->25444 25444->25438 25447 7ff665ef1b30 GetLastError 25444->25447 25449 7ff665ef1868 DloadReleaseSectionWriteAccess 6 API calls 25445->25449 25446->25440 25446->25445 25451 7ff665ef1b45 25447->25451 25450 7ff665ef1a8b RaiseException 25449->25450 25450->25436 25451->25438 25452 7ff665ef1868 DloadReleaseSectionWriteAccess 6 API calls 25451->25452 25453 7ff665ef1b67 RaiseException 25452->25453 25454 7ff665ef1558 _com_raise_error 6 API calls 25453->25454 25455 7ff665ef1b81 25454->25455 25455->25438 25457 7ff665ef156e 25456->25457 25463 7ff665ef15d3 25456->25463 25472 7ff665ef1604 25457->25472 25460 7ff665ef15ce 25462 7ff665ef1604 DloadReleaseSectionWriteAccess 3 API calls 25460->25462 25462->25463 25463->25433 25463->25442 25465 7ff665ef1878 25464->25465 25466 7ff665ef18d1 25464->25466 25467 7ff665ef1604 DloadReleaseSectionWriteAccess 3 API calls 25465->25467 25466->25436 25468 7ff665ef187d 25467->25468 25469 7ff665ef18cc 25468->25469 25470 7ff665ef17d8 DloadProtectSection 3 API calls 25468->25470 25471 7ff665ef1604 DloadReleaseSectionWriteAccess 3 API calls 25469->25471 25470->25469 25471->25466 25473 7ff665ef161f 25472->25473 25474 7ff665ef1573 25472->25474 25473->25474 25475 7ff665ef1624 GetModuleHandleW 25473->25475 25474->25460 25479 7ff665ef17d8 25474->25479 25476 7ff665ef163e GetProcAddress 25475->25476 25477 7ff665ef1639 25475->25477 25476->25477 25478 7ff665ef1653 GetProcAddress 25476->25478 25477->25474 25478->25477 25480 7ff665ef17fa DloadProtectSection 25479->25480 25481 7ff665ef1802 25480->25481 25482 7ff665ef183a VirtualProtect 25480->25482 25484 7ff665ef16a4 VirtualQuery GetSystemInfo 25480->25484 25481->25460 25482->25481 25484->25482 26351 7ff665ef03e0 26352 7ff665ef041f 26351->26352 26353 7ff665ef0497 26351->26353 26355 7ff665edaae0 48 API calls 26352->26355 26354 7ff665edaae0 48 API calls 26353->26354 26356 7ff665ef04ab 26354->26356 26357 7ff665ef0433 26355->26357 26358 7ff665edda98 48 API calls 26356->26358 26359 7ff665edda98 48 API calls 26357->26359 26362 7ff665ef0442 BuildCatchObjectHelperInternal 26358->26362 26359->26362 26360 7ff665ec1fa0 31 API calls 26361 7ff665ef0541 26360->26361 26376 7ff665ec250c 26361->26376 26362->26360 26363 7ff665ef05c6 26362->26363 26365 7ff665ef05cc 26362->26365 26366 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26363->26366 26367 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26365->26367 26366->26365 26369 7ff665ef05d2 26367->26369 26377 7ff665ec2513 26376->26377 26378 7ff665ec2516 SetDlgItemTextW 26376->26378 26377->26378 28342 7ff665ef11cf 28343 7ff665ef1102 28342->28343 28344 7ff665ef1900 _com_raise_error 14 API calls 28343->28344 28345 7ff665ef1141 28344->28345 26388 7ff665eeb190 26731 7ff665ec255c 26388->26731 26390 7ff665eeb1db 26391 7ff665eebe93 26390->26391 26392 7ff665eeb1ef 26390->26392 26543 7ff665eeb20c 26390->26543 26997 7ff665eef390 26391->26997 26395 7ff665eeb1ff 26392->26395 26396 7ff665eeb2db 26392->26396 26392->26543 26400 7ff665eeb2a9 26395->26400 26401 7ff665eeb207 26395->26401 26403 7ff665eeb391 26396->26403 26404 7ff665eeb2f5 26396->26404 26397 7ff665ef2320 _handle_error 8 API calls 26402 7ff665eec350 26397->26402 26398 7ff665eebeba SendMessageW 26399 7ff665eebec9 26398->26399 26406 7ff665eebed5 SendDlgItemMessageW 26399->26406 26407 7ff665eebef0 GetDlgItem SendMessageW 26399->26407 26408 7ff665eeb2cb EndDialog 26400->26408 26400->26543 26412 7ff665edaae0 48 API calls 26401->26412 26401->26543 26739 7ff665ec22bc GetDlgItem 26403->26739 26409 7ff665edaae0 48 API calls 26404->26409 26406->26407 26411 7ff665ed62dc 35 API calls 26407->26411 26408->26543 26413 7ff665eeb313 SetDlgItemTextW 26409->26413 26414 7ff665eebf47 GetDlgItem 26411->26414 26415 7ff665eeb236 26412->26415 26419 7ff665eeb326 26413->26419 27016 7ff665ec2520 26414->27016 27020 7ff665ec1ec4 34 API calls _handle_error 26415->27020 26417 7ff665eeb3f5 26437 7ff665eebcc5 26417->26437 26562 7ff665eeb3b1 EndDialog 26417->26562 26418 7ff665eeb408 GetDlgItem 26423 7ff665eeb422 SendMessageW SendMessageW 26418->26423 26424 7ff665eeb44f SetFocus 26418->26424 26428 7ff665eeb340 GetMessageW 26419->26428 26419->26543 26422 7ff665eeb246 26427 7ff665eeb25c 26422->26427 26433 7ff665ec250c SetDlgItemTextW 26422->26433 26423->26424 26429 7ff665eeb465 26424->26429 26430 7ff665eeb4f2 26424->26430 26446 7ff665eec363 26427->26446 26427->26543 26435 7ff665eeb35e IsDialogMessageW 26428->26435 26428->26543 26436 7ff665edaae0 48 API calls 26429->26436 26753 7ff665ec8d04 26430->26753 26431 7ff665eeb3da 26438 7ff665ec1fa0 31 API calls 26431->26438 26433->26427 26435->26419 26441 7ff665eeb373 TranslateMessage DispatchMessageW 26435->26441 26442 7ff665eeb46f 26436->26442 26443 7ff665edaae0 48 API calls 26437->26443 26438->26543 26440 7ff665eeb52c 26763 7ff665eeef80 26440->26763 26441->26419 26455 7ff665ec129c 33 API calls 26442->26455 26447 7ff665eebcd6 SetDlgItemTextW 26443->26447 26451 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26446->26451 26450 7ff665edaae0 48 API calls 26447->26450 26456 7ff665eebd08 26450->26456 26457 7ff665eec368 26451->26457 26454 7ff665edaae0 48 API calls 26459 7ff665eeb555 26454->26459 26460 7ff665eeb498 26455->26460 26468 7ff665ec129c 33 API calls 26456->26468 26461 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26457->26461 26464 7ff665edda98 48 API calls 26459->26464 26465 7ff665eef0a4 24 API calls 26460->26465 26469 7ff665eec36e 26461->26469 26473 7ff665eeb568 26464->26473 26474 7ff665eeb4a5 26465->26474 26497 7ff665eebd31 26468->26497 26480 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26469->26480 26777 7ff665eef0a4 26473->26777 26474->26457 26488 7ff665eeb4e8 26474->26488 26479 7ff665eebdda 26489 7ff665edaae0 48 API calls 26479->26489 26490 7ff665eec374 26480->26490 26487 7ff665eeb5ec 26500 7ff665eeb61a 26487->26500 27022 7ff665ed32a8 26487->27022 26488->26487 27021 7ff665eefa80 33 API calls 2 library calls 26488->27021 26502 7ff665eebde4 26489->26502 26508 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26490->26508 26494 7ff665ec1fa0 31 API calls 26495 7ff665eeb586 26494->26495 26495->26469 26495->26488 26497->26479 26509 7ff665ec129c 33 API calls 26497->26509 26791 7ff665ed2f58 26500->26791 26520 7ff665ec129c 33 API calls 26502->26520 26514 7ff665eec37a 26508->26514 26515 7ff665eebd7f 26509->26515 26526 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26514->26526 26522 7ff665edaae0 48 API calls 26515->26522 26518 7ff665eeb634 GetLastError 26519 7ff665eeb64c 26518->26519 26803 7ff665ed7fc4 26519->26803 26525 7ff665eebe0d 26520->26525 26527 7ff665eebd8a 26522->26527 26524 7ff665eeb60e 27025 7ff665ee9d90 12 API calls _handle_error 26524->27025 26540 7ff665ec129c 33 API calls 26525->26540 26531 7ff665eec380 26526->26531 26533 7ff665ec1150 33 API calls 26527->26533 26541 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26531->26541 26536 7ff665eebda2 26533->26536 26535 7ff665eeb65e 26538 7ff665eeb674 26535->26538 26539 7ff665eeb665 GetLastError 26535->26539 26548 7ff665ec2034 33 API calls 26536->26548 26544 7ff665eeb71c 26538->26544 26547 7ff665eeb72b 26538->26547 26549 7ff665eeb68b GetTickCount 26538->26549 26539->26538 26545 7ff665eebe4e 26540->26545 26546 7ff665eec386 26541->26546 26543->26397 26544->26547 26563 7ff665eebb79 26544->26563 26556 7ff665ec1fa0 31 API calls 26545->26556 26550 7ff665ec255c 61 API calls 26546->26550 26551 7ff665eeba50 26547->26551 26559 7ff665ed6454 34 API calls 26547->26559 26552 7ff665eebdbe 26548->26552 26806 7ff665ec4228 26549->26806 26554 7ff665eec3e4 26550->26554 26551->26562 27034 7ff665ecbd0c 33 API calls 26551->27034 26560 7ff665ec1fa0 31 API calls 26552->26560 26557 7ff665eec3e8 26554->26557 26566 7ff665eec489 GetDlgItem SetFocus 26554->26566 26594 7ff665eec3fd 26554->26594 26565 7ff665eebe78 26556->26565 26573 7ff665ef2320 _handle_error 8 API calls 26557->26573 26568 7ff665eeb74e 26559->26568 26569 7ff665eebdcc 26560->26569 26562->26431 26579 7ff665edaae0 48 API calls 26563->26579 26564 7ff665eeba75 27035 7ff665ec1150 26564->27035 26572 7ff665ec1fa0 31 API calls 26565->26572 26577 7ff665eec4ba 26566->26577 27026 7ff665edb914 102 API calls 26568->27026 26576 7ff665ec1fa0 31 API calls 26569->26576 26581 7ff665eebe83 26572->26581 26582 7ff665eeca97 26573->26582 26576->26479 26591 7ff665ec129c 33 API calls 26577->26591 26578 7ff665eeb6ba 26584 7ff665ec1fa0 31 API calls 26578->26584 26586 7ff665eebba7 SetDlgItemTextW 26579->26586 26580 7ff665eeba8a 26587 7ff665edaae0 48 API calls 26580->26587 26588 7ff665ec1fa0 31 API calls 26581->26588 26583 7ff665eeb768 26590 7ff665edda98 48 API calls 26583->26590 26585 7ff665eeb6c8 26584->26585 26816 7ff665ed2134 26585->26816 26592 7ff665ec2534 26586->26592 26593 7ff665eeba97 26587->26593 26588->26431 26589 7ff665eec434 SendDlgItemMessageW 26595 7ff665eec454 26589->26595 26596 7ff665eec45d EndDialog 26589->26596 26597 7ff665eeb7aa GetCommandLineW 26590->26597 26598 7ff665eec4cc 26591->26598 26599 7ff665eebbc5 SetDlgItemTextW GetDlgItem 26592->26599 26600 7ff665ec1150 33 API calls 26593->26600 26594->26557 26594->26589 26595->26596 26596->26557 26601 7ff665eeb84f 26597->26601 26602 7ff665eeb869 26597->26602 27039 7ff665ed80d8 33 API calls 26598->27039 26605 7ff665eebc13 26599->26605 26606 7ff665eebbf0 GetWindowLongPtrW SetWindowLongPtrW 26599->26606 26607 7ff665eebaaa 26600->26607 26619 7ff665ec20b0 33 API calls 26601->26619 27027 7ff665eeab54 33 API calls _handle_error 26602->27027 26832 7ff665eece88 26605->26832 26606->26605 26612 7ff665ec1fa0 31 API calls 26607->26612 26608 7ff665eec4e0 26613 7ff665ec250c SetDlgItemTextW 26608->26613 26618 7ff665eebab5 26612->26618 26620 7ff665eec4f4 26613->26620 26614 7ff665eeb87a 27028 7ff665eeab54 33 API calls _handle_error 26614->27028 26615 7ff665eeb704 26622 7ff665ed204c 100 API calls 26615->26622 26616 7ff665eeb6f5 GetLastError 26616->26615 26624 7ff665ec1fa0 31 API calls 26618->26624 26619->26602 26629 7ff665eec526 SendDlgItemMessageW FindFirstFileW 26620->26629 26626 7ff665eeb711 26622->26626 26623 7ff665eece88 160 API calls 26627 7ff665eebc3c 26623->26627 26628 7ff665eebac3 26624->26628 26625 7ff665eeb88b 27029 7ff665eeab54 33 API calls _handle_error 26625->27029 26631 7ff665ec1fa0 31 API calls 26626->26631 26982 7ff665eef974 26627->26982 26640 7ff665edaae0 48 API calls 26628->26640 26633 7ff665eec57b 26629->26633 26724 7ff665eeca04 26629->26724 26631->26544 26641 7ff665edaae0 48 API calls 26633->26641 26634 7ff665eeb89c 27030 7ff665edb9b4 102 API calls 26634->27030 26637 7ff665eeb8b3 27031 7ff665eefbdc 33 API calls 26637->27031 26638 7ff665eeca81 26638->26557 26639 7ff665eece88 160 API calls 26654 7ff665eebc6a 26639->26654 26644 7ff665eebadb 26640->26644 26645 7ff665eec59e 26641->26645 26643 7ff665eecaa9 26647 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26643->26647 26655 7ff665ec129c 33 API calls 26644->26655 26656 7ff665ec129c 33 API calls 26645->26656 26646 7ff665eeb8d2 CreateFileMappingW 26649 7ff665eeb953 ShellExecuteExW 26646->26649 26650 7ff665eeb911 MapViewOfFile 26646->26650 26651 7ff665eecaae 26647->26651 26648 7ff665eebc96 26996 7ff665ec2298 GetDlgItem EnableWindow 26648->26996 26671 7ff665eeb974 26649->26671 27032 7ff665ef3640 26650->27032 26657 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26651->26657 26654->26648 26658 7ff665eece88 160 API calls 26654->26658 26666 7ff665eebb04 26655->26666 26659 7ff665eec5cd 26656->26659 26660 7ff665eecab4 26657->26660 26658->26648 26661 7ff665ec1150 33 API calls 26659->26661 26664 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26660->26664 26662 7ff665eec5e8 26661->26662 27040 7ff665ece164 33 API calls 2 library calls 26662->27040 26663 7ff665eeb9c3 26672 7ff665eeb9ef 26663->26672 26673 7ff665eeb9dc UnmapViewOfFile CloseHandle 26663->26673 26668 7ff665eecaba 26664->26668 26665 7ff665eebb5a 26669 7ff665ec1fa0 31 API calls 26665->26669 26666->26514 26666->26665 26675 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26668->26675 26669->26562 26670 7ff665eec5ff 26674 7ff665ec1fa0 31 API calls 26670->26674 26671->26663 26676 7ff665eeb9b1 Sleep 26671->26676 26672->26490 26680 7ff665eeba25 26672->26680 26673->26672 26678 7ff665eec60c 26674->26678 26679 7ff665eecac0 26675->26679 26676->26663 26676->26671 26677 7ff665ec1fa0 31 API calls 26681 7ff665eeba42 26677->26681 26678->26651 26682 7ff665ec1fa0 31 API calls 26678->26682 26683 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26679->26683 26680->26677 26684 7ff665ec1fa0 31 API calls 26681->26684 26685 7ff665eec673 26682->26685 26686 7ff665eecac6 26683->26686 26684->26551 26687 7ff665ec250c SetDlgItemTextW 26685->26687 26689 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26686->26689 26688 7ff665eec687 FindClose 26687->26688 26690 7ff665eec6a3 26688->26690 26691 7ff665eec797 SendDlgItemMessageW 26688->26691 26692 7ff665eecacc 26689->26692 27041 7ff665eea2cc 10 API calls _handle_error 26690->27041 26693 7ff665eec7cb 26691->26693 26696 7ff665edaae0 48 API calls 26693->26696 26695 7ff665eec6c6 26697 7ff665edaae0 48 API calls 26695->26697 26698 7ff665eec7d8 26696->26698 26699 7ff665eec6cf 26697->26699 26701 7ff665ec129c 33 API calls 26698->26701 26700 7ff665edda98 48 API calls 26699->26700 26704 7ff665eec6ec BuildCatchObjectHelperInternal 26700->26704 26703 7ff665eec807 26701->26703 26702 7ff665ec1fa0 31 API calls 26705 7ff665eec783 26702->26705 26706 7ff665ec1150 33 API calls 26703->26706 26704->26660 26704->26702 26707 7ff665ec250c SetDlgItemTextW 26705->26707 26708 7ff665eec822 26706->26708 26707->26691 27042 7ff665ece164 33 API calls 2 library calls 26708->27042 26710 7ff665eec839 26711 7ff665ec1fa0 31 API calls 26710->26711 26712 7ff665eec845 BuildCatchObjectHelperInternal 26711->26712 26713 7ff665ec1fa0 31 API calls 26712->26713 26714 7ff665eec87f 26713->26714 26715 7ff665ec1fa0 31 API calls 26714->26715 26716 7ff665eec88c 26715->26716 26716->26668 26717 7ff665ec1fa0 31 API calls 26716->26717 26718 7ff665eec8f3 26717->26718 26719 7ff665ec250c SetDlgItemTextW 26718->26719 26720 7ff665eec907 26719->26720 26720->26724 27043 7ff665eea2cc 10 API calls _handle_error 26720->27043 26722 7ff665eec932 26723 7ff665edaae0 48 API calls 26722->26723 26725 7ff665eec93c 26723->26725 26724->26557 26724->26638 26724->26643 26724->26686 26726 7ff665edda98 48 API calls 26725->26726 26728 7ff665eec959 BuildCatchObjectHelperInternal 26726->26728 26727 7ff665ec1fa0 31 API calls 26729 7ff665eec9f0 26727->26729 26728->26679 26728->26727 26730 7ff665ec250c SetDlgItemTextW 26729->26730 26730->26724 26732 7ff665ec25d0 26731->26732 26733 7ff665ec256a 26731->26733 26732->26390 26733->26732 27044 7ff665eda4ac 26733->27044 26735 7ff665ec258f 26735->26732 26736 7ff665ec25a4 GetDlgItem 26735->26736 26736->26732 26737 7ff665ec25b7 26736->26737 26737->26732 26738 7ff665ec25be SetWindowTextW 26737->26738 26738->26732 26740 7ff665ec2334 26739->26740 26741 7ff665ec22fc 26739->26741 27093 7ff665ec23f8 GetWindowTextLengthW 26740->27093 26743 7ff665ec129c 33 API calls 26741->26743 26744 7ff665ec232a BuildCatchObjectHelperInternal 26743->26744 26746 7ff665ec1fa0 31 API calls 26744->26746 26748 7ff665ec2389 26744->26748 26745 7ff665ec23c8 26747 7ff665ef2320 _handle_error 8 API calls 26745->26747 26746->26748 26749 7ff665ec23dd 26747->26749 26748->26745 26750 7ff665ec23f0 26748->26750 26749->26417 26749->26418 26749->26562 26751 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26750->26751 26752 7ff665ec23f5 26751->26752 26755 7ff665ec8d34 26753->26755 26761 7ff665ec8de8 26753->26761 26757 7ff665ec8de3 26755->26757 26758 7ff665ec8d91 26755->26758 26759 7ff665ec8d42 BuildCatchObjectHelperInternal 26755->26759 26760 7ff665ec1f80 Concurrency::cancel_current_task 33 API calls 26757->26760 26758->26759 26762 7ff665ef21d0 33 API calls 26758->26762 26759->26440 26760->26761 27105 7ff665ec2004 33 API calls std::_Xinvalid_argument 26761->27105 26762->26759 26767 7ff665eeefb0 26763->26767 26764 7ff665eeefd7 26765 7ff665ef2320 _handle_error 8 API calls 26764->26765 26766 7ff665eeb537 26765->26766 26766->26454 26767->26764 27106 7ff665ecbd0c 33 API calls 26767->27106 26769 7ff665eef02a 26770 7ff665ec1150 33 API calls 26769->26770 26771 7ff665eef03f 26770->26771 26772 7ff665ec1fa0 31 API calls 26771->26772 26774 7ff665eef04f BuildCatchObjectHelperInternal 26771->26774 26772->26774 26773 7ff665ec1fa0 31 API calls 26775 7ff665eef076 26773->26775 26774->26773 26776 7ff665ec1fa0 31 API calls 26775->26776 26776->26764 27107 7ff665eeae1c PeekMessageW 26777->27107 26780 7ff665eef0f5 26786 7ff665eef101 ShowWindow SendMessageW SendMessageW 26780->26786 26781 7ff665eef143 SendMessageW SendMessageW 26782 7ff665eef1a4 SendMessageW 26781->26782 26783 7ff665eef189 26781->26783 26784 7ff665eef1c3 26782->26784 26785 7ff665eef1c6 SendMessageW SendMessageW 26782->26785 26783->26782 26784->26785 26787 7ff665eef1f3 SendMessageW 26785->26787 26788 7ff665eef218 SendMessageW 26785->26788 26786->26781 26787->26788 26789 7ff665ef2320 _handle_error 8 API calls 26788->26789 26790 7ff665eeb578 26789->26790 26790->26494 26792 7ff665ed309d 26791->26792 26798 7ff665ed2f8e 26791->26798 26793 7ff665ef2320 _handle_error 8 API calls 26792->26793 26794 7ff665ed30b3 26793->26794 26794->26518 26794->26519 26795 7ff665ed3077 26795->26792 26796 7ff665ed3684 56 API calls 26795->26796 26796->26792 26797 7ff665ec129c 33 API calls 26797->26798 26798->26795 26798->26797 26800 7ff665ed30c8 26798->26800 27112 7ff665ed3684 26798->27112 26801 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26800->26801 26802 7ff665ed30cd 26801->26802 26804 7ff665ed7fd2 SetCurrentDirectoryW 26803->26804 26805 7ff665ed7fcf 26803->26805 26804->26535 26805->26804 26807 7ff665ec4255 26806->26807 26808 7ff665ec426a 26807->26808 26809 7ff665ec129c 33 API calls 26807->26809 26810 7ff665ef2320 _handle_error 8 API calls 26808->26810 26809->26808 26811 7ff665ec42a1 26810->26811 26812 7ff665ec3c84 26811->26812 26813 7ff665ec3cab 26812->26813 27146 7ff665ec710c 26813->27146 26815 7ff665ec3cbb BuildCatchObjectHelperInternal 26815->26578 26818 7ff665ed216a 26816->26818 26817 7ff665ed219e 26820 7ff665ed227f 26817->26820 26822 7ff665ed6a0c 49 API calls 26817->26822 26818->26817 26819 7ff665ed21b1 CreateFileW 26818->26819 26819->26817 26821 7ff665ed22af 26820->26821 26825 7ff665ec20b0 33 API calls 26820->26825 26823 7ff665ef2320 _handle_error 8 API calls 26821->26823 26824 7ff665ed2209 26822->26824 26826 7ff665ed22c4 26823->26826 26827 7ff665ed220d CreateFileW 26824->26827 26828 7ff665ed2246 26824->26828 26825->26821 26826->26615 26826->26616 26827->26828 26828->26820 26829 7ff665ed22d8 26828->26829 26830 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26829->26830 26831 7ff665ed22dd 26830->26831 27158 7ff665eeaa08 26832->27158 26834 7ff665eed1ee 26835 7ff665ec1fa0 31 API calls 26834->26835 26836 7ff665eed1f7 26835->26836 26838 7ff665ef2320 _handle_error 8 API calls 26836->26838 26837 7ff665edd22c 33 API calls 26879 7ff665eecf03 BuildCatchObjectHelperInternal 26837->26879 26839 7ff665eebc2b 26838->26839 26839->26623 26840 7ff665eeeefa 27281 7ff665ec704c 47 API calls BuildCatchObjectHelperInternal 26840->27281 26843 7ff665eeef00 27282 7ff665ec704c 47 API calls BuildCatchObjectHelperInternal 26843->27282 26845 7ff665eeef06 26849 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26845->26849 26847 7ff665eeeeee 26848 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26847->26848 26850 7ff665eeeef4 26848->26850 26852 7ff665eeef0c 26849->26852 27280 7ff665ec704c 47 API calls BuildCatchObjectHelperInternal 26850->27280 26854 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26852->26854 26856 7ff665eeef12 26854->26856 26855 7ff665eeee4a 26857 7ff665eeeed2 26855->26857 26858 7ff665ec20b0 33 API calls 26855->26858 26861 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26856->26861 26867 7ff665ec1f80 Concurrency::cancel_current_task 33 API calls 26857->26867 26863 7ff665eeee77 26858->26863 26859 7ff665eeeee8 27279 7ff665ec2004 33 API calls std::_Xinvalid_argument 26859->27279 26860 7ff665ec13a4 33 API calls 26864 7ff665eedc3a GetTempPathW 26860->26864 26866 7ff665eeef18 26861->26866 27278 7ff665eeabe8 33 API calls 3 library calls 26863->27278 26864->26879 26865 7ff665ed62dc 35 API calls 26865->26879 26870 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26866->26870 26867->26859 26874 7ff665eeef1e 26870->26874 26872 7ff665eeee8d 26881 7ff665ec1fa0 31 API calls 26872->26881 26884 7ff665eeeea4 BuildCatchObjectHelperInternal 26872->26884 26873 7ff665ec2520 SetWindowTextW 26873->26879 26882 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26874->26882 26875 7ff665ec8d04 33 API calls 26875->26879 26877 7ff665efbb8c 43 API calls 26877->26879 26878 7ff665ec1fa0 31 API calls 26878->26857 26879->26834 26879->26837 26879->26840 26879->26843 26879->26845 26879->26847 26879->26850 26879->26852 26879->26855 26879->26856 26879->26860 26879->26865 26879->26866 26879->26873 26879->26874 26879->26875 26879->26877 26880 7ff665eee7f3 26879->26880 26887 7ff665eeef24 26879->26887 26888 7ff665eeaa08 33 API calls 26879->26888 26895 7ff665eeef2a 26879->26895 26903 7ff665ec2674 31 API calls 26879->26903 26907 7ff665ece164 33 API calls 26879->26907 26909 7ff665ed3d34 51 API calls 26879->26909 26910 7ff665eeef30 26879->26910 26915 7ff665eddc2c 33 API calls 26879->26915 26917 7ff665ee99c8 31 API calls 26879->26917 26930 7ff665eeef36 26879->26930 26932 7ff665ed5b60 53 API calls 26879->26932 26933 7ff665ed5aa8 33 API calls 26879->26933 26935 7ff665eed63c SendMessageW 26879->26935 26937 7ff665ed3f30 54 API calls 26879->26937 26938 7ff665eeef3c 26879->26938 26946 7ff665eeef42 26879->26946 26950 7ff665ec4228 33 API calls 26879->26950 26951 7ff665ec1744 33 API calls 26879->26951 26953 7ff665ed5820 33 API calls 26879->26953 26954 7ff665ed32a8 51 API calls 26879->26954 26957 7ff665ec250c SetDlgItemTextW 26879->26957 26960 7ff665ed7df4 47 API calls 26879->26960 26961 7ff665ec1150 33 API calls 26879->26961 26965 7ff665ec2034 33 API calls 26879->26965 26968 7ff665ec129c 33 API calls 26879->26968 26970 7ff665eedf99 EndDialog 26879->26970 26972 7ff665ed32bc 51 API calls 26879->26972 26974 7ff665eedb21 MoveFileW 26879->26974 26978 7ff665ed2f58 56 API calls 26879->26978 26979 7ff665ec1fa0 31 API calls 26879->26979 26980 7ff665ec20b0 33 API calls 26879->26980 27162 7ff665ee13c4 CompareStringW 26879->27162 27163 7ff665eea440 26879->27163 27239 7ff665edcfa4 35 API calls _invalid_parameter_noinfo_noreturn 26879->27239 27240 7ff665ee95b4 33 API calls Concurrency::cancel_current_task 26879->27240 27241 7ff665ef0684 31 API calls _invalid_parameter_noinfo_noreturn 26879->27241 27242 7ff665ecdf4c 47 API calls BuildCatchObjectHelperInternal 26879->27242 27243 7ff665eea834 33 API calls _invalid_parameter_noinfo_noreturn 26879->27243 27244 7ff665ee9518 33 API calls 26879->27244 27245 7ff665eeabe8 33 API calls 3 library calls 26879->27245 27246 7ff665ed7368 33 API calls 2 library calls 26879->27246 27247 7ff665ed4088 33 API calls 26879->27247 27248 7ff665ed65b0 33 API calls 3 library calls 26879->27248 27249 7ff665ed72cc 26879->27249 27253 7ff665ed31bc 26879->27253 27267 7ff665ed3ea0 FindClose 26879->27267 27268 7ff665ee13f4 CompareStringW 26879->27268 27269 7ff665ee9cd0 47 API calls 26879->27269 27270 7ff665ee87d8 51 API calls 3 library calls 26879->27270 27271 7ff665eeab54 33 API calls _handle_error 26879->27271 27272 7ff665ed5b08 CompareStringW 26879->27272 27273 7ff665ed7eb0 47 API calls 26879->27273 26880->26857 26880->26859 26883 7ff665ef21d0 33 API calls 26880->26883 26892 7ff665eee83b BuildCatchObjectHelperInternal 26880->26892 26881->26884 26882->26887 26883->26892 26884->26878 26885 7ff665eeed40 26899 7ff665eeef72 26885->26899 26913 7ff665eeef78 26885->26913 26923 7ff665eeed3b BuildCatchObjectHelperInternal 26885->26923 26925 7ff665ef21d0 33 API calls 26885->26925 26891 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26887->26891 26888->26879 26889 7ff665eeec72 BuildCatchObjectHelperInternal 27201 7ff665eef4e0 26889->27201 26890 7ff665eeec2a 26890->26889 26908 7ff665eeef6c 26890->26908 26920 7ff665ef21d0 33 API calls 26890->26920 26890->26923 26924 7ff665eeef66 26890->26924 26891->26895 26897 7ff665ec20b0 33 API calls 26892->26897 26945 7ff665eeeb8f 26892->26945 26894 7ff665ec1fa0 31 API calls 26894->26855 26902 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26895->26902 26904 7ff665eee963 26897->26904 26905 7ff665ec1f80 Concurrency::cancel_current_task 33 API calls 26899->26905 26901 7ff665ec1f80 Concurrency::cancel_current_task 33 API calls 26901->26908 26902->26910 26903->26879 26911 7ff665eeef60 26904->26911 26919 7ff665ec129c 33 API calls 26904->26919 26905->26913 26907->26879 27284 7ff665ec2004 33 API calls std::_Xinvalid_argument 26908->27284 26909->26879 26926 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26910->26926 27283 7ff665ec704c 47 API calls BuildCatchObjectHelperInternal 26911->27283 27285 7ff665ec2004 33 API calls std::_Xinvalid_argument 26913->27285 26914 7ff665eed5e9 GetDlgItem 26921 7ff665ec2520 SetWindowTextW 26914->26921 26915->26879 26917->26879 26927 7ff665eee9a6 26919->26927 26920->26889 26928 7ff665eed608 SendMessageW 26921->26928 26923->26894 26924->26901 26925->26923 26926->26930 27274 7ff665edd22c 26927->27274 26928->26879 26934 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26930->26934 26932->26879 26933->26879 26934->26938 26935->26879 26937->26879 26941 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26938->26941 26941->26946 26943 7ff665ec129c 33 API calls 26969 7ff665eee9d1 26943->26969 26944 7ff665eeef54 26948 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26944->26948 26945->26885 26945->26890 26945->26944 26947 7ff665eeef5a 26945->26947 26952 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26946->26952 26949 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26947->26949 26948->26947 26949->26911 26950->26879 26951->26879 26955 7ff665eeef48 26952->26955 26953->26879 26954->26879 26956 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26955->26956 26958 7ff665eeef4e 26956->26958 26957->26879 26962 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26958->26962 26960->26879 26961->26879 26962->26944 26964 7ff665ec1fa0 31 API calls 26964->26969 26965->26879 26967 7ff665ee13c4 CompareStringW 26967->26969 26968->26879 26969->26943 26969->26945 26969->26955 26969->26958 26969->26964 26969->26967 26973 7ff665edd22c 33 API calls 26969->26973 26970->26879 26972->26879 26973->26969 26975 7ff665eedb55 MoveFileExW 26974->26975 26976 7ff665eedb70 26974->26976 26975->26976 26976->26879 26977 7ff665ec1fa0 31 API calls 26976->26977 26977->26976 26978->26879 26979->26879 26980->26879 26983 7ff665eef9a3 26982->26983 26984 7ff665ec20b0 33 API calls 26983->26984 26986 7ff665eef9b9 26984->26986 26985 7ff665eef9ee 27297 7ff665ece34c 26985->27297 26986->26985 26987 7ff665ec20b0 33 API calls 26986->26987 26987->26985 26989 7ff665eefa4b 27317 7ff665ece7a8 26989->27317 26993 7ff665eefa61 26994 7ff665ef2320 _handle_error 8 API calls 26993->26994 26995 7ff665eebc52 26994->26995 26995->26639 26998 7ff665ee849c 4 API calls 26997->26998 26999 7ff665eef3bf 26998->26999 27000 7ff665eef4b7 26999->27000 27001 7ff665eef3c7 GetWindow 26999->27001 27002 7ff665ef2320 _handle_error 8 API calls 27000->27002 27006 7ff665eef3e2 27001->27006 27003 7ff665eebe9b 27002->27003 27003->26398 27003->26399 27004 7ff665eef3ee GetClassNameW 28335 7ff665ee13c4 CompareStringW 27004->28335 27006->27000 27006->27004 27007 7ff665eef496 GetWindow 27006->27007 27008 7ff665eef417 GetWindowLongPtrW 27006->27008 27007->27000 27007->27006 27008->27007 27009 7ff665eef429 SendMessageW 27008->27009 27009->27007 27010 7ff665eef445 GetObjectW 27009->27010 28336 7ff665ee8504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 27010->28336 27012 7ff665eef461 27013 7ff665ee84cc 4 API calls 27012->27013 28337 7ff665ee8df4 16 API calls _handle_error 27012->28337 27013->27012 27015 7ff665eef479 SendMessageW DeleteObject 27015->27007 27017 7ff665ec2527 27016->27017 27018 7ff665ec252a SetWindowTextW 27016->27018 27017->27018 27019 7ff665f2e2e0 27018->27019 27020->26422 27021->26487 27023 7ff665ed32bc 51 API calls 27022->27023 27024 7ff665ed32b1 27023->27024 27024->26500 27024->26524 27025->26500 27026->26583 27027->26614 27028->26625 27029->26634 27030->26637 27031->26646 27033 7ff665ef3620 27032->27033 27033->26649 27034->26564 27036 7ff665ec1177 27035->27036 27037 7ff665ec2034 33 API calls 27036->27037 27038 7ff665ec1185 BuildCatchObjectHelperInternal 27037->27038 27038->26580 27039->26608 27040->26670 27041->26695 27042->26710 27043->26722 27045 7ff665ed3e28 swprintf 46 API calls 27044->27045 27046 7ff665eda509 27045->27046 27047 7ff665ee0f68 WideCharToMultiByte 27046->27047 27048 7ff665eda519 27047->27048 27049 7ff665eda589 27048->27049 27063 7ff665ed9800 31 API calls 27048->27063 27066 7ff665eda56a SetDlgItemTextW 27048->27066 27069 7ff665ed9408 27049->27069 27052 7ff665eda603 27055 7ff665eda6c2 27052->27055 27056 7ff665eda60c GetWindowLongPtrW 27052->27056 27053 7ff665eda6f2 GetSystemMetrics GetWindow 27054 7ff665eda821 27053->27054 27067 7ff665eda71d 27053->27067 27059 7ff665ef2320 _handle_error 8 API calls 27054->27059 27084 7ff665ed95a8 27055->27084 27057 7ff665f2e2c0 27056->27057 27061 7ff665eda6aa GetWindowRect 27057->27061 27060 7ff665eda830 27059->27060 27060->26735 27061->27055 27063->27048 27064 7ff665eda6e5 SetWindowTextW 27064->27053 27065 7ff665eda73e GetWindowRect 27065->27067 27066->27048 27067->27054 27067->27065 27068 7ff665eda800 GetWindow 27067->27068 27068->27054 27068->27067 27070 7ff665ed95a8 47 API calls 27069->27070 27074 7ff665ed944f 27070->27074 27071 7ff665ed955a 27072 7ff665ef2320 _handle_error 8 API calls 27071->27072 27073 7ff665ed958e GetWindowRect GetClientRect 27072->27073 27073->27052 27073->27053 27074->27071 27075 7ff665ec129c 33 API calls 27074->27075 27076 7ff665ed949c 27075->27076 27077 7ff665ed95a1 27076->27077 27078 7ff665ec129c 33 API calls 27076->27078 27079 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27077->27079 27081 7ff665ed9514 27078->27081 27080 7ff665ed95a7 27079->27080 27081->27071 27082 7ff665ed959c 27081->27082 27083 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27082->27083 27083->27077 27085 7ff665ed3e28 swprintf 46 API calls 27084->27085 27086 7ff665ed95eb 27085->27086 27087 7ff665ee0f68 WideCharToMultiByte 27086->27087 27088 7ff665ed9603 27087->27088 27089 7ff665ed9800 31 API calls 27088->27089 27090 7ff665ed961b 27089->27090 27091 7ff665ef2320 _handle_error 8 API calls 27090->27091 27092 7ff665ed962b 27091->27092 27092->27053 27092->27064 27094 7ff665ec13a4 33 API calls 27093->27094 27095 7ff665ec2462 GetWindowTextW 27094->27095 27096 7ff665ec2494 27095->27096 27097 7ff665ec129c 33 API calls 27096->27097 27098 7ff665ec24a2 27097->27098 27099 7ff665ec24dd 27098->27099 27101 7ff665ec2505 27098->27101 27100 7ff665ef2320 _handle_error 8 API calls 27099->27100 27102 7ff665ec24f3 27100->27102 27103 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27101->27103 27102->26744 27104 7ff665ec250a 27103->27104 27106->26769 27108 7ff665eeae80 GetDlgItem 27107->27108 27109 7ff665eeae3c GetMessageW 27107->27109 27108->26780 27108->26781 27110 7ff665eeae6a TranslateMessage DispatchMessageW 27109->27110 27111 7ff665eeae5b IsDialogMessageW 27109->27111 27110->27108 27111->27108 27111->27110 27114 7ff665ed36b3 27112->27114 27113 7ff665ed36e0 27116 7ff665ed32bc 51 API calls 27113->27116 27114->27113 27115 7ff665ed36cc CreateDirectoryW 27114->27115 27115->27113 27117 7ff665ed377d 27115->27117 27118 7ff665ed36ee 27116->27118 27122 7ff665ed378d 27117->27122 27132 7ff665ed3d34 27117->27132 27119 7ff665ed3791 GetLastError 27118->27119 27120 7ff665ed6a0c 49 API calls 27118->27120 27119->27122 27123 7ff665ed371c 27120->27123 27124 7ff665ef2320 _handle_error 8 API calls 27122->27124 27125 7ff665ed3720 CreateDirectoryW 27123->27125 27126 7ff665ed373b 27123->27126 27127 7ff665ed37b9 27124->27127 27125->27126 27128 7ff665ed3774 27126->27128 27129 7ff665ed37ce 27126->27129 27127->26798 27128->27117 27128->27119 27130 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27129->27130 27131 7ff665ed37d3 27130->27131 27133 7ff665ed3d5e SetFileAttributesW 27132->27133 27134 7ff665ed3d5b 27132->27134 27135 7ff665ed3d74 27133->27135 27136 7ff665ed3df5 27133->27136 27134->27133 27138 7ff665ed6a0c 49 API calls 27135->27138 27137 7ff665ef2320 _handle_error 8 API calls 27136->27137 27139 7ff665ed3e0a 27137->27139 27140 7ff665ed3d99 27138->27140 27139->27122 27141 7ff665ed3dbc 27140->27141 27142 7ff665ed3d9d SetFileAttributesW 27140->27142 27141->27136 27143 7ff665ed3e1a 27141->27143 27142->27141 27144 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27143->27144 27145 7ff665ed3e1f 27144->27145 27147 7ff665ec7206 27146->27147 27148 7ff665ec713b 27146->27148 27156 7ff665ec704c 47 API calls BuildCatchObjectHelperInternal 27147->27156 27154 7ff665ec714b BuildCatchObjectHelperInternal 27148->27154 27155 7ff665ec3f48 33 API calls 2 library calls 27148->27155 27151 7ff665ec720b 27152 7ff665ec7273 27151->27152 27157 7ff665ec889c 8 API calls BuildCatchObjectHelperInternal 27151->27157 27152->26815 27154->26815 27155->27154 27156->27151 27157->27151 27159 7ff665eeaa2f 27158->27159 27160 7ff665eeaa36 27158->27160 27159->26879 27160->27159 27161 7ff665ec1744 33 API calls 27160->27161 27161->27160 27162->26879 27164 7ff665eea47f 27163->27164 27186 7ff665eea706 27163->27186 27286 7ff665eecdf8 33 API calls 27164->27286 27166 7ff665ef2320 _handle_error 8 API calls 27167 7ff665eea717 27166->27167 27167->26914 27168 7ff665eea49e 27169 7ff665ec129c 33 API calls 27168->27169 27170 7ff665eea4de 27169->27170 27171 7ff665ec129c 33 API calls 27170->27171 27172 7ff665eea517 27171->27172 27173 7ff665ec129c 33 API calls 27172->27173 27174 7ff665eea54a 27173->27174 27287 7ff665eea834 33 API calls _invalid_parameter_noinfo_noreturn 27174->27287 27176 7ff665eea734 27177 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27176->27177 27178 7ff665eea73a 27177->27178 27180 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27178->27180 27179 7ff665eea573 27179->27176 27179->27178 27181 7ff665eea740 27179->27181 27182 7ff665ec20b0 33 API calls 27179->27182 27185 7ff665eea685 27179->27185 27180->27181 27183 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27181->27183 27182->27185 27184 7ff665eea746 27183->27184 27188 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27184->27188 27185->27184 27185->27186 27187 7ff665eea72f 27185->27187 27186->27166 27189 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27187->27189 27190 7ff665eea74c 27188->27190 27189->27176 27191 7ff665ec255c 61 API calls 27190->27191 27192 7ff665eea795 27191->27192 27193 7ff665eea7b1 27192->27193 27194 7ff665eea801 SetDlgItemTextW 27192->27194 27198 7ff665eea7a1 27192->27198 27195 7ff665ef2320 _handle_error 8 API calls 27193->27195 27194->27193 27196 7ff665eea827 27195->27196 27196->26914 27197 7ff665eea7ad 27197->27193 27199 7ff665eea7b7 EndDialog 27197->27199 27198->27193 27198->27197 27288 7ff665edbb00 102 API calls 27198->27288 27199->27193 27206 7ff665eef529 __scrt_get_show_window_mode 27201->27206 27220 7ff665eef87d 27201->27220 27202 7ff665ec1fa0 31 API calls 27203 7ff665eef89c 27202->27203 27204 7ff665ef2320 _handle_error 8 API calls 27203->27204 27205 7ff665eef8a8 27204->27205 27205->26923 27207 7ff665eef684 27206->27207 27289 7ff665ee13c4 CompareStringW 27206->27289 27209 7ff665ec129c 33 API calls 27207->27209 27210 7ff665eef6c0 27209->27210 27211 7ff665ed32a8 51 API calls 27210->27211 27212 7ff665eef6ca 27211->27212 27213 7ff665ec1fa0 31 API calls 27212->27213 27216 7ff665eef6d5 27213->27216 27214 7ff665eef742 ShellExecuteExW 27215 7ff665eef846 27214->27215 27222 7ff665eef755 27214->27222 27219 7ff665eef8fb 27215->27219 27215->27220 27216->27214 27218 7ff665ec129c 33 API calls 27216->27218 27217 7ff665eef78e 27291 7ff665eefe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 27217->27291 27223 7ff665eef717 27218->27223 27224 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27219->27224 27220->27202 27221 7ff665eef7e3 CloseHandle 27225 7ff665eef801 27221->27225 27226 7ff665eef7f2 27221->27226 27222->27217 27222->27221 27231 7ff665eef781 ShowWindow 27222->27231 27290 7ff665ed5b60 53 API calls 2 library calls 27223->27290 27229 7ff665eef900 27224->27229 27225->27215 27236 7ff665eef837 ShowWindow 27225->27236 27292 7ff665ee13c4 CompareStringW 27226->27292 27228 7ff665eef725 27234 7ff665ec1fa0 31 API calls 27228->27234 27231->27217 27233 7ff665eef7a6 27233->27221 27237 7ff665eef7b4 GetExitCodeProcess 27233->27237 27235 7ff665eef72f 27234->27235 27235->27214 27236->27215 27237->27221 27238 7ff665eef7c7 27237->27238 27238->27221 27239->26879 27240->26879 27241->26879 27242->26879 27243->26879 27244->26879 27245->26879 27246->26879 27247->26879 27248->26879 27250 7ff665ed72ea 27249->27250 27293 7ff665ecb3a8 27250->27293 27254 7ff665ed31e4 27253->27254 27255 7ff665ed31e7 DeleteFileW 27253->27255 27254->27255 27256 7ff665ed31fd 27255->27256 27264 7ff665ed327c 27255->27264 27258 7ff665ed6a0c 49 API calls 27256->27258 27257 7ff665ef2320 _handle_error 8 API calls 27259 7ff665ed3291 27257->27259 27260 7ff665ed3222 27258->27260 27259->26879 27261 7ff665ed3226 DeleteFileW 27260->27261 27262 7ff665ed3243 27260->27262 27261->27262 27263 7ff665ed32a1 27262->27263 27262->27264 27265 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27263->27265 27264->27257 27266 7ff665ed32a6 27265->27266 27268->26879 27269->26879 27270->26879 27271->26879 27272->26879 27273->26879 27276 7ff665edd25e 27274->27276 27275 7ff665edd292 27275->26969 27276->27275 27277 7ff665ec1744 33 API calls 27276->27277 27277->27276 27278->26872 27280->26840 27281->26843 27282->26845 27283->26924 27286->27168 27287->27179 27288->27197 27289->27207 27290->27228 27291->27233 27292->27225 27296 7ff665ecb3f2 __scrt_get_show_window_mode 27293->27296 27294 7ff665ef2320 _handle_error 8 API calls 27295 7ff665ecb4b6 27294->27295 27295->26879 27296->27294 27353 7ff665ed86ec 27297->27353 27299 7ff665ece3c4 27363 7ff665ece600 27299->27363 27301 7ff665ece4d4 27304 7ff665ef21d0 33 API calls 27301->27304 27302 7ff665ece549 27305 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27302->27305 27303 7ff665ece454 27303->27301 27303->27302 27306 7ff665ece4f0 27304->27306 27307 7ff665ece54e 27305->27307 27369 7ff665ee3148 102 API calls 27306->27369 27312 7ff665ed18c2 27307->27312 27313 7ff665ed190d 27307->27313 27314 7ff665ec1fa0 31 API calls 27307->27314 27309 7ff665ece51d 27310 7ff665ef2320 _handle_error 8 API calls 27309->27310 27311 7ff665ece52d 27310->27311 27311->26989 27312->27313 27315 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27312->27315 27313->26989 27314->27307 27316 7ff665ed193b 27315->27316 27318 7ff665ece7ea 27317->27318 27319 7ff665ece8a1 27318->27319 27320 7ff665ece864 27318->27320 27382 7ff665ed3ec8 27318->27382 27329 7ff665ece900 27319->27329 27389 7ff665ecf578 27319->27389 27320->27319 27322 7ff665ece993 27320->27322 27323 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27322->27323 27327 7ff665ece998 27323->27327 27324 7ff665ece955 27326 7ff665ef2320 _handle_error 8 API calls 27324->27326 27328 7ff665ece97e 27326->27328 27331 7ff665ece578 27328->27331 27329->27324 27425 7ff665ec28a4 82 API calls 2 library calls 27329->27425 28321 7ff665ed15d8 27331->28321 27334 7ff665ece59e 27336 7ff665ec1fa0 31 API calls 27334->27336 27335 7ff665ee1870 108 API calls 27335->27334 27337 7ff665ece5b7 27336->27337 27338 7ff665ec1fa0 31 API calls 27337->27338 27339 7ff665ece5c3 27338->27339 27340 7ff665ec1fa0 31 API calls 27339->27340 27341 7ff665ece5cf 27340->27341 27342 7ff665ed878c 108 API calls 27341->27342 27343 7ff665ece5db 27342->27343 27344 7ff665ec1fa0 31 API calls 27343->27344 27345 7ff665ece5e4 27344->27345 27346 7ff665ec1fa0 31 API calls 27345->27346 27350 7ff665ece5ed 27346->27350 27347 7ff665ed18c2 27348 7ff665ed190d 27347->27348 27351 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27347->27351 27348->26993 27349 7ff665ec1fa0 31 API calls 27349->27350 27350->27347 27350->27348 27350->27349 27352 7ff665ed193b 27351->27352 27354 7ff665ed870a 27353->27354 27355 7ff665ef21d0 33 API calls 27354->27355 27356 7ff665ed872f 27355->27356 27357 7ff665ed8743 27356->27357 27370 7ff665ec9f1c 27356->27370 27359 7ff665ef21d0 33 API calls 27357->27359 27360 7ff665ed8759 27359->27360 27361 7ff665ed876b 27360->27361 27362 7ff665ec9f1c 33 API calls 27360->27362 27361->27299 27362->27361 27364 7ff665ece627 27363->27364 27366 7ff665ece62c BuildCatchObjectHelperInternal 27363->27366 27365 7ff665ec1fa0 31 API calls 27364->27365 27365->27366 27367 7ff665ec1fa0 31 API calls 27366->27367 27368 7ff665ece668 BuildCatchObjectHelperInternal 27366->27368 27367->27368 27368->27303 27369->27309 27375 7ff665ef24a0 27370->27375 27373 7ff665ef24a0 33 API calls 27374 7ff665ec9f75 __scrt_get_show_window_mode 27373->27374 27374->27357 27376 7ff665ef24d1 27375->27376 27377 7ff665ec9f4a 27376->27377 27379 7ff665ec9fb0 27376->27379 27377->27373 27380 7ff665edb788 33 API calls 27379->27380 27381 7ff665ec9fc2 27380->27381 27381->27376 27383 7ff665ed72cc 8 API calls 27382->27383 27384 7ff665ed3ee1 27383->27384 27385 7ff665ed3f0f 27384->27385 27426 7ff665ed40bc 27384->27426 27385->27318 27388 7ff665ed3efa FindClose 27388->27385 27390 7ff665ecf598 _snwprintf 27389->27390 27452 7ff665ec2950 27390->27452 27393 7ff665ecf5cc 27398 7ff665ecf5fc 27393->27398 27469 7ff665ec33e4 27393->27469 27396 7ff665ecf5f8 27396->27398 27501 7ff665ec3ad8 27396->27501 27704 7ff665ec2c54 27398->27704 27404 7ff665ecf7cb 27511 7ff665ecf8a4 27404->27511 27405 7ff665ec8d04 33 API calls 27407 7ff665ecf662 27405->27407 27724 7ff665ed7918 48 API calls 2 library calls 27407->27724 27409 7ff665ecf677 27410 7ff665ed3ec8 55 API calls 27409->27410 27415 7ff665ecf6ad 27410->27415 27411 7ff665ecf842 27411->27398 27516 7ff665ec69f8 27411->27516 27527 7ff665ecf930 27411->27527 27418 7ff665ecf89a 27415->27418 27419 7ff665ecf74d 27415->27419 27420 7ff665ed3ec8 55 API calls 27415->27420 27725 7ff665ed7918 48 API calls 2 library calls 27415->27725 27421 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27418->27421 27419->27404 27419->27418 27422 7ff665ecf895 27419->27422 27420->27415 27424 7ff665ecf8a0 27421->27424 27423 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27422->27423 27423->27418 27425->27324 27427 7ff665ed41d2 FindNextFileW 27426->27427 27428 7ff665ed40f9 FindFirstFileW 27426->27428 27430 7ff665ed41f3 27427->27430 27431 7ff665ed41e1 GetLastError 27427->27431 27428->27430 27432 7ff665ed411e 27428->27432 27433 7ff665ed4211 27430->27433 27436 7ff665ec20b0 33 API calls 27430->27436 27450 7ff665ed41c0 27431->27450 27434 7ff665ed6a0c 49 API calls 27432->27434 27441 7ff665ec129c 33 API calls 27433->27441 27435 7ff665ed4144 27434->27435 27438 7ff665ed4167 27435->27438 27439 7ff665ed4148 FindFirstFileW 27435->27439 27436->27433 27437 7ff665ef2320 _handle_error 8 API calls 27440 7ff665ed3ef4 27437->27440 27438->27430 27443 7ff665ed41af GetLastError 27438->27443 27446 7ff665ed4314 27438->27446 27439->27438 27440->27385 27440->27388 27442 7ff665ed423b 27441->27442 27444 7ff665ed8090 47 API calls 27442->27444 27443->27450 27445 7ff665ed4249 27444->27445 27449 7ff665ed430f 27445->27449 27445->27450 27447 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27446->27447 27448 7ff665ed431a 27447->27448 27451 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27449->27451 27450->27437 27451->27446 27453 7ff665ec296c 27452->27453 27454 7ff665ec9f1c 33 API calls 27453->27454 27455 7ff665ec2980 27454->27455 27456 7ff665ed86ec 33 API calls 27455->27456 27457 7ff665ec298d 27456->27457 27458 7ff665ec2ac2 27457->27458 27459 7ff665ef21d0 33 API calls 27457->27459 27727 7ff665ed4d04 27458->27727 27461 7ff665ec2ab0 27459->27461 27461->27458 27463 7ff665ec91c8 35 API calls 27461->27463 27463->27458 27464 7ff665ed2ca8 27468 7ff665ed24c0 54 API calls 27464->27468 27465 7ff665ed2cc1 27466 7ff665ed2cc5 27465->27466 27741 7ff665ecb7e8 99 API calls 2 library calls 27465->27741 27466->27393 27468->27465 27495 7ff665ed28d0 104 API calls 27469->27495 27470 7ff665ec3674 27742 7ff665ec28a4 82 API calls 2 library calls 27470->27742 27471 7ff665ec3431 __scrt_get_show_window_mode 27478 7ff665ec344e 27471->27478 27481 7ff665ec3601 27471->27481 27492 7ff665ed2bb0 101 API calls 27471->27492 27473 7ff665ec69f8 132 API calls 27475 7ff665ec3682 27473->27475 27474 7ff665ec34cc 27496 7ff665ed28d0 104 API calls 27474->27496 27475->27473 27476 7ff665ec370c 27475->27476 27475->27481 27497 7ff665ed2aa0 101 API calls 27475->27497 27480 7ff665ec3740 27476->27480 27476->27481 27743 7ff665ec28a4 82 API calls 2 library calls 27476->27743 27478->27470 27478->27475 27479 7ff665ec35cb 27479->27478 27482 7ff665ec35d7 27479->27482 27480->27481 27485 7ff665ec384d 27480->27485 27498 7ff665ed2bb0 101 API calls 27480->27498 27481->27396 27482->27481 27483 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27482->27483 27486 7ff665ec3891 27483->27486 27484 7ff665ec34eb 27484->27479 27494 7ff665ed2aa0 101 API calls 27484->27494 27485->27481 27487 7ff665ec20b0 33 API calls 27485->27487 27486->27396 27487->27481 27488 7ff665ec69f8 132 API calls 27490 7ff665ec378e 27488->27490 27489 7ff665ec35a7 27489->27479 27499 7ff665ed28d0 104 API calls 27489->27499 27490->27488 27491 7ff665ec3803 27490->27491 27500 7ff665ed2aa0 101 API calls 27490->27500 27493 7ff665ed2aa0 101 API calls 27491->27493 27492->27474 27493->27485 27494->27489 27495->27471 27496->27484 27497->27475 27498->27490 27499->27479 27500->27490 27502 7ff665ec3af9 27501->27502 27503 7ff665ec3b55 27501->27503 27744 7ff665ec3378 27502->27744 27504 7ff665ef2320 _handle_error 8 API calls 27503->27504 27506 7ff665ec3b67 27504->27506 27506->27404 27506->27405 27508 7ff665ec3b6c 27509 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27508->27509 27510 7ff665ec3b71 27509->27510 27976 7ff665ed886c 27511->27976 27513 7ff665ecf8ba 27980 7ff665edef60 GetSystemTime SystemTimeToFileTime 27513->27980 27517 7ff665ec6a0e 27516->27517 27521 7ff665ec6a0a 27516->27521 27526 7ff665ed2bb0 101 API calls 27517->27526 27518 7ff665ec6a1b 27519 7ff665ec6a2f 27518->27519 27520 7ff665ec6a3e 27518->27520 27519->27521 27989 7ff665ec5e24 27519->27989 28051 7ff665ec5130 130 API calls 2 library calls 27520->28051 27521->27411 27524 7ff665ec6a3c 27524->27521 28052 7ff665ec466c 82 API calls 27524->28052 27526->27518 27528 7ff665ecf978 27527->27528 27531 7ff665ecf9b0 27528->27531 27585 7ff665ecfa34 27528->27585 28166 7ff665ee612c 137 API calls 3 library calls 27528->28166 27530 7ff665ed1189 27532 7ff665ed118e 27530->27532 27533 7ff665ed11e1 27530->27533 27531->27530 27538 7ff665ecf9d0 27531->27538 27531->27585 27532->27585 28214 7ff665ecdd08 179 API calls 27532->28214 27533->27585 28215 7ff665ee612c 137 API calls 3 library calls 27533->28215 27534 7ff665ef2320 _handle_error 8 API calls 27535 7ff665ed11c4 27534->27535 27535->27411 27538->27585 28081 7ff665ec9bb0 27538->28081 27540 7ff665ecfad6 28094 7ff665ed5ef8 27540->28094 27543 7ff665ecfb7a 27545 7ff665ecfb5e 27545->27543 27585->27534 27705 7ff665ec2c74 27704->27705 27709 7ff665ec2c88 27704->27709 27705->27709 28300 7ff665ec2d80 108 API calls _invalid_parameter_noinfo_noreturn 27705->28300 27706 7ff665ec1fa0 31 API calls 27711 7ff665ec2ca1 27706->27711 27709->27706 27710 7ff665ec2d64 27713 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27710->27713 27711->27710 28301 7ff665ec3090 31 API calls _invalid_parameter_noinfo_noreturn 27711->28301 27712 7ff665ec2d08 28302 7ff665ec3090 31 API calls _invalid_parameter_noinfo_noreturn 27712->28302 27715 7ff665ec2d7c 27713->27715 27716 7ff665ec2d14 27717 7ff665ec1fa0 31 API calls 27716->27717 27718 7ff665ec2d20 27717->27718 28303 7ff665ed878c 27718->28303 27724->27409 27725->27415 27726 7ff665ee0994 83 API calls _handle_error 27726->27411 27728 7ff665ed4d32 __scrt_get_show_window_mode 27727->27728 27737 7ff665ed4bac 27728->27737 27730 7ff665ed4d54 27731 7ff665ed4d90 27730->27731 27733 7ff665ed4dae 27730->27733 27732 7ff665ef2320 _handle_error 8 API calls 27731->27732 27734 7ff665ec2b32 27732->27734 27735 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27733->27735 27734->27393 27734->27464 27736 7ff665ed4db3 27735->27736 27738 7ff665ed4c27 27737->27738 27740 7ff665ed4c2f BuildCatchObjectHelperInternal 27737->27740 27739 7ff665ec1fa0 31 API calls 27738->27739 27739->27740 27740->27730 27741->27466 27742->27481 27743->27480 27745 7ff665ec3396 27744->27745 27746 7ff665ec339a 27744->27746 27745->27503 27745->27508 27750 7ff665ec3294 27746->27750 27749 7ff665ed2aa0 101 API calls 27749->27745 27751 7ff665ec32f6 27750->27751 27752 7ff665ec32bb 27750->27752 27758 7ff665ec6e74 27751->27758 27753 7ff665ec69f8 132 API calls 27752->27753 27756 7ff665ec32db 27753->27756 27756->27749 27762 7ff665ec6e95 27758->27762 27759 7ff665ec69f8 132 API calls 27759->27762 27760 7ff665ec331d 27760->27756 27763 7ff665ec3904 27760->27763 27762->27759 27762->27760 27790 7ff665ede808 27762->27790 27798 7ff665ec6a7c 27763->27798 27766 7ff665ec396a 27769 7ff665ec3989 27766->27769 27770 7ff665ec399a 27766->27770 27767 7ff665ec3a8a 27771 7ff665ef2320 _handle_error 8 API calls 27767->27771 27830 7ff665ee0d54 27769->27830 27775 7ff665ec39a3 27770->27775 27776 7ff665ec39ec 27770->27776 27774 7ff665ec3a9e 27771->27774 27772 7ff665ec3ab3 27777 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27772->27777 27774->27756 27835 7ff665ee0c80 33 API calls 27775->27835 27836 7ff665ec26b4 33 API calls BuildCatchObjectHelperInternal 27776->27836 27780 7ff665ec3ab8 27777->27780 27779 7ff665ec39b0 27783 7ff665ec1fa0 31 API calls 27779->27783 27787 7ff665ec39c0 BuildCatchObjectHelperInternal 27779->27787 27782 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27780->27782 27786 7ff665ec3abe 27782->27786 27783->27787 27784 7ff665ec1fa0 31 API calls 27789 7ff665ec394f 27784->27789 27785 7ff665ec3a13 27837 7ff665ee0ae8 34 API calls _invalid_parameter_noinfo_noreturn 27785->27837 27787->27784 27789->27767 27789->27772 27789->27780 27791 7ff665ede811 27790->27791 27792 7ff665ede82b 27791->27792 27796 7ff665ecb664 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 27791->27796 27794 7ff665ede845 SetThreadExecutionState 27792->27794 27797 7ff665ecb664 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 27792->27797 27796->27792 27797->27794 27799 7ff665ec6a96 _snwprintf 27798->27799 27800 7ff665ec6ae4 27799->27800 27801 7ff665ec6ac4 27799->27801 27803 7ff665ec6d4d 27800->27803 27806 7ff665ec6b0f 27800->27806 27876 7ff665ec28a4 82 API calls 2 library calls 27801->27876 27905 7ff665ec28a4 82 API calls 2 library calls 27803->27905 27805 7ff665ec6ad0 27807 7ff665ef2320 _handle_error 8 API calls 27805->27807 27806->27805 27838 7ff665ee1f94 27806->27838 27808 7ff665ec394b 27807->27808 27808->27766 27808->27789 27834 7ff665ec2794 33 API calls __std_swap_ranges_trivially_swappable 27808->27834 27811 7ff665ec6b85 27814 7ff665ec6c2a 27811->27814 27829 7ff665ec6b7b 27811->27829 27882 7ff665ed8968 109 API calls 27811->27882 27812 7ff665ec6b80 27812->27811 27878 7ff665ec40b0 27812->27878 27813 7ff665ec6b6e 27877 7ff665ec28a4 82 API calls 2 library calls 27813->27877 27847 7ff665ed4760 27814->27847 27820 7ff665ec6c52 27821 7ff665ec6cd1 27820->27821 27822 7ff665ec6cc7 27820->27822 27883 7ff665ee1f20 27821->27883 27851 7ff665ed1794 27822->27851 27825 7ff665ec6ccf 27903 7ff665ed4700 8 API calls _handle_error 27825->27903 27827 7ff665ec6cfd 27827->27829 27866 7ff665ee1870 27829->27866 27832 7ff665ee0d8c 27830->27832 27831 7ff665ee0f48 27831->27789 27832->27831 27833 7ff665ec1744 33 API calls 27832->27833 27833->27832 27834->27766 27835->27779 27836->27785 27837->27789 27839 7ff665ee2056 std::bad_alloc::bad_alloc 27838->27839 27842 7ff665ee1fc5 std::bad_alloc::bad_alloc 27838->27842 27841 7ff665ef4078 Concurrency::cancel_current_task 2 API calls 27839->27841 27840 7ff665ec6b59 27840->27811 27840->27812 27840->27813 27841->27842 27842->27840 27843 7ff665ee200f std::bad_alloc::bad_alloc 27842->27843 27844 7ff665ef4078 Concurrency::cancel_current_task 2 API calls 27842->27844 27843->27840 27845 7ff665ef4078 Concurrency::cancel_current_task 2 API calls 27843->27845 27844->27843 27846 7ff665ee20a9 27845->27846 27848 7ff665ed4780 27847->27848 27850 7ff665ed478a 27847->27850 27849 7ff665ef21d0 33 API calls 27848->27849 27849->27850 27850->27820 27852 7ff665ed17be __scrt_get_show_window_mode 27851->27852 27906 7ff665ed8a48 27852->27906 27855 7ff665ed17f2 27867 7ff665ee188e 27866->27867 27869 7ff665ee18a1 27867->27869 27926 7ff665ede948 27867->27926 27873 7ff665ee18d8 27869->27873 27922 7ff665ef236c 27869->27922 27871 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27872 7ff665ee1ad0 27871->27872 27875 7ff665ee1a37 27873->27875 27933 7ff665eda984 31 API calls _invalid_parameter_noinfo_noreturn 27873->27933 27875->27871 27876->27805 27877->27829 27879 7ff665ec40dd 27878->27879 27880 7ff665ec40d7 __scrt_get_show_window_mode 27878->27880 27879->27880 27934 7ff665ec4120 27879->27934 27880->27811 27882->27814 27884 7ff665ee1f29 27883->27884 27885 7ff665ee1f5d 27884->27885 27886 7ff665ee1f55 27884->27886 27887 7ff665ee1f49 27884->27887 27885->27825 27972 7ff665ee3964 151 API calls 27886->27972 27940 7ff665ee20ac 27887->27940 27891 7ff665ee4733 BuildCatchObjectHelperInternal 27903->27827 27905->27805 27909 7ff665ed8bcd 27906->27909 27911 7ff665ed8a91 BuildCatchObjectHelperInternal 27906->27911 27907 7ff665ed8c1a 27908 7ff665ede808 SetThreadExecutionState RtlPcToFileHeader RaiseException 27907->27908 27913 7ff665ed8c1f 27908->27913 27909->27907 27910 7ff665eca174 8 API calls 27909->27910 27910->27907 27911->27909 27912 7ff665ee612c 137 API calls 27911->27912 27911->27913 27914 7ff665ed4888 108 API calls 27911->27914 27915 7ff665ed28d0 104 API calls 27911->27915 27912->27911 27913->27855 27914->27911 27915->27911 27923 7ff665ef239f 27922->27923 27924 7ff665ef23c8 27923->27924 27925 7ff665ee1870 108 API calls 27923->27925 27924->27873 27925->27923 27927 7ff665edecd8 103 API calls 27926->27927 27928 7ff665ede95f ReleaseSemaphore 27927->27928 27929 7ff665ede9a3 DeleteCriticalSection CloseHandle CloseHandle 27928->27929 27930 7ff665ede984 27928->27930 27931 7ff665edea5c 101 API calls 27930->27931 27932 7ff665ede98e CloseHandle 27931->27932 27932->27929 27932->27930 27933->27875 27935 7ff665ec4168 __std_swap_ranges_trivially_swappable __scrt_get_show_window_mode 27934->27935 27938 7ff665ec4149 27934->27938 27936 7ff665ec2018 33 API calls 27935->27936 27937 7ff665ec41eb 27936->27937 27938->27935 27939 7ff665ef21d0 33 API calls 27938->27939 27939->27935 27942 7ff665ee20c8 __scrt_get_show_window_mode 27940->27942 27941 7ff665ee21ba 27941->27891 27942->27941 27943 7ff665ef24a0 33 API calls 27942->27943 27944 7ff665ee2155 __scrt_get_show_window_mode 27942->27944 27943->27944 27944->27941 27972->27885 27977 7ff665ed8882 27976->27977 27978 7ff665ed8892 27976->27978 27983 7ff665ed23f0 27977->27983 27978->27513 27981 7ff665ef2320 _handle_error 8 API calls 27980->27981 27982 7ff665ecf7dc 27981->27982 27982->27411 27982->27726 27984 7ff665ed240f 27983->27984 27987 7ff665ed2aa0 101 API calls 27984->27987 27985 7ff665ed2428 27988 7ff665ed2bb0 101 API calls 27985->27988 27986 7ff665ed2438 27986->27978 27987->27985 27988->27986 27990 7ff665ec5e67 27989->27990 28053 7ff665ed85f0 27990->28053 27992 7ff665ec6134 28063 7ff665ec6fcc 82 API calls 27992->28063 27994 7ff665ec613c 27995 7ff665ec69af 27994->27995 27998 7ff665ec69e4 27994->27998 28006 7ff665ec69ef 27994->28006 27997 7ff665ef2320 _handle_error 8 API calls 27995->27997 27996 7ff665ec612e 27996->27992 27999 7ff665ec6973 27996->27999 28005 7ff665ed85f0 104 API calls 27996->28005 28002 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 27998->28002 28075 7ff665ec466c 82 API calls 27999->28075 28003 7ff665ec69e9 28002->28003 28007 7ff665ec61a4 28005->28007 28008 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 28006->28008 28007->27992 28010 7ff665ec61ac 28007->28010 28011 7ff665ec623f 28010->28011 28064 7ff665ec466c 82 API calls 28010->28064 28011->27999 28013 7ff665ec6266 28011->28013 28051->27524 28054 7ff665ed8614 28053->28054 28055 7ff665ed869a 28053->28055 28056 7ff665ed867c 28054->28056 28057 7ff665ec40b0 33 API calls 28054->28057 28055->28056 28058 7ff665ec40b0 33 API calls 28055->28058 28056->27996 28059 7ff665ed864d 28057->28059 28060 7ff665ed86b3 28058->28060 28076 7ff665eca174 28059->28076 28062 7ff665ed28d0 104 API calls 28060->28062 28062->28056 28063->27994 28077 7ff665eca185 28076->28077 28078 7ff665eca19a 28077->28078 28080 7ff665edaf18 8 API calls 2 library calls 28077->28080 28078->28056 28080->28078 28082 7ff665ec9be7 28081->28082 28088 7ff665ec9c1b 28082->28088 28089 7ff665ec9cae 28082->28089 28093 7ff665ec9c83 28082->28093 28216 7ff665ed5294 28082->28216 28234 7ff665eddb60 28082->28234 28083 7ff665ef2320 _handle_error 8 API calls 28084 7ff665ec9c9d 28083->28084 28084->27540 28086 7ff665ec1fa0 31 API calls 28086->28088 28088->28083 28090 7ff665ec9cbf 28089->28090 28238 7ff665edda48 CompareStringW 28089->28238 28092 7ff665ec20b0 33 API calls 28090->28092 28090->28093 28092->28093 28093->28086 28107 7ff665ed5f3a 28094->28107 28095 7ff665ed619b 28096 7ff665ef2320 _handle_error 8 API calls 28095->28096 28098 7ff665ecfb29 28096->28098 28097 7ff665ed61ce 28242 7ff665ec704c 47 API calls BuildCatchObjectHelperInternal 28097->28242 28098->27543 28167 7ff665ed7c94 47 API calls 2 library calls 28098->28167 28100 7ff665ec129c 33 API calls 28102 7ff665ed6129 28100->28102 28101 7ff665ed61d4 28103 7ff665ec1fa0 31 API calls 28102->28103 28104 7ff665ed613b BuildCatchObjectHelperInternal 28102->28104 28103->28104 28104->28095 28105 7ff665ed61c9 28104->28105 28107->28095 28107->28097 28107->28100 28166->27531 28167->27545 28214->27585 28215->27585 28217 7ff665ed52d4 28216->28217 28221 7ff665ed5312 __vcrt_FlsAlloc 28217->28221 28222 7ff665ed5339 __vcrt_FlsAlloc 28217->28222 28239 7ff665ee13f4 CompareStringW 28217->28239 28218 7ff665ef2320 _handle_error 8 API calls 28220 7ff665ed5503 28218->28220 28220->28082 28221->28222 28224 7ff665ed5382 __vcrt_FlsAlloc 28221->28224 28240 7ff665ee13f4 CompareStringW 28221->28240 28222->28218 28224->28222 28225 7ff665ed5439 28224->28225 28226 7ff665ec129c 33 API calls 28224->28226 28228 7ff665ed551b 28225->28228 28229 7ff665ed5489 28225->28229 28227 7ff665ed5426 28226->28227 28230 7ff665ed72cc 8 API calls 28227->28230 28232 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 28228->28232 28229->28222 28241 7ff665ee13f4 CompareStringW 28229->28241 28230->28225 28233 7ff665ed5520 28232->28233 28235 7ff665eddb73 28234->28235 28236 7ff665ec20b0 33 API calls 28235->28236 28237 7ff665eddb91 28235->28237 28236->28237 28237->28082 28238->28090 28239->28221 28240->28224 28241->28222 28242->28101 28300->27709 28301->27712 28302->27716 28304 7ff665ed87af 28303->28304 28306 7ff665ed87df 28303->28306 28305 7ff665ef236c 108 API calls 28304->28305 28308 7ff665ed87ca 28305->28308 28309 7ff665ef236c 108 API calls 28306->28309 28316 7ff665ed882b 28306->28316 28311 7ff665ef236c 108 API calls 28308->28311 28312 7ff665ed8814 28309->28312 28310 7ff665ed8845 28313 7ff665ed461c 108 API calls 28310->28313 28311->28306 28314 7ff665ef236c 108 API calls 28312->28314 28315 7ff665ed8851 28313->28315 28314->28316 28317 7ff665ed461c 28316->28317 28318 7ff665ed4632 28317->28318 28320 7ff665ed463a 28317->28320 28319 7ff665ede948 108 API calls 28318->28319 28319->28320 28320->28310 28322 7ff665ed163e 28321->28322 28324 7ff665ed1681 28321->28324 28322->28324 28325 7ff665ed31bc 51 API calls 28322->28325 28323 7ff665ece600 31 API calls 28327 7ff665ed16de 28323->28327 28326 7ff665ec1fa0 31 API calls 28324->28326 28329 7ff665ed16a0 28324->28329 28325->28322 28326->28324 28330 7ff665ed178d 28327->28330 28331 7ff665ed175b 28327->28331 28328 7ff665ef2320 _handle_error 8 API calls 28332 7ff665ece58a 28328->28332 28329->28323 28333 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 28330->28333 28331->28328 28332->27334 28332->27335 28334 7ff665ed1792 28333->28334 28335->27006 28336->27012 28337->27015 28338 7ff665ef1491 28339 7ff665ef13c9 28338->28339 28339->28338 28340 7ff665ef1900 _com_raise_error 14 API calls 28339->28340 28340->28339 25485 7ff665ef0df5 14 API calls _com_raise_error 25486 7ff665ef2d6c 25511 7ff665ef27fc 25486->25511 25489 7ff665ef2eb8 25609 7ff665ef3170 7 API calls 2 library calls 25489->25609 25491 7ff665ef2d88 __scrt_acquire_startup_lock 25492 7ff665ef2ec2 25491->25492 25494 7ff665ef2da6 25491->25494 25610 7ff665ef3170 7 API calls 2 library calls 25492->25610 25495 7ff665ef2dcb 25494->25495 25499 7ff665ef2de8 __scrt_release_startup_lock 25494->25499 25519 7ff665efcd90 25494->25519 25496 7ff665ef2ecd abort 25498 7ff665ef2e51 25523 7ff665ef32bc 25498->25523 25499->25498 25606 7ff665efc050 35 API calls __GSHandlerCheck_EH 25499->25606 25501 7ff665ef2e56 25526 7ff665efcd20 25501->25526 25611 7ff665ef2fb0 25511->25611 25514 7ff665ef282b 25613 7ff665efcc50 25514->25613 25517 7ff665ef2827 25517->25489 25517->25491 25520 7ff665efcdcc 25519->25520 25521 7ff665efcdeb 25519->25521 25520->25521 25630 7ff665ec1120 25520->25630 25521->25499 25706 7ff665ef3cf0 25523->25706 25708 7ff665f00730 25526->25708 25528 7ff665ef2e5e 25531 7ff665ef0754 25528->25531 25530 7ff665efcd2f 25530->25528 25712 7ff665f00ac0 35 API calls _snwprintf 25530->25712 25714 7ff665eddfd0 25531->25714 25535 7ff665ef079a 25801 7ff665ee946c 25535->25801 25537 7ff665ef07a4 __scrt_get_show_window_mode 25806 7ff665ee9a14 25537->25806 25539 7ff665ef0ddc 25541 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 25539->25541 25540 7ff665ef096e GetCommandLineW 25543 7ff665ef0980 25540->25543 25544 7ff665ef0b42 25540->25544 25542 7ff665ef0de2 25541->25542 25547 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 25542->25547 25868 7ff665ec129c 25543->25868 25816 7ff665ed6454 25544->25816 25545 7ff665ef0819 25545->25539 25545->25540 25559 7ff665ef0de8 25547->25559 25548 7ff665ef0b51 25552 7ff665ec1fa0 31 API calls 25548->25552 25556 7ff665ef0b68 BuildCatchObjectHelperInternal 25548->25556 25551 7ff665ef09a5 25878 7ff665eecad0 102 API calls 3 library calls 25551->25878 25552->25556 25553 7ff665ef0b93 SetEnvironmentVariableW GetLocalTime 25833 7ff665ed3e28 25553->25833 25555 7ff665ef1900 _com_raise_error 14 API calls 25555->25559 25828 7ff665ec1fa0 25556->25828 25558 7ff665ef09af 25558->25542 25562 7ff665ef0adb 25558->25562 25563 7ff665ef09f9 OpenFileMappingW 25558->25563 25559->25555 25571 7ff665ec129c 33 API calls 25562->25571 25565 7ff665ef0ad0 CloseHandle 25563->25565 25566 7ff665ef0a19 MapViewOfFile 25563->25566 25565->25544 25566->25565 25568 7ff665ef0a3f UnmapViewOfFile MapViewOfFile 25566->25568 25568->25565 25569 7ff665ef0a71 25568->25569 25879 7ff665eea190 33 API calls 2 library calls 25569->25879 25570 7ff665ef0c75 25861 7ff665ee67b4 25570->25861 25572 7ff665ef0b00 25571->25572 25883 7ff665eefd0c 35 API calls 2 library calls 25572->25883 25576 7ff665ef0a81 25880 7ff665eefd0c 35 API calls 2 library calls 25576->25880 25578 7ff665ef0b0a 25578->25544 25584 7ff665ef0dd7 25578->25584 25580 7ff665ee67b4 33 API calls 25582 7ff665ef0c87 DialogBoxParamW 25580->25582 25581 7ff665ef0a90 25881 7ff665edb9b4 102 API calls 25581->25881 25589 7ff665ef0cd3 25582->25589 25587 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 25584->25587 25585 7ff665ef0aa5 25882 7ff665edbb00 102 API calls 25585->25882 25587->25539 25588 7ff665ef0ab8 25593 7ff665ef0ac7 UnmapViewOfFile 25588->25593 25590 7ff665ef0cec 25589->25590 25591 7ff665ef0ce6 Sleep 25589->25591 25592 7ff665ef0cfa 25590->25592 25884 7ff665ee9f4c 49 API calls 2 library calls 25590->25884 25591->25590 25595 7ff665ef0d06 DeleteObject 25592->25595 25593->25565 25596 7ff665ef0d1f DeleteObject 25595->25596 25599 7ff665ef0d25 25595->25599 25596->25599 25597 7ff665ef0d5b 25885 7ff665eefe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 25597->25885 25598 7ff665ef0d6d 25864 7ff665ee94e4 25598->25864 25599->25597 25599->25598 25602 7ff665ef0d60 CloseHandle 25602->25598 25606->25498 25609->25492 25610->25496 25612 7ff665ef281e __scrt_dllmain_crt_thread_attach 25611->25612 25612->25514 25612->25517 25614 7ff665f00d4c 25613->25614 25615 7ff665ef2830 25614->25615 25618 7ff665efec00 25614->25618 25615->25517 25617 7ff665ef51a0 7 API calls 2 library calls 25615->25617 25617->25517 25629 7ff665eff398 EnterCriticalSection 25618->25629 25635 7ff665ec91c8 25630->25635 25634 7ff665ef2a01 25634->25520 25643 7ff665ed56a4 25635->25643 25637 7ff665ec91df 25646 7ff665edb788 25637->25646 25641 7ff665ec1130 25642 7ff665ef29bc 34 API calls 25641->25642 25642->25634 25652 7ff665ed56e8 25643->25652 25661 7ff665ec13a4 25646->25661 25649 7ff665ec9a28 25650 7ff665ed56e8 2 API calls 25649->25650 25651 7ff665ec9a36 25650->25651 25651->25641 25653 7ff665ed56fe __scrt_get_show_window_mode 25652->25653 25656 7ff665edeba4 25653->25656 25659 7ff665edeb58 GetCurrentProcess GetProcessAffinityMask 25656->25659 25660 7ff665ed56de 25659->25660 25660->25637 25662 7ff665ec13ad 25661->25662 25663 7ff665ec142d 25661->25663 25664 7ff665ec13ce 25662->25664 25665 7ff665ec143d 25662->25665 25663->25649 25669 7ff665ec13db __scrt_get_show_window_mode 25664->25669 25671 7ff665ef21d0 25664->25671 25681 7ff665ec2018 33 API calls std::_Xinvalid_argument 25665->25681 25680 7ff665ec197c 31 API calls _invalid_parameter_noinfo_noreturn 25669->25680 25673 7ff665ef21db 25671->25673 25672 7ff665ef21f4 25672->25669 25673->25672 25675 7ff665ef21fa 25673->25675 25682 7ff665efbbc0 25673->25682 25676 7ff665ef2205 25675->25676 25685 7ff665ef2f7c RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 25675->25685 25686 7ff665ec1f80 25676->25686 25679 7ff665ef220b 25680->25663 25693 7ff665efbc00 25682->25693 25685->25676 25687 7ff665ec1f8e std::bad_alloc::bad_alloc 25686->25687 25688 7ff665ef4078 Concurrency::cancel_current_task 2 API calls 25687->25688 25690 7ff665ec1f9f 25688->25690 25689 7ff665ec1fdc 25689->25679 25690->25689 25699 7ff665ef7904 25690->25699 25698 7ff665eff398 EnterCriticalSection 25693->25698 25704 7ff665ef783c 31 API calls 2 library calls 25699->25704 25701 7ff665ef791d 25705 7ff665ef7934 16 API calls abort 25701->25705 25704->25701 25707 7ff665ef32d3 GetStartupInfoW 25706->25707 25707->25501 25709 7ff665f0073d 25708->25709 25711 7ff665f00749 25708->25711 25713 7ff665f00570 48 API calls 4 library calls 25709->25713 25711->25530 25712->25530 25713->25711 25886 7ff665ef2450 25714->25886 25717 7ff665ede07b 25719 7ff665ede503 25717->25719 25928 7ff665efb788 39 API calls _snwprintf 25717->25928 25718 7ff665ede026 GetProcAddress 25720 7ff665ede053 GetProcAddress 25718->25720 25721 7ff665ede03b 25718->25721 25723 7ff665ed6454 34 API calls 25719->25723 25720->25717 25724 7ff665ede068 25720->25724 25721->25720 25726 7ff665ede50c 25723->25726 25724->25717 25725 7ff665ede3b0 25725->25719 25727 7ff665ede3ba 25725->25727 25888 7ff665ed7df4 25726->25888 25729 7ff665ed6454 34 API calls 25727->25729 25730 7ff665ede3c3 CreateFileW 25729->25730 25732 7ff665ede403 SetFilePointer 25730->25732 25733 7ff665ede4f0 CloseHandle 25730->25733 25732->25733 25734 7ff665ede41c ReadFile 25732->25734 25735 7ff665ec1fa0 31 API calls 25733->25735 25734->25733 25736 7ff665ede444 25734->25736 25735->25719 25737 7ff665ede800 25736->25737 25738 7ff665ede458 25736->25738 25947 7ff665ef2624 8 API calls 25737->25947 25743 7ff665ec129c 33 API calls 25738->25743 25740 7ff665ede805 25741 7ff665ede53e CompareStringW 25755 7ff665ede51a 25741->25755 25742 7ff665ec129c 33 API calls 25742->25755 25748 7ff665ede48f 25743->25748 25744 7ff665ede5cc 25761 7ff665ec129c 33 API calls 25744->25761 25767 7ff665ed8090 47 API calls 25744->25767 25772 7ff665ec1fa0 31 API calls 25744->25772 25777 7ff665ed32bc 51 API calls 25744->25777 25781 7ff665ede63a 25744->25781 25747 7ff665ec1fa0 31 API calls 25747->25755 25752 7ff665ede4db 25748->25752 25929 7ff665edd0a0 33 API calls 25748->25929 25749 7ff665ede7c2 25754 7ff665ec1fa0 31 API calls 25749->25754 25750 7ff665ede648 25930 7ff665ed7eb0 47 API calls 25750->25930 25756 7ff665ec1fa0 31 API calls 25752->25756 25758 7ff665ede7cb 25754->25758 25755->25741 25755->25742 25755->25744 25755->25747 25896 7ff665ed51a4 25755->25896 25901 7ff665ed8090 25755->25901 25905 7ff665ed32bc 25755->25905 25759 7ff665ede4e5 25756->25759 25757 7ff665ede651 25760 7ff665ed51a4 9 API calls 25757->25760 25762 7ff665ec1fa0 31 API calls 25758->25762 25763 7ff665ec1fa0 31 API calls 25759->25763 25764 7ff665ede656 25760->25764 25761->25744 25765 7ff665ede7d5 25762->25765 25763->25733 25766 7ff665ede706 25764->25766 25773 7ff665ede661 25764->25773 25919 7ff665ef2320 25765->25919 25770 7ff665edda98 48 API calls 25766->25770 25767->25744 25771 7ff665ede74b AllocConsole 25770->25771 25774 7ff665ede755 GetCurrentProcessId AttachConsole 25771->25774 25775 7ff665ede6fb 25771->25775 25772->25744 25931 7ff665edaae0 25773->25931 25776 7ff665ede76c 25774->25776 25779 7ff665ec19e0 std::locale::global 31 API calls 25775->25779 25784 7ff665ede778 GetStdHandle WriteConsoleW Sleep FreeConsole 25776->25784 25777->25744 25782 7ff665ede7b9 ExitProcess 25779->25782 25781->25749 25781->25750 25784->25775 25786 7ff665edaae0 48 API calls 25787 7ff665ede6ce 25786->25787 25941 7ff665eddc2c 33 API calls 25787->25941 25789 7ff665ede6da 25942 7ff665ec19e0 25789->25942 25791 7ff665ed62dc GetCurrentDirectoryW 25792 7ff665ed6300 25791->25792 25797 7ff665ed638d 25791->25797 25793 7ff665ec13a4 33 API calls 25792->25793 25794 7ff665ed631b GetCurrentDirectoryW 25793->25794 25795 7ff665ed6341 25794->25795 26162 7ff665ec20b0 25795->26162 25797->25535 25798 7ff665ed634f 25798->25797 25799 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 25798->25799 25800 7ff665ed63a9 25799->25800 25802 7ff665eddd88 25801->25802 25803 7ff665ee9481 OleInitialize 25802->25803 25804 7ff665ee94a7 25803->25804 25805 7ff665ee94cd SHGetMalloc 25804->25805 25805->25537 25807 7ff665ee9a49 25806->25807 25809 7ff665ee9a4e BuildCatchObjectHelperInternal 25806->25809 25808 7ff665ec1fa0 31 API calls 25807->25808 25808->25809 25810 7ff665ee9a7d BuildCatchObjectHelperInternal 25809->25810 25811 7ff665ec1fa0 31 API calls 25809->25811 25812 7ff665ec1fa0 31 API calls 25810->25812 25813 7ff665ee9aac BuildCatchObjectHelperInternal 25810->25813 25811->25810 25812->25813 25814 7ff665ec1fa0 31 API calls 25813->25814 25815 7ff665ee9adb BuildCatchObjectHelperInternal 25813->25815 25814->25815 25815->25545 25817 7ff665ec13a4 33 API calls 25816->25817 25818 7ff665ed6489 25817->25818 25819 7ff665ed648c GetModuleFileNameW 25818->25819 25822 7ff665ed64dc 25818->25822 25820 7ff665ed64de 25819->25820 25821 7ff665ed64a7 25819->25821 25820->25822 25821->25818 25823 7ff665ec129c 33 API calls 25822->25823 25825 7ff665ed6506 25823->25825 25824 7ff665ed653e 25824->25548 25825->25824 25826 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 25825->25826 25827 7ff665ed6560 25826->25827 25829 7ff665ec1fb3 25828->25829 25830 7ff665ec1fdc 25828->25830 25829->25830 25831 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 25829->25831 25830->25553 25832 7ff665ec2000 25831->25832 25834 7ff665ed3e4d swprintf 25833->25834 25835 7ff665ef9ef0 swprintf 46 API calls 25834->25835 25836 7ff665ed3e69 SetEnvironmentVariableW GetModuleHandleW LoadIconW 25835->25836 25837 7ff665eeb014 LoadBitmapW 25836->25837 25838 7ff665eeb03e 25837->25838 25839 7ff665eeb046 25837->25839 26167 7ff665ee8624 FindResourceW 25838->26167 25841 7ff665eeb063 25839->25841 25842 7ff665eeb04e GetObjectW 25839->25842 26182 7ff665ee849c 25841->26182 25842->25841 25845 7ff665eeb0ce 25856 7ff665ed98ac 25845->25856 25846 7ff665eeb09e 26187 7ff665ee8504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25846->26187 25848 7ff665ee8624 11 API calls 25850 7ff665eeb08a 25848->25850 25849 7ff665eeb0a7 26188 7ff665ee84cc 25849->26188 25850->25846 25851 7ff665eeb092 DeleteObject 25850->25851 25851->25846 25855 7ff665eeb0bf DeleteObject 25855->25845 26195 7ff665ed98dc 25856->26195 25858 7ff665ed98ba 26262 7ff665eda43c GetModuleHandleW FindResourceW 25858->26262 25860 7ff665ed98c2 25860->25570 25862 7ff665ef21d0 33 API calls 25861->25862 25863 7ff665ee67fa 25862->25863 25863->25580 25865 7ff665ee9501 25864->25865 25866 7ff665ee950a OleUninitialize 25865->25866 25867 7ff665f2e330 25866->25867 25869 7ff665ec12d0 25868->25869 25870 7ff665ec139b 25868->25870 25873 7ff665ec12de BuildCatchObjectHelperInternal 25869->25873 25874 7ff665ec1338 25869->25874 25875 7ff665ec1396 25869->25875 26344 7ff665ec2004 33 API calls std::_Xinvalid_argument 25870->26344 25873->25551 25874->25873 25877 7ff665ef21d0 33 API calls 25874->25877 25876 7ff665ec1f80 Concurrency::cancel_current_task 33 API calls 25875->25876 25876->25870 25877->25873 25878->25558 25879->25576 25880->25581 25881->25585 25882->25588 25883->25578 25884->25592 25885->25602 25887 7ff665eddff4 GetModuleHandleW 25886->25887 25887->25717 25887->25718 25889 7ff665ed7e0c 25888->25889 25890 7ff665ed7e23 25889->25890 25891 7ff665ed7e55 25889->25891 25893 7ff665ec129c 33 API calls 25890->25893 25948 7ff665ec704c 47 API calls BuildCatchObjectHelperInternal 25891->25948 25895 7ff665ed7e47 25893->25895 25894 7ff665ed7e5a 25895->25755 25897 7ff665ed51c8 GetVersionExW 25896->25897 25898 7ff665ed51fb 25896->25898 25897->25898 25899 7ff665ef2320 _handle_error 8 API calls 25898->25899 25900 7ff665ed5228 25899->25900 25900->25755 25902 7ff665ed80a5 25901->25902 25949 7ff665ed8188 25902->25949 25904 7ff665ed80ca 25904->25755 25906 7ff665ed32e4 25905->25906 25907 7ff665ed32e7 GetFileAttributesW 25905->25907 25906->25907 25908 7ff665ed3375 25907->25908 25909 7ff665ed32f8 25907->25909 25910 7ff665ef2320 _handle_error 8 API calls 25908->25910 25958 7ff665ed6a0c 25909->25958 25912 7ff665ed3389 25910->25912 25912->25755 25914 7ff665ed3323 GetFileAttributesW 25915 7ff665ed333c 25914->25915 25915->25908 25916 7ff665ed3399 25915->25916 25917 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 25916->25917 25918 7ff665ed339e 25917->25918 25920 7ff665ef2329 25919->25920 25921 7ff665ede7e4 25920->25921 25922 7ff665ef2550 IsProcessorFeaturePresent 25920->25922 25921->25791 25923 7ff665ef2568 25922->25923 26062 7ff665ef2744 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 25923->26062 25925 7ff665ef257b 26063 7ff665ef2510 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 25925->26063 25928->25725 25929->25748 25930->25757 25932 7ff665edaaf3 25931->25932 26064 7ff665ed9774 25932->26064 25935 7ff665edab86 25938 7ff665edda98 25935->25938 25936 7ff665edab58 LoadStringW 25936->25935 25937 7ff665edab71 LoadStringW 25936->25937 25937->25935 26090 7ff665edd874 25938->26090 25941->25789 25944 7ff665ec1fa0 25942->25944 25943 7ff665ec1fdc 25943->25775 25944->25943 25945 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 25944->25945 25946 7ff665ec2000 25945->25946 25947->25740 25948->25894 25950 7ff665ed8326 25949->25950 25951 7ff665ed81ba 25949->25951 25957 7ff665ec704c 47 API calls BuildCatchObjectHelperInternal 25950->25957 25955 7ff665ed81d4 BuildCatchObjectHelperInternal 25951->25955 25956 7ff665ed58a4 33 API calls 2 library calls 25951->25956 25953 7ff665ed832b 25955->25904 25956->25955 25957->25953 25959 7ff665ed6a4b 25958->25959 25975 7ff665ed6a44 25958->25975 25961 7ff665ec129c 33 API calls 25959->25961 25960 7ff665ef2320 _handle_error 8 API calls 25962 7ff665ed331f 25960->25962 25963 7ff665ed6a76 25961->25963 25962->25914 25962->25915 25964 7ff665ed6a96 25963->25964 25965 7ff665ed6cc7 25963->25965 25967 7ff665ed6ab0 25964->25967 25974 7ff665ed6b49 25964->25974 25966 7ff665ed62dc 35 API calls 25965->25966 25969 7ff665ed6ce6 25966->25969 25996 7ff665ed70ab 25967->25996 26031 7ff665ecc098 33 API calls 2 library calls 25967->26031 25968 7ff665ed6eef 26015 7ff665ed70cf 25968->26015 26052 7ff665ecc098 33 API calls 2 library calls 25968->26052 25969->25968 25972 7ff665ed6d1b 25969->25972 26029 7ff665ed6b44 25969->26029 26003 7ff665ed70bd 25972->26003 26034 7ff665ecc098 33 API calls 2 library calls 25972->26034 25973 7ff665ed70b1 25986 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 25973->25986 25994 7ff665ec129c 33 API calls 25974->25994 25974->26029 25975->25960 25976 7ff665ed6b03 25981 7ff665ed6b15 BuildCatchObjectHelperInternal 25976->25981 25989 7ff665ec1fa0 31 API calls 25976->25989 25979 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 25988 7ff665ed70db 25979->25988 25980 7ff665ed70a6 25993 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 25980->25993 25992 7ff665ec1fa0 31 API calls 25981->25992 25982 7ff665ed6f56 26053 7ff665ec11cc 33 API calls BuildCatchObjectHelperInternal 25982->26053 25985 7ff665ed70d5 25985->25979 25987 7ff665ed70b7 25986->25987 25997 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 25987->25997 25999 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 25988->25999 25989->25981 25991 7ff665ed70c3 26002 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 25991->26002 25992->26029 25993->25996 26000 7ff665ed6bbe 25994->26000 25995 7ff665ed6f69 26054 7ff665ed57ac 33 API calls BuildCatchObjectHelperInternal 25995->26054 26055 7ff665ec2004 33 API calls std::_Xinvalid_argument 25996->26055 25997->26003 25998 7ff665ec1fa0 31 API calls 26013 7ff665ed6df5 25998->26013 26004 7ff665ed70e1 25999->26004 26032 7ff665ed5820 33 API calls 26000->26032 26006 7ff665ed70c9 26002->26006 26056 7ff665ec2004 33 API calls std::_Xinvalid_argument 26003->26056 26057 7ff665ec704c 47 API calls BuildCatchObjectHelperInternal 26006->26057 26007 7ff665ed6bd3 26033 7ff665ece164 33 API calls 2 library calls 26007->26033 26008 7ff665ed6d76 BuildCatchObjectHelperInternal 26008->25991 26008->25998 26009 7ff665ec1fa0 31 API calls 26012 7ff665ed6fec 26009->26012 26016 7ff665ec1fa0 31 API calls 26012->26016 26019 7ff665ed6e21 26013->26019 26035 7ff665ec1744 26013->26035 26014 7ff665ed6f79 BuildCatchObjectHelperInternal 26014->25988 26014->26009 26058 7ff665ec2004 33 API calls std::_Xinvalid_argument 26015->26058 26018 7ff665ed6ff6 26016->26018 26017 7ff665ec1fa0 31 API calls 26021 7ff665ed6c6d 26017->26021 26022 7ff665ec1fa0 31 API calls 26018->26022 26019->26006 26023 7ff665ec129c 33 API calls 26019->26023 26024 7ff665ec1fa0 31 API calls 26021->26024 26022->26029 26025 7ff665ed6ec2 26023->26025 26024->26029 26048 7ff665ec2034 26025->26048 26026 7ff665ed6be9 BuildCatchObjectHelperInternal 26026->25987 26026->26017 26028 7ff665ed6edf 26030 7ff665ec1fa0 31 API calls 26028->26030 26029->25973 26029->25975 26029->25980 26029->25985 26030->26029 26031->25976 26032->26007 26033->26026 26034->26008 26036 7ff665ec18a1 26035->26036 26039 7ff665ec1784 26035->26039 26059 7ff665ec2004 33 API calls std::_Xinvalid_argument 26036->26059 26038 7ff665ec18a7 26040 7ff665ec1f80 Concurrency::cancel_current_task 33 API calls 26038->26040 26039->26038 26042 7ff665ef21d0 33 API calls 26039->26042 26046 7ff665ec17ac BuildCatchObjectHelperInternal 26039->26046 26041 7ff665ec18ad 26040->26041 26060 7ff665ef354c 31 API calls __std_exception_copy 26041->26060 26042->26046 26044 7ff665ec18d9 26044->26019 26045 7ff665ec1859 BuildCatchObjectHelperInternal 26045->26019 26046->26045 26047 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26046->26047 26047->26036 26049 7ff665ec2085 26048->26049 26051 7ff665ec2059 BuildCatchObjectHelperInternal 26048->26051 26061 7ff665ec15b8 33 API calls 3 library calls 26049->26061 26051->26028 26052->25982 26053->25995 26054->26014 26057->26015 26060->26044 26061->26051 26062->25925 26071 7ff665ed9638 26064->26071 26067 7ff665ed97d9 26069 7ff665ef2320 _handle_error 8 API calls 26067->26069 26070 7ff665ed97f2 26069->26070 26070->25935 26070->25936 26072 7ff665ed9692 26071->26072 26080 7ff665ed9730 26071->26080 26076 7ff665ed96c0 26072->26076 26085 7ff665ee0f68 WideCharToMultiByte 26072->26085 26074 7ff665ef2320 _handle_error 8 API calls 26075 7ff665ed9764 26074->26075 26075->26067 26081 7ff665ed9800 26075->26081 26079 7ff665ed96ef 26076->26079 26087 7ff665edaa88 45 API calls 2 library calls 26076->26087 26088 7ff665efa270 31 API calls 2 library calls 26079->26088 26080->26074 26082 7ff665ed9840 26081->26082 26084 7ff665ed9869 26081->26084 26089 7ff665efa270 31 API calls 2 library calls 26082->26089 26084->26067 26086 7ff665ee0faa 26085->26086 26086->26076 26087->26079 26088->26080 26089->26084 26106 7ff665edd4d0 26090->26106 26095 7ff665edd8e5 swprintf 26102 7ff665edd974 26095->26102 26120 7ff665ef9ef0 26095->26120 26147 7ff665ec9d78 33 API calls 26095->26147 26096 7ff665edd9a3 26098 7ff665edda17 26096->26098 26101 7ff665edda3f 26096->26101 26099 7ff665ef2320 _handle_error 8 API calls 26098->26099 26100 7ff665edda2b 26099->26100 26100->25786 26103 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26101->26103 26102->26096 26148 7ff665ec9d78 33 API calls 26102->26148 26104 7ff665edda44 26103->26104 26107 7ff665edd665 26106->26107 26109 7ff665edd502 26106->26109 26110 7ff665edcb80 26107->26110 26108 7ff665ec1744 33 API calls 26108->26109 26109->26107 26109->26108 26111 7ff665edcc80 26110->26111 26112 7ff665edcbb6 26110->26112 26149 7ff665ec2004 33 API calls std::_Xinvalid_argument 26111->26149 26115 7ff665edcc20 26112->26115 26116 7ff665edcc7b 26112->26116 26118 7ff665edcbc6 26112->26118 26115->26118 26119 7ff665ef21d0 33 API calls 26115->26119 26117 7ff665ec1f80 Concurrency::cancel_current_task 33 API calls 26116->26117 26117->26111 26118->26095 26119->26118 26121 7ff665ef9f4e 26120->26121 26122 7ff665ef9f36 26120->26122 26121->26122 26124 7ff665ef9f58 26121->26124 26150 7ff665efd69c 15 API calls _invalid_parameter_noinfo 26122->26150 26152 7ff665ef7ef0 35 API calls 2 library calls 26124->26152 26125 7ff665ef9f3b 26151 7ff665ef78e4 31 API calls _invalid_parameter_noinfo 26125->26151 26128 7ff665ef2320 _handle_error 8 API calls 26130 7ff665efa10b 26128->26130 26129 7ff665ef9f69 __scrt_get_show_window_mode 26153 7ff665ef7e70 15 API calls _set_fmode 26129->26153 26130->26095 26132 7ff665ef9fd4 26154 7ff665ef82f8 46 API calls 3 library calls 26132->26154 26134 7ff665ef9fdd 26135 7ff665ef9fe5 26134->26135 26136 7ff665efa014 26134->26136 26155 7ff665efd90c 26135->26155 26138 7ff665efa023 26136->26138 26139 7ff665efa092 26136->26139 26140 7ff665efa06c 26136->26140 26141 7ff665efa01a 26136->26141 26144 7ff665efd90c __free_lconv_mon 15 API calls 26138->26144 26139->26140 26143 7ff665efa09c 26139->26143 26142 7ff665efd90c __free_lconv_mon 15 API calls 26140->26142 26141->26138 26141->26140 26146 7ff665ef9f46 26142->26146 26145 7ff665efd90c __free_lconv_mon 15 API calls 26143->26145 26144->26146 26145->26146 26146->26128 26147->26095 26148->26096 26150->26125 26151->26146 26152->26129 26153->26132 26154->26134 26156 7ff665efd911 RtlFreeHeap 26155->26156 26160 7ff665efd941 __free_lconv_mon 26155->26160 26157 7ff665efd92c 26156->26157 26156->26160 26161 7ff665efd69c 15 API calls _invalid_parameter_noinfo 26157->26161 26159 7ff665efd931 GetLastError 26159->26160 26160->26146 26161->26159 26163 7ff665ec20f6 26162->26163 26165 7ff665ec20cb BuildCatchObjectHelperInternal 26162->26165 26166 7ff665ec1474 33 API calls 3 library calls 26163->26166 26165->25798 26166->26165 26168 7ff665ee879b 26167->26168 26169 7ff665ee864f SizeofResource 26167->26169 26168->25839 26169->26168 26170 7ff665ee8669 LoadResource 26169->26170 26170->26168 26171 7ff665ee8682 LockResource 26170->26171 26171->26168 26172 7ff665ee8697 GlobalAlloc 26171->26172 26172->26168 26173 7ff665ee86b8 GlobalLock 26172->26173 26174 7ff665ee8792 GlobalFree 26173->26174 26175 7ff665ee86ca BuildCatchObjectHelperInternal 26173->26175 26174->26168 26176 7ff665ee86d8 CreateStreamOnHGlobal 26175->26176 26177 7ff665ee8789 GlobalUnlock 26176->26177 26178 7ff665ee86f6 GdipAlloc 26176->26178 26177->26174 26179 7ff665ee870b 26178->26179 26179->26177 26180 7ff665ee8772 26179->26180 26181 7ff665ee875a GdipCreateHBITMAPFromBitmap 26179->26181 26180->26177 26181->26180 26183 7ff665ee84cc 4 API calls 26182->26183 26184 7ff665ee84aa 26183->26184 26185 7ff665ee84b9 26184->26185 26193 7ff665ee8504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26184->26193 26185->25845 26185->25846 26185->25848 26187->25849 26189 7ff665ee84de 26188->26189 26190 7ff665ee84e3 26188->26190 26194 7ff665ee8590 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26189->26194 26192 7ff665ee8df4 16 API calls _handle_error 26190->26192 26192->25855 26193->26185 26194->26190 26198 7ff665ed98fe _snwprintf 26195->26198 26196 7ff665ed9973 26313 7ff665ed68b0 48 API calls 26196->26313 26198->26196 26199 7ff665ed9a89 26198->26199 26202 7ff665ed99fd 26199->26202 26204 7ff665ec20b0 33 API calls 26199->26204 26200 7ff665ec1fa0 31 API calls 26200->26202 26201 7ff665ed997d BuildCatchObjectHelperInternal 26201->26200 26203 7ff665eda42e 26201->26203 26264 7ff665ed24c0 26202->26264 26205 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26203->26205 26204->26202 26207 7ff665eda434 26205->26207 26209 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26207->26209 26211 7ff665eda43a 26209->26211 26210 7ff665ed9a22 26212 7ff665ed204c 100 API calls 26210->26212 26215 7ff665ed9a2b 26212->26215 26213 7ff665ed9b17 26282 7ff665efa450 26213->26282 26215->26207 26217 7ff665ed9a66 26215->26217 26220 7ff665ef2320 _handle_error 8 API calls 26217->26220 26218 7ff665ed9aad 26218->26213 26221 7ff665ed8e58 33 API calls 26218->26221 26219 7ff665efa450 31 API calls 26233 7ff665ed9b57 __vcrt_FlsAlloc 26219->26233 26222 7ff665eda40e 26220->26222 26221->26218 26222->25858 26223 7ff665ed9c89 26224 7ff665ed2aa0 101 API calls 26223->26224 26236 7ff665ed9d5c 26223->26236 26227 7ff665ed9ca1 26224->26227 26230 7ff665ed28d0 104 API calls 26227->26230 26227->26236 26234 7ff665ed9cc9 26230->26234 26233->26223 26233->26236 26290 7ff665ed2bb0 26233->26290 26299 7ff665ed28d0 26233->26299 26304 7ff665ed2aa0 26233->26304 26234->26236 26256 7ff665ed9cd7 __vcrt_FlsAlloc 26234->26256 26314 7ff665ee0bbc MultiByteToWideChar 26234->26314 26309 7ff665ed204c 26236->26309 26237 7ff665eda1ec 26251 7ff665eda2c2 26237->26251 26320 7ff665efcf90 31 API calls 2 library calls 26237->26320 26239 7ff665eda157 26239->26237 26317 7ff665efcf90 31 API calls 2 library calls 26239->26317 26240 7ff665eda14b 26240->25858 26243 7ff665eda249 26321 7ff665efb7bc 31 API calls _invalid_parameter_noinfo_noreturn 26243->26321 26244 7ff665eda3a2 26246 7ff665efa450 31 API calls 26244->26246 26245 7ff665eda2ae 26245->26251 26322 7ff665ed8cd0 33 API calls 2 library calls 26245->26322 26247 7ff665eda3cb 26246->26247 26249 7ff665efa450 31 API calls 26247->26249 26249->26236 26251->26244 26254 7ff665ed8e58 33 API calls 26251->26254 26252 7ff665eda16d 26318 7ff665efb7bc 31 API calls _invalid_parameter_noinfo_noreturn 26252->26318 26253 7ff665eda1d8 26253->26237 26319 7ff665ed8cd0 33 API calls 2 library calls 26253->26319 26254->26251 26256->26236 26256->26237 26256->26239 26256->26240 26257 7ff665eda429 26256->26257 26258 7ff665ee0f68 WideCharToMultiByte 26256->26258 26315 7ff665edaa88 45 API calls 2 library calls 26256->26315 26316 7ff665efa270 31 API calls 2 library calls 26256->26316 26323 7ff665ef2624 8 API calls 26257->26323 26258->26256 26263 7ff665eda468 26262->26263 26263->25860 26265 7ff665ed24fd CreateFileW 26264->26265 26267 7ff665ed25ae GetLastError 26265->26267 26276 7ff665ed266e 26265->26276 26268 7ff665ed6a0c 49 API calls 26267->26268 26269 7ff665ed25dc 26268->26269 26270 7ff665ed25e0 CreateFileW GetLastError 26269->26270 26275 7ff665ed262c 26269->26275 26270->26275 26271 7ff665ed26b1 SetFileTime 26274 7ff665ed26cf 26271->26274 26272 7ff665ed2708 26273 7ff665ef2320 _handle_error 8 API calls 26272->26273 26277 7ff665ed271b 26273->26277 26274->26272 26278 7ff665ec20b0 33 API calls 26274->26278 26275->26276 26279 7ff665ed2736 26275->26279 26276->26271 26276->26274 26277->26210 26277->26218 26278->26272 26280 7ff665ef7904 _invalid_parameter_noinfo_noreturn 31 API calls 26279->26280 26281 7ff665ed273b 26280->26281 26283 7ff665efa47d 26282->26283 26289 7ff665efa492 26283->26289 26324 7ff665efd69c 15 API calls _invalid_parameter_noinfo 26283->26324 26285 7ff665efa487 26325 7ff665ef78e4 31 API calls _invalid_parameter_noinfo 26285->26325 26286 7ff665ef2320 _handle_error 8 API calls 26288 7ff665ed9b37 26286->26288 26288->26219 26289->26286 26291 7ff665ed2bcd 26290->26291 26296 7ff665ed2be9 26290->26296 26292 7ff665ed2bfb 26291->26292 26326 7ff665ecb9c4 99 API calls Concurrency::cancel_current_task 26291->26326 26292->26233 26293 7ff665ed2c01 SetFilePointer 26293->26292 26295 7ff665ed2c1e GetLastError 26293->26295 26295->26292 26297 7ff665ed2c28 26295->26297 26296->26292 26296->26293 26297->26292 26327 7ff665ecb9c4 99 API calls Concurrency::cancel_current_task 26297->26327 26300 7ff665ed28f6 26299->26300 26302 7ff665ed28fd 26299->26302 26300->26233 26302->26300 26303 7ff665ed2320 GetStdHandle ReadFile GetLastError GetLastError GetFileType 26302->26303 26328 7ff665ecb8a4 99 API calls Concurrency::cancel_current_task 26302->26328 26303->26302 26329 7ff665ed2778 26304->26329 26306 7ff665ed2ac7 26306->26233 26310 7ff665ed2066 26309->26310 26311 7ff665ed2072 26309->26311 26310->26311 26337 7ff665ed20d0 26310->26337 26313->26201 26314->26256 26315->26256 26316->26256 26317->26252 26318->26253 26319->26237 26320->26243 26321->26245 26322->26251 26323->26203 26324->26285 26325->26289 26335 7ff665ed2789 _snwprintf 26329->26335 26330 7ff665ed2890 SetFilePointer 26332 7ff665ed27b5 26330->26332 26334 7ff665ed28b8 GetLastError 26330->26334 26331 7ff665ef2320 _handle_error 8 API calls 26333 7ff665ed281d 26331->26333 26332->26331 26333->26306 26336 7ff665ecb9c4 99 API calls Concurrency::cancel_current_task 26333->26336 26334->26332 26335->26330 26335->26332 26338 7ff665ed20ea 26337->26338 26339 7ff665ed2102 26337->26339 26338->26339 26341 7ff665ed20f6 CloseHandle 26338->26341 26340 7ff665ed2126 26339->26340 26343 7ff665ecb544 99 API calls 26339->26343 26340->26311 26341->26339 26343->26340 28346 7ff665efd94c 28347 7ff665efd997 28346->28347 28351 7ff665efd95b _invalid_parameter_noinfo 28346->28351 28353 7ff665efd69c 15 API calls _invalid_parameter_noinfo 28347->28353 28348 7ff665efd97e HeapAlloc 28350 7ff665efd995 28348->28350 28348->28351 28351->28347 28351->28348 28352 7ff665efbbc0 _invalid_parameter_noinfo 2 API calls 28351->28352 28352->28351 28353->28350
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Item$Message$_invalid_parameter_noinfo_noreturn$Send$DialogText$File$ErrorLast$CloseFindFocusLoadStringViewWindow$CommandConcurrency::cancel_current_taskCountCreateDispatchEnableExecuteFirstHandleLineMappingParamShellSleepTickTranslateUnmap
                                                  • String ID: %s %s$-el -s2 "-d%s" "-sp%s"$@$LICENSEDLG$REPLACEFILEDLG$STARTDLG$__tmp_rar_sfx_access_check_$p$runas$winrarsfxmappingfile.tmp
                                                  • API String ID: 255727823-2702805183
                                                  • Opcode ID: cc7014f4e7a90cabf34f85099bb26417f38d3f1755592d98c7c91d1bfe449048
                                                  • Instruction ID: 2d1c274d2e3d76c594673c786996915f12efbf9047dba5d79c90bd16ee207db7
                                                  • Opcode Fuzzy Hash: cc7014f4e7a90cabf34f85099bb26417f38d3f1755592d98c7c91d1bfe449048
                                                  • Instruction Fuzzy Hash: 3DD2A062E197C2C1EE209B65E9522BA6771EF85F80F904131EA5D8F6A9DF3CED44C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task$FileMessageMoveSend$DialogItemPathTemp
                                                  • String ID: .lnk$.tmp$<br>$@set:user$HIDE$MAX$MIN$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$lnk
                                                  • API String ID: 3007431893-3916287355
                                                  • Opcode ID: 03d3e8211883851f7ef06e27a556162d5737696b71e17b8ecd20de3ca5a7139a
                                                  • Instruction ID: da09e696a46afdad21c57ea771b5a3f3b696686c07b201172d44388b51f00506
                                                  • Opcode Fuzzy Hash: 03d3e8211883851f7ef06e27a556162d5737696b71e17b8ecd20de3ca5a7139a
                                                  • Instruction Fuzzy Hash: 7113C172B14B82C5EF10DF64DA422EC27B1EB84B98F401536EA5D9BAD9DF38D985C340

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1466 7ff665ef0754-7ff665ef0829 call 7ff665eddfd0 call 7ff665ed62dc call 7ff665ee946c call 7ff665ef3cf0 call 7ff665ee9a14 1477 7ff665ef0860-7ff665ef0883 1466->1477 1478 7ff665ef082b-7ff665ef0840 1466->1478 1479 7ff665ef0885-7ff665ef089a 1477->1479 1480 7ff665ef08ba-7ff665ef08dd 1477->1480 1481 7ff665ef0842-7ff665ef0855 1478->1481 1482 7ff665ef085b call 7ff665ef220c 1478->1482 1484 7ff665ef08b5 call 7ff665ef220c 1479->1484 1485 7ff665ef089c-7ff665ef08af 1479->1485 1486 7ff665ef0914-7ff665ef0937 1480->1486 1487 7ff665ef08df-7ff665ef08f4 1480->1487 1481->1482 1488 7ff665ef0ddd-7ff665ef0de2 call 7ff665ef7904 1481->1488 1482->1477 1484->1480 1485->1484 1485->1488 1492 7ff665ef096e-7ff665ef097a GetCommandLineW 1486->1492 1493 7ff665ef0939-7ff665ef094e 1486->1493 1490 7ff665ef090f call 7ff665ef220c 1487->1490 1491 7ff665ef08f6-7ff665ef0909 1487->1491 1501 7ff665ef0de3-7ff665ef0df0 call 7ff665ef7904 1488->1501 1490->1486 1491->1488 1491->1490 1496 7ff665ef0980-7ff665ef09b7 call 7ff665ef797c call 7ff665ec129c call 7ff665eecad0 1492->1496 1497 7ff665ef0b47-7ff665ef0b5e call 7ff665ed6454 1492->1497 1499 7ff665ef0950-7ff665ef0963 1493->1499 1500 7ff665ef0969 call 7ff665ef220c 1493->1500 1525 7ff665ef09ec-7ff665ef09f3 1496->1525 1526 7ff665ef09b9-7ff665ef09cc 1496->1526 1510 7ff665ef0b60-7ff665ef0b85 call 7ff665ec1fa0 call 7ff665ef3640 1497->1510 1511 7ff665ef0b89-7ff665ef0ce4 call 7ff665ec1fa0 SetEnvironmentVariableW GetLocalTime call 7ff665ed3e28 SetEnvironmentVariableW GetModuleHandleW LoadIconW call 7ff665eeb014 call 7ff665ed98ac call 7ff665ee67b4 * 2 DialogBoxParamW call 7ff665ee68a8 * 2 1497->1511 1499->1488 1499->1500 1500->1492 1513 7ff665ef0df5-7ff665ef0e2f call 7ff665ef1900 1501->1513 1510->1511 1572 7ff665ef0cec-7ff665ef0cf3 1511->1572 1573 7ff665ef0ce6 Sleep 1511->1573 1522 7ff665ef0e34-7ff665ef0eed 1513->1522 1522->1513 1532 7ff665ef0adb-7ff665ef0b12 call 7ff665ef797c call 7ff665ec129c call 7ff665eefd0c 1525->1532 1533 7ff665ef09f9-7ff665ef0a13 OpenFileMappingW 1525->1533 1530 7ff665ef09ce-7ff665ef09e1 1526->1530 1531 7ff665ef09e7 call 7ff665ef220c 1526->1531 1530->1501 1530->1531 1531->1525 1532->1497 1555 7ff665ef0b14-7ff665ef0b27 1532->1555 1538 7ff665ef0ad0-7ff665ef0ad9 CloseHandle 1533->1538 1539 7ff665ef0a19-7ff665ef0a39 MapViewOfFile 1533->1539 1538->1497 1539->1538 1542 7ff665ef0a3f-7ff665ef0a6f UnmapViewOfFile MapViewOfFile 1539->1542 1542->1538 1543 7ff665ef0a71-7ff665ef0aca call 7ff665eea190 call 7ff665eefd0c call 7ff665edb9b4 call 7ff665edbb00 call 7ff665edbb70 UnmapViewOfFile 1542->1543 1543->1538 1558 7ff665ef0b42 call 7ff665ef220c 1555->1558 1559 7ff665ef0b29-7ff665ef0b3c 1555->1559 1558->1497 1559->1558 1562 7ff665ef0dd7-7ff665ef0ddc call 7ff665ef7904 1559->1562 1562->1488 1575 7ff665ef0cf5 call 7ff665ee9f4c 1572->1575 1576 7ff665ef0cfa-7ff665ef0d1d call 7ff665edb8e0 DeleteObject 1572->1576 1573->1572 1575->1576 1581 7ff665ef0d25-7ff665ef0d2c 1576->1581 1582 7ff665ef0d1f DeleteObject 1576->1582 1583 7ff665ef0d2e-7ff665ef0d35 1581->1583 1584 7ff665ef0d48-7ff665ef0d59 1581->1584 1582->1581 1583->1584 1585 7ff665ef0d37-7ff665ef0d43 call 7ff665ecba0c 1583->1585 1586 7ff665ef0d6d-7ff665ef0d7a 1584->1586 1587 7ff665ef0d5b-7ff665ef0d67 call 7ff665eefe24 CloseHandle 1584->1587 1585->1584 1588 7ff665ef0d9f-7ff665ef0da4 call 7ff665ee94e4 1586->1588 1589 7ff665ef0d7c-7ff665ef0d89 1586->1589 1587->1586 1598 7ff665ef0da9-7ff665ef0dd6 call 7ff665ef2320 1588->1598 1592 7ff665ef0d8b-7ff665ef0d93 1589->1592 1593 7ff665ef0d99-7ff665ef0d9b 1589->1593 1592->1588 1596 7ff665ef0d95-7ff665ef0d97 1592->1596 1593->1588 1597 7ff665ef0d9d 1593->1597 1596->1588 1597->1588
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: File$EnvironmentHandleVariableView$_invalid_parameter_noinfo_noreturn$AddressCloseCurrentDeleteDirectoryModuleObjectProcUnmap$CommandDialogIconInitializeLineLoadLocalMallocMappingOpenParamSleepTimeswprintf
                                                  • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                  • API String ID: 1048086575-3710569615
                                                  • Opcode ID: 698fae3a653e1b7d4e45f88450a095eb1b46b52804e719b722bb591d7123fd6d
                                                  • Instruction ID: 83ceb59b10e6bb5c2ee9dfb98ce3845e572cabd8aece4356c7a4f61103fcf893
                                                  • Opcode Fuzzy Hash: 698fae3a653e1b7d4e45f88450a095eb1b46b52804e719b722bb591d7123fd6d
                                                  • Instruction Fuzzy Hash: 7E126161A19B82C1EF109B64E9562B96371FFC4F94F404235EA9D8FAA5EF3CE940C740

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWideswprintf
                                                  • String ID: $%s:$CAPTION
                                                  • API String ID: 2100155373-404845831
                                                  • Opcode ID: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                                                  • Instruction ID: ab54c0535bd4d6d5f5d99262ba6d7b6a1bd5d301449bfdf47585b3e931cabfc0
                                                  • Opcode Fuzzy Hash: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                                                  • Instruction Fuzzy Hash: D591D472B18642C6EB148F39E90166967B1FBC4B84F545535EE4A8BB98CE3CED05CF00

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                                  • String ID: PNG
                                                  • API String ID: 211097158-364855578
                                                  • Opcode ID: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                                                  • Instruction ID: c494fd5cb88999ca125c91b518a7205fb560980c1d726ee3ddd08dbf0b2f67cb
                                                  • Opcode Fuzzy Hash: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                                                  • Instruction Fuzzy Hash: 51410C26A19B46C2EF149B56E95537963B0AF88F90F084435EE0DCB3A4EF7CEC498740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID: __tmp_reference_source_
                                                  • API String ID: 3668304517-685763994
                                                  • Opcode ID: 384689ac8530feea5e34db68b871157dbebb8f7d0f69150fafb81c6ad97b012c
                                                  • Instruction ID: 3e2c9fd524702f5816ea0b2052148d92c4e515181d6ce66929478578cb1d2db8
                                                  • Opcode Fuzzy Hash: 384689ac8530feea5e34db68b871157dbebb8f7d0f69150fafb81c6ad97b012c
                                                  • Instruction Fuzzy Hash: 0FE28862A086C1D2EE64CB65D6423BE6771FBC1B40F445232EBAD8B6A5DF3CE855C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID: CMT
                                                  • API String ID: 3668304517-2756464174
                                                  • Opcode ID: 0f836c28f51a9b584851c458bba0ff9f464b0987ccb560ad783dda4dde2c761e
                                                  • Instruction ID: 0a098f746b794f72144b195897e61cf44d3ea9fc8db9d82b055b5fe153c0deeb
                                                  • Opcode Fuzzy Hash: 0f836c28f51a9b584851c458bba0ff9f464b0987ccb560ad783dda4dde2c761e
                                                  • Instruction Fuzzy Hash: 97E2E762B08682C6EF14DB65D6522FD6BB1FB45B84F440136EA6E8B796DF3CE854C300

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 3477 7ff665ed40bc-7ff665ed40f3 3478 7ff665ed41d2-7ff665ed41df FindNextFileW 3477->3478 3479 7ff665ed40f9-7ff665ed4101 3477->3479 3482 7ff665ed41f3-7ff665ed41f6 3478->3482 3483 7ff665ed41e1-7ff665ed41f1 GetLastError 3478->3483 3480 7ff665ed4103 3479->3480 3481 7ff665ed4106-7ff665ed4118 FindFirstFileW 3479->3481 3480->3481 3481->3482 3484 7ff665ed411e-7ff665ed4146 call 7ff665ed6a0c 3481->3484 3486 7ff665ed4211-7ff665ed4253 call 7ff665ef797c call 7ff665ec129c call 7ff665ed8090 3482->3486 3487 7ff665ed41f8-7ff665ed4200 3482->3487 3485 7ff665ed41ca-7ff665ed41cd 3483->3485 3497 7ff665ed4167-7ff665ed4170 3484->3497 3498 7ff665ed4148-7ff665ed4164 FindFirstFileW 3484->3498 3488 7ff665ed42eb-7ff665ed430e call 7ff665ef2320 3485->3488 3513 7ff665ed4255-7ff665ed426c 3486->3513 3514 7ff665ed428c-7ff665ed42e6 call 7ff665edf168 * 3 3486->3514 3490 7ff665ed4202 3487->3490 3491 7ff665ed4205-7ff665ed420c call 7ff665ec20b0 3487->3491 3490->3491 3491->3486 3501 7ff665ed4172-7ff665ed4189 3497->3501 3502 7ff665ed41a9-7ff665ed41ad 3497->3502 3498->3497 3504 7ff665ed41a4 call 7ff665ef220c 3501->3504 3505 7ff665ed418b-7ff665ed419e 3501->3505 3502->3482 3506 7ff665ed41af-7ff665ed41be GetLastError 3502->3506 3504->3502 3505->3504 3511 7ff665ed4315-7ff665ed431b call 7ff665ef7904 3505->3511 3508 7ff665ed41c0-7ff665ed41c6 3506->3508 3509 7ff665ed41c8 3506->3509 3508->3485 3508->3509 3509->3485 3516 7ff665ed426e-7ff665ed4281 3513->3516 3517 7ff665ed4287 call 7ff665ef220c 3513->3517 3514->3488 3516->3517 3520 7ff665ed430f-7ff665ed4314 call 7ff665ef7904 3516->3520 3517->3514 3520->3511
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: FileFind$ErrorFirstLast_invalid_parameter_noinfo_noreturn$Next
                                                  • String ID:
                                                  • API String ID: 474548282-0
                                                  • Opcode ID: ee5b8a3817742aa34bf8fe6f457784b4fe5053db0f5ec5b81f22969634733f46
                                                  • Instruction ID: 6e7e51e1b97c273ba59b466b97389cc7b1cf07742bb81394b0fa4d72de1c5132
                                                  • Opcode Fuzzy Hash: ee5b8a3817742aa34bf8fe6f457784b4fe5053db0f5ec5b81f22969634733f46
                                                  • Instruction Fuzzy Hash: D2617062A08B46C1EE109B28E94226D6371FBD5BA4F505332FABD8B6D9DF7CD944C700

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 3588 7ff665ec5e24-7ff665ec6129 call 7ff665ed833c call 7ff665ed85f0 3594 7ff665ec612e-7ff665ec6132 3588->3594 3595 7ff665ec6141-7ff665ec6171 call 7ff665ed83d8 call 7ff665ed8570 call 7ff665ed8528 3594->3595 3596 7ff665ec6134-7ff665ec613c call 7ff665ec6fcc 3594->3596 3614 7ff665ec6973-7ff665ec6976 call 7ff665ec466c 3595->3614 3615 7ff665ec6177-7ff665ec6179 3595->3615 3601 7ff665ec697b 3596->3601 3603 7ff665ec697e-7ff665ec6985 3601->3603 3605 7ff665ec69b4-7ff665ec69e3 call 7ff665ef2320 3603->3605 3606 7ff665ec6987-7ff665ec6998 3603->3606 3608 7ff665ec69af call 7ff665ef220c 3606->3608 3609 7ff665ec699a-7ff665ec69ad 3606->3609 3608->3605 3609->3608 3612 7ff665ec69e4-7ff665ec69e9 call 7ff665ef7904 3609->3612 3623 7ff665ec69ea-7ff665ec69ef call 7ff665ef7904 3612->3623 3614->3601 3615->3614 3618 7ff665ec617f-7ff665ec6189 3615->3618 3618->3614 3620 7ff665ec618f-7ff665ec6192 3618->3620 3620->3614 3622 7ff665ec6198-7ff665ec61aa call 7ff665ed85f0 3620->3622 3622->3596 3628 7ff665ec61ac-7ff665ec61fd call 7ff665ed84f8 call 7ff665ed8528 * 2 3622->3628 3629 7ff665ec69f0-7ff665ec69f7 call 7ff665ef7904 3623->3629 3638 7ff665ec623f-7ff665ec6249 3628->3638 3639 7ff665ec61ff-7ff665ec6222 call 7ff665ec466c call 7ff665ecba0c 3628->3639 3641 7ff665ec6266-7ff665ec6270 3638->3641 3642 7ff665ec624b-7ff665ec6260 call 7ff665ed8528 3638->3642 3639->3638 3656 7ff665ec6224-7ff665ec622e call 7ff665ec433c 3639->3656 3644 7ff665ec627e-7ff665ec6296 call 7ff665ec334c 3641->3644 3645 7ff665ec6272-7ff665ec627b call 7ff665ed8528 3641->3645 3642->3614 3642->3641 3654 7ff665ec62b3 3644->3654 3655 7ff665ec6298-7ff665ec629b 3644->3655 3645->3644 3658 7ff665ec62b6-7ff665ec62c8 3654->3658 3655->3654 3657 7ff665ec629d-7ff665ec62b1 3655->3657 3656->3638 3657->3654 3657->3658 3660 7ff665ec62ce-7ff665ec62d1 3658->3660 3661 7ff665ec68b7-7ff665ec6929 call 7ff665ed4d04 call 7ff665ed8528 3658->3661 3663 7ff665ec6481-7ff665ec64f4 call 7ff665ed4c74 call 7ff665ed8528 * 2 3660->3663 3664 7ff665ec62d7-7ff665ec62da 3660->3664 3680 7ff665ec6936 3661->3680 3681 7ff665ec692b-7ff665ec6934 call 7ff665ed8528 3661->3681 3694 7ff665ec6507-7ff665ec6533 call 7ff665ed8528 3663->3694 3695 7ff665ec64f6-7ff665ec6500 3663->3695 3664->3663 3667 7ff665ec62e0-7ff665ec62e3 3664->3667 3668 7ff665ec632e-7ff665ec6353 call 7ff665ed8528 3667->3668 3669 7ff665ec62e5-7ff665ec62e8 3667->3669 3684 7ff665ec639e-7ff665ec63c5 call 7ff665ed8528 call 7ff665ed8384 3668->3684 3685 7ff665ec6355-7ff665ec638f call 7ff665ec4228 call 7ff665ec3c84 call 7ff665ec701c call 7ff665ec1fa0 3668->3685 3672 7ff665ec62ee-7ff665ec6329 call 7ff665ed8528 3669->3672 3673 7ff665ec696d-7ff665ec6971 3669->3673 3672->3673 3673->3603 3687 7ff665ec6939-7ff665ec6946 3680->3687 3681->3687 3707 7ff665ec6402-7ff665ec641f call 7ff665ed8444 3684->3707 3708 7ff665ec63c7-7ff665ec6400 call 7ff665ec4228 call 7ff665ec3c84 call 7ff665ec701c call 7ff665ec1fa0 3684->3708 3731 7ff665ec6390-7ff665ec6399 call 7ff665ec1fa0 3685->3731 3692 7ff665ec6948-7ff665ec694a 3687->3692 3693 7ff665ec694c 3687->3693 3692->3693 3698 7ff665ec694f-7ff665ec6959 3692->3698 3693->3698 3709 7ff665ec6535-7ff665ec6544 call 7ff665ed83d8 call 7ff665edf134 3694->3709 3710 7ff665ec6549-7ff665ec6557 3694->3710 3695->3694 3698->3673 3702 7ff665ec695b-7ff665ec6968 call 7ff665ec4840 3698->3702 3702->3673 3726 7ff665ec6421-7ff665ec646f call 7ff665ed8444 * 2 call 7ff665edc800 call 7ff665ef4a70 3707->3726 3727 7ff665ec6475-7ff665ec647c 3707->3727 3708->3731 3709->3710 3716 7ff665ec6572-7ff665ec6595 call 7ff665ed8528 3710->3716 3717 7ff665ec6559-7ff665ec656c call 7ff665ed83d8 3710->3717 3732 7ff665ec65a0-7ff665ec65b0 3716->3732 3733 7ff665ec6597-7ff665ec659e 3716->3733 3717->3716 3726->3727 3727->3673 3731->3684 3737 7ff665ec65b3-7ff665ec65eb call 7ff665ed8528 * 2 3732->3737 3733->3737 3752 7ff665ec65f6-7ff665ec65fa 3737->3752 3753 7ff665ec65ed-7ff665ec65f4 3737->3753 3755 7ff665ec6603-7ff665ec6632 3752->3755 3757 7ff665ec65fc 3752->3757 3753->3755 3758 7ff665ec663f 3755->3758 3759 7ff665ec6634-7ff665ec6638 3755->3759 3757->3755 3761 7ff665ec6641-7ff665ec6656 3758->3761 3759->3758 3760 7ff665ec663a-7ff665ec663d 3759->3760 3760->3761 3762 7ff665ec6658-7ff665ec665b 3761->3762 3763 7ff665ec66ca 3761->3763 3762->3763 3764 7ff665ec665d-7ff665ec6683 3762->3764 3765 7ff665ec66d2-7ff665ec6731 call 7ff665ec3d00 call 7ff665ed8444 call 7ff665ee0d54 3763->3765 3764->3765 3766 7ff665ec6685-7ff665ec66a9 3764->3766 3776 7ff665ec6745-7ff665ec6749 3765->3776 3777 7ff665ec6733-7ff665ec6740 call 7ff665ec4840 3765->3777 3768 7ff665ec66b2-7ff665ec66bf 3766->3768 3769 7ff665ec66ab 3766->3769 3768->3765 3771 7ff665ec66c1-7ff665ec66c8 3768->3771 3769->3768 3771->3765 3779 7ff665ec675b-7ff665ec6772 call 7ff665ef797c 3776->3779 3780 7ff665ec674b-7ff665ec6756 call 7ff665ec473c 3776->3780 3777->3776 3786 7ff665ec6774 3779->3786 3787 7ff665ec6777-7ff665ec677e 3779->3787 3785 7ff665ec6859-7ff665ec6860 3780->3785 3788 7ff665ec6873-7ff665ec687b 3785->3788 3789 7ff665ec6862-7ff665ec6872 call 7ff665ec433c 3785->3789 3786->3787 3790 7ff665ec6780-7ff665ec6783 3787->3790 3791 7ff665ec67a3-7ff665ec67ba call 7ff665ef797c 3787->3791 3788->3673 3794 7ff665ec6881-7ff665ec6892 3788->3794 3789->3788 3795 7ff665ec6785 3790->3795 3796 7ff665ec679c 3790->3796 3803 7ff665ec67bf-7ff665ec67c6 3791->3803 3804 7ff665ec67bc 3791->3804 3799 7ff665ec6894-7ff665ec68a7 3794->3799 3800 7ff665ec68ad-7ff665ec68b2 call 7ff665ef220c 3794->3800 3801 7ff665ec6788-7ff665ec6791 3795->3801 3796->3791 3799->3629 3799->3800 3800->3673 3801->3791 3802 7ff665ec6793-7ff665ec679a 3801->3802 3802->3796 3802->3801 3803->3785 3807 7ff665ec67cc-7ff665ec67cf 3803->3807 3804->3803 3808 7ff665ec67d1 3807->3808 3809 7ff665ec67e8-7ff665ec67f0 3807->3809 3810 7ff665ec67d4-7ff665ec67dd 3808->3810 3809->3785 3811 7ff665ec67f2-7ff665ec6826 call 7ff665ed8360 call 7ff665ed8598 call 7ff665ed8528 3809->3811 3810->3785 3812 7ff665ec67df-7ff665ec67e6 3810->3812 3811->3785 3819 7ff665ec6828-7ff665ec6839 3811->3819 3812->3809 3812->3810 3820 7ff665ec6854 call 7ff665ef220c 3819->3820 3821 7ff665ec683b-7ff665ec684e 3819->3821 3820->3785 3821->3623 3821->3820
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: CMT
                                                  • API String ID: 0-2756464174
                                                  • Opcode ID: 359dff1c80db5b7743fdae80869b9e224ec7716eef54e7df647838bf343512b4
                                                  • Instruction ID: 014b15907ccebc7461cc8c4d6bda0fec40840a023d5128c47fa44d38be863ef9
                                                  • Opcode Fuzzy Hash: 359dff1c80db5b7743fdae80869b9e224ec7716eef54e7df647838bf343512b4
                                                  • Instruction Fuzzy Hash: 1842C522B08681D7EF18DB79D2522FE6BB1EB51B44F400135EB6E9B696DF38E954C300
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9760fb6421b16e0e583802a284a649d5527ae7ea6cefd943f702fc6b6a5a6041
                                                  • Instruction ID: c05240aa392d8364c6ef089e661d0b11dc75fe81921c4b19fa552942a59add75
                                                  • Opcode Fuzzy Hash: 9760fb6421b16e0e583802a284a649d5527ae7ea6cefd943f702fc6b6a5a6041
                                                  • Instruction Fuzzy Hash: 75E1E562A182C2CAEF64CF28E64627D77A1FB44B48F054136EB8E9B745DF3CE9418704
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bca6f1c51f28919b1ed0d44622ea5b19d03515415c361c6bf899ecd233d7ad4e
                                                  • Instruction ID: b964fb9171cd2ac37397a69babb1ae948497be1ffc7d6c7bfb2b5f92cf112af5
                                                  • Opcode Fuzzy Hash: bca6f1c51f28919b1ed0d44622ea5b19d03515415c361c6bf899ecd233d7ad4e
                                                  • Instruction Fuzzy Hash: D7B1F0A2B14BC992DE18CB66D609AE963A1B709FC4F488032EE4D8B751DF3CF955C300
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                  • String ID:
                                                  • API String ID: 3340455307-0
                                                  • Opcode ID: 388497648aa7178462f46e8a8cb48851b3eb3f46bbabbbefb59410a44eea80d8
                                                  • Instruction ID: 6afaf32ad629e7bff3009f78c8e473c74506b1dc1192cc465ba05af91f09422b
                                                  • Opcode Fuzzy Hash: 388497648aa7178462f46e8a8cb48851b3eb3f46bbabbbefb59410a44eea80d8
                                                  • Instruction Fuzzy Hash: 66410922B15A96C6FF64DF11EA027692262FBD4B84F045231EE8D8B794DE7CE8428704

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 7ff665eddfd0-7ff665ede024 call 7ff665ef2450 GetModuleHandleW 3 7ff665ede07b-7ff665ede3a5 0->3 4 7ff665ede026-7ff665ede039 GetProcAddress 0->4 5 7ff665ede503-7ff665ede521 call 7ff665ed6454 call 7ff665ed7df4 3->5 6 7ff665ede3ab-7ff665ede3b4 call 7ff665efb788 3->6 7 7ff665ede053-7ff665ede066 GetProcAddress 4->7 8 7ff665ede03b-7ff665ede04a 4->8 19 7ff665ede525-7ff665ede52f call 7ff665ed51a4 5->19 6->5 15 7ff665ede3ba-7ff665ede3fd call 7ff665ed6454 CreateFileW 6->15 7->3 11 7ff665ede068-7ff665ede078 7->11 8->7 11->3 22 7ff665ede403-7ff665ede416 SetFilePointer 15->22 23 7ff665ede4f0-7ff665ede4fe CloseHandle call 7ff665ec1fa0 15->23 27 7ff665ede564-7ff665ede5ac call 7ff665ef797c call 7ff665ec129c call 7ff665ed8090 call 7ff665ec1fa0 call 7ff665ed32bc 19->27 28 7ff665ede531-7ff665ede53c call 7ff665eddd88 19->28 22->23 25 7ff665ede41c-7ff665ede43e ReadFile 22->25 23->5 25->23 29 7ff665ede444-7ff665ede452 25->29 66 7ff665ede5b1-7ff665ede5b4 27->66 28->27 39 7ff665ede53e-7ff665ede562 CompareStringW 28->39 32 7ff665ede800-7ff665ede807 call 7ff665ef2624 29->32 33 7ff665ede458-7ff665ede4ac call 7ff665ef797c call 7ff665ec129c 29->33 48 7ff665ede4c3-7ff665ede4d9 call 7ff665edd0a0 33->48 39->27 42 7ff665ede5bd-7ff665ede5c6 39->42 42->19 46 7ff665ede5cc 42->46 49 7ff665ede5d1-7ff665ede5d4 46->49 61 7ff665ede4ae-7ff665ede4be call 7ff665eddd88 48->61 62 7ff665ede4db-7ff665ede4eb call 7ff665ec1fa0 * 2 48->62 52 7ff665ede63f-7ff665ede642 49->52 53 7ff665ede5d6-7ff665ede5d9 49->53 57 7ff665ede7c2-7ff665ede7ff call 7ff665ec1fa0 * 2 call 7ff665ef2320 52->57 58 7ff665ede648-7ff665ede65b call 7ff665ed7eb0 call 7ff665ed51a4 52->58 59 7ff665ede5dd-7ff665ede62d call 7ff665ef797c call 7ff665ec129c call 7ff665ed8090 call 7ff665ec1fa0 call 7ff665ed32bc 53->59 82 7ff665ede661-7ff665ede701 call 7ff665eddd88 * 2 call 7ff665edaae0 call 7ff665edda98 call 7ff665edaae0 call 7ff665eddc2c call 7ff665ee87ac call 7ff665ec19e0 58->82 83 7ff665ede706-7ff665ede753 call 7ff665edda98 AllocConsole 58->83 107 7ff665ede62f-7ff665ede638 59->107 108 7ff665ede63c 59->108 61->48 62->23 72 7ff665ede5ce 66->72 73 7ff665ede5b6 66->73 72->49 73->42 100 7ff665ede7b4-7ff665ede7bb call 7ff665ec19e0 ExitProcess 82->100 94 7ff665ede755-7ff665ede7aa GetCurrentProcessId AttachConsole call 7ff665ede868 call 7ff665ede858 GetStdHandle WriteConsoleW Sleep FreeConsole 83->94 95 7ff665ede7b0 83->95 94->95 95->100 107->59 112 7ff665ede63a 107->112 108->52 112->52
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$Console$FileHandle$AddressProcProcess$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadModulePointerReadSleepStringSystemVersionWrite
                                                  • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$RpcRtRemote.dll$SSPICLI.DLL$SetDefaultDllDirectories$SetDllDirectoryW$UXTheme.dll$WINNSI.DLL$WindowsCodecs.dll$XmlLite.dll$aclui.dll$apphelp.dll$atl.dll$browcli.dll$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$cryptbase.dll$cryptsp.dll$cryptui.dll$cscapi.dll$devrtl.dll$dfscli.dll$dhcpcsvc.dll$dhcpcsvc6.dll$dnsapi.DLL$dsrole.dll$dwmapi.dll$ieframe.dll$imageres.dll$iphlpapi.DLL$kernel32$linkinfo.dll$lpk.dll$mlang.dll$mpr.dll$msasn1.dll$netapi32.dll$netutils.dll$ntmarta.dll$ntshrui.dll$oleaccrc.dll$peerdist.dll$profapi.dll$propsys.dll$psapi.dll$rasadhlp.dll$rsaenh.dll$samcli.dll$samlib.dll$secur32.dll$setupapi.dll$sfc_os.dll$shdocvw.dll$shell32.dll$slc.dll$srvcli.dll$userenv.dll$usp10.dll$uxtheme.dll$version.dll$wintrust.dll$wkscli.dll$ws2_32.dll$ws2help.dll
                                                  • API String ID: 1496594111-2013832382
                                                  • Opcode ID: 19926894803355f4926a5d38047f13a95aa4f57e947c60c8a04cc60affe7caae
                                                  • Instruction ID: d643610f45e1a13d526e563b0f95a867640bb18a46c337f84db4d7e5a77f2d78
                                                  • Opcode Fuzzy Hash: 19926894803355f4926a5d38047f13a95aa4f57e947c60c8a04cc60affe7caae
                                                  • Instruction Fuzzy Hash: 56323935A09B82D5EB118F60E9521E973B4FF84B54F840236EA4D8B7A5EF3CDA54C780
                                                  APIs
                                                    • Part of subcall function 00007FF665ED8E58: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF665ED8F8D
                                                  • _snwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF665ED9F75
                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665EDA42F
                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665EDA435
                                                    • Part of subcall function 00007FF665EE0BBC: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF665EE0B44), ref: 00007FF665EE0BE9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$ByteCharConcurrency::cancel_current_taskMultiWide_snwprintf
                                                  • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS
                                                  • API String ID: 3629253777-3268106645
                                                  • Opcode ID: a0ca64e2e6ce2865254327ea7649ce479d77a76cd71c28d6026bad56dc47627e
                                                  • Instruction ID: e161d2bb377ec062429a40932f66bf909f1d62f8963be79487d31803c4954fb2
                                                  • Opcode Fuzzy Hash: a0ca64e2e6ce2865254327ea7649ce479d77a76cd71c28d6026bad56dc47627e
                                                  • Instruction Fuzzy Hash: 5C629E72A19682D5EF10DB25DA562BD2371FB80B84F805232EA4D8B6D5EF3CEE45C340

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1911 7ff665ef1900-7ff665ef1989 call 7ff665ef1558 1914 7ff665ef19b4-7ff665ef19d1 1911->1914 1915 7ff665ef198b-7ff665ef19af call 7ff665ef1868 RaiseException 1911->1915 1917 7ff665ef19d3-7ff665ef19e4 1914->1917 1918 7ff665ef19e6-7ff665ef19ea 1914->1918 1923 7ff665ef1bb8-7ff665ef1bd5 1915->1923 1920 7ff665ef19ed-7ff665ef19f9 1917->1920 1918->1920 1921 7ff665ef1a1a-7ff665ef1a1d 1920->1921 1922 7ff665ef19fb-7ff665ef1a0d 1920->1922 1924 7ff665ef1ac4-7ff665ef1acb 1921->1924 1925 7ff665ef1a23-7ff665ef1a26 1921->1925 1931 7ff665ef1a13 1922->1931 1932 7ff665ef1b89-7ff665ef1b93 1922->1932 1927 7ff665ef1adf-7ff665ef1ae2 1924->1927 1928 7ff665ef1acd-7ff665ef1adc 1924->1928 1929 7ff665ef1a3d-7ff665ef1a52 LoadLibraryExA 1925->1929 1930 7ff665ef1a28-7ff665ef1a3b 1925->1930 1933 7ff665ef1b85 1927->1933 1934 7ff665ef1ae8-7ff665ef1aec 1927->1934 1928->1927 1935 7ff665ef1a54-7ff665ef1a67 GetLastError 1929->1935 1936 7ff665ef1aa9-7ff665ef1ab2 1929->1936 1930->1929 1930->1936 1931->1921 1943 7ff665ef1b95-7ff665ef1ba6 1932->1943 1944 7ff665ef1bb0 call 7ff665ef1868 1932->1944 1933->1932 1941 7ff665ef1aee-7ff665ef1af2 1934->1941 1942 7ff665ef1b1b-7ff665ef1b2e GetProcAddress 1934->1942 1945 7ff665ef1a7e-7ff665ef1aa4 call 7ff665ef1868 RaiseException 1935->1945 1946 7ff665ef1a69-7ff665ef1a7c 1935->1946 1937 7ff665ef1ab4-7ff665ef1ab7 FreeLibrary 1936->1937 1938 7ff665ef1abd 1936->1938 1937->1938 1938->1924 1941->1942 1948 7ff665ef1af4-7ff665ef1aff 1941->1948 1942->1933 1947 7ff665ef1b30-7ff665ef1b43 GetLastError 1942->1947 1943->1944 1956 7ff665ef1bb5 1944->1956 1945->1923 1946->1936 1946->1945 1952 7ff665ef1b45-7ff665ef1b58 1947->1952 1953 7ff665ef1b5a-7ff665ef1b81 call 7ff665ef1868 RaiseException call 7ff665ef1558 1947->1953 1948->1942 1954 7ff665ef1b01-7ff665ef1b08 1948->1954 1952->1933 1952->1953 1953->1933 1954->1942 1958 7ff665ef1b0a-7ff665ef1b0f 1954->1958 1956->1923 1958->1942 1961 7ff665ef1b11-7ff665ef1b19 1958->1961 1961->1933 1961->1942
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: DloadSection$AccessExceptionProtectRaiseReleaseWrite$ErrorLastLibraryLoad
                                                  • String ID: H
                                                  • API String ID: 3432403771-2852464175
                                                  • Opcode ID: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                                                  • Instruction ID: b9576d9036fc5e5e7fdf47b07318e4359786dd54638eed26fc3d00cfd1b3785a
                                                  • Opcode Fuzzy Hash: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                                                  • Instruction Fuzzy Hash: A2914A62E05B56CAEF14CFA5E9512AC33B1BB48B98F484436EE0D5B754EF38E845C740

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1989 7ff665eef4e0-7ff665eef523 1990 7ff665eef894-7ff665eef8b9 call 7ff665ec1fa0 call 7ff665ef2320 1989->1990 1991 7ff665eef529-7ff665eef565 call 7ff665ef3cf0 1989->1991 1997 7ff665eef56a-7ff665eef571 1991->1997 1998 7ff665eef567 1991->1998 2000 7ff665eef582-7ff665eef586 1997->2000 2001 7ff665eef573-7ff665eef577 1997->2001 1998->1997 2004 7ff665eef58b-7ff665eef596 2000->2004 2005 7ff665eef588 2000->2005 2002 7ff665eef57c-7ff665eef580 2001->2002 2003 7ff665eef579 2001->2003 2002->2004 2003->2002 2006 7ff665eef59c 2004->2006 2007 7ff665eef628 2004->2007 2005->2004 2008 7ff665eef5a2-7ff665eef5a9 2006->2008 2009 7ff665eef62c-7ff665eef62f 2007->2009 2010 7ff665eef5ae-7ff665eef5b3 2008->2010 2011 7ff665eef5ab 2008->2011 2012 7ff665eef631-7ff665eef635 2009->2012 2013 7ff665eef637-7ff665eef63a 2009->2013 2014 7ff665eef5e5-7ff665eef5f0 2010->2014 2015 7ff665eef5b5 2010->2015 2011->2010 2012->2013 2016 7ff665eef660-7ff665eef673 call 7ff665ed63ac 2012->2016 2013->2016 2017 7ff665eef63c-7ff665eef643 2013->2017 2021 7ff665eef5f5-7ff665eef5fa 2014->2021 2022 7ff665eef5f2 2014->2022 2018 7ff665eef5ca-7ff665eef5d0 2015->2018 2034 7ff665eef675-7ff665eef693 call 7ff665ee13c4 2016->2034 2035 7ff665eef698-7ff665eef6ed call 7ff665ef797c call 7ff665ec129c call 7ff665ed32a8 call 7ff665ec1fa0 2016->2035 2017->2016 2019 7ff665eef645-7ff665eef65c 2017->2019 2025 7ff665eef5d2 2018->2025 2026 7ff665eef5b7-7ff665eef5be 2018->2026 2019->2016 2023 7ff665eef600-7ff665eef607 2021->2023 2024 7ff665eef8ba-7ff665eef8c1 2021->2024 2022->2021 2028 7ff665eef60c-7ff665eef612 2023->2028 2029 7ff665eef609 2023->2029 2032 7ff665eef8c3 2024->2032 2033 7ff665eef8c6-7ff665eef8cb 2024->2033 2025->2014 2030 7ff665eef5c3-7ff665eef5c8 2026->2030 2031 7ff665eef5c0 2026->2031 2028->2024 2037 7ff665eef618-7ff665eef622 2028->2037 2029->2028 2030->2018 2038 7ff665eef5d4-7ff665eef5db 2030->2038 2031->2030 2032->2033 2039 7ff665eef8de-7ff665eef8e6 2033->2039 2040 7ff665eef8cd-7ff665eef8d4 2033->2040 2034->2035 2056 7ff665eef742-7ff665eef74f ShellExecuteExW 2035->2056 2057 7ff665eef6ef-7ff665eef73d call 7ff665ef797c call 7ff665ec129c call 7ff665ed5b60 call 7ff665ec1fa0 2035->2057 2037->2007 2037->2008 2046 7ff665eef5e0 2038->2046 2047 7ff665eef5dd 2038->2047 2042 7ff665eef8eb-7ff665eef8f6 2039->2042 2043 7ff665eef8e8 2039->2043 2048 7ff665eef8d9 2040->2048 2049 7ff665eef8d6 2040->2049 2042->2009 2043->2042 2046->2014 2047->2046 2048->2039 2049->2048 2058 7ff665eef755-7ff665eef75f 2056->2058 2059 7ff665eef846-7ff665eef84e 2056->2059 2057->2056 2061 7ff665eef761-7ff665eef764 2058->2061 2062 7ff665eef76f-7ff665eef772 2058->2062 2064 7ff665eef882-7ff665eef88f 2059->2064 2065 7ff665eef850-7ff665eef866 2059->2065 2061->2062 2068 7ff665eef766-7ff665eef76d 2061->2068 2069 7ff665eef774-7ff665eef77f call 7ff665f2e188 2062->2069 2070 7ff665eef78e-7ff665eef7ad call 7ff665f2e1b8 call 7ff665eefe24 2062->2070 2064->1990 2066 7ff665eef87d call 7ff665ef220c 2065->2066 2067 7ff665eef868-7ff665eef87b 2065->2067 2066->2064 2067->2066 2072 7ff665eef8fb-7ff665eef903 call 7ff665ef7904 2067->2072 2068->2062 2074 7ff665eef7e3-7ff665eef7f0 CloseHandle 2068->2074 2069->2070 2089 7ff665eef781-7ff665eef78c ShowWindow 2069->2089 2070->2074 2096 7ff665eef7af-7ff665eef7b2 2070->2096 2079 7ff665eef805-7ff665eef80c 2074->2079 2080 7ff665eef7f2-7ff665eef803 call 7ff665ee13c4 2074->2080 2087 7ff665eef82e-7ff665eef830 2079->2087 2088 7ff665eef80e-7ff665eef811 2079->2088 2080->2079 2080->2087 2087->2059 2095 7ff665eef832-7ff665eef835 2087->2095 2088->2087 2094 7ff665eef813-7ff665eef828 2088->2094 2089->2070 2094->2087 2095->2059 2098 7ff665eef837-7ff665eef845 ShowWindow 2095->2098 2096->2074 2099 7ff665eef7b4-7ff665eef7c5 GetExitCodeProcess 2096->2099 2098->2059 2099->2074 2100 7ff665eef7c7-7ff665eef7dc 2099->2100 2100->2074
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_invalid_parameter_noinfo_noreturn
                                                  • String ID: .exe$.inf$Install$p
                                                  • API String ID: 1054546013-3607691742
                                                  • Opcode ID: 67b61dfe47284e38b67ea0c0b1901cc6ac0d6bddf6aab1d537367ec119b3a945
                                                  • Instruction ID: 7e3a9a0dd0a97a834e9361d014825a00f6b9f82b62585d1627282a35ac87072a
                                                  • Opcode Fuzzy Hash: 67b61dfe47284e38b67ea0c0b1901cc6ac0d6bddf6aab1d537367ec119b3a945
                                                  • Instruction Fuzzy Hash: 8DC1AD62F29A82C5FF00CB65EA5227923B1AF85F80F444035EA5D8B7A4DF3CEC958744

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                  • String ID:
                                                  • API String ID: 3569833718-0
                                                  • Opcode ID: c58ef51af4c11ae469b78d40ba7290d4e9656f32b0895ce54e4debee0d1a06d9
                                                  • Instruction ID: 33084928f6e9542271c99a79304ef5932099ed89c31b462447264b956a47fc9b
                                                  • Opcode Fuzzy Hash: c58ef51af4c11ae469b78d40ba7290d4e9656f32b0895ce54e4debee0d1a06d9
                                                  • Instruction Fuzzy Hash: B241BF71B24682C6F7008FB1E812BAA2770EB89F98F541135DE0A8FB95CE3DDC458B44
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 3668304517-0
                                                  • Opcode ID: 95f682f023754f56a0dcca5eb1f48e82665a17e2aa84d7a71d7c4cda38083178
                                                  • Instruction ID: b3b9abb3ca936d4862744c73748ec6e129f6f521abeff0eecca3f978e30bcaf2
                                                  • Opcode Fuzzy Hash: 95f682f023754f56a0dcca5eb1f48e82665a17e2aa84d7a71d7c4cda38083178
                                                  • Instruction Fuzzy Hash: EC12C162F08B42C5EF10DB64D5462AD2771EB85BA8F404232EA7D9BAD9DF3CD985C340

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 3528 7ff665ed24c0-7ff665ed24fb 3529 7ff665ed24fd-7ff665ed2504 3528->3529 3530 7ff665ed2506 3528->3530 3529->3530 3531 7ff665ed2509-7ff665ed2578 3529->3531 3530->3531 3532 7ff665ed257a 3531->3532 3533 7ff665ed257d-7ff665ed25a8 CreateFileW 3531->3533 3532->3533 3534 7ff665ed25ae-7ff665ed25de GetLastError call 7ff665ed6a0c 3533->3534 3535 7ff665ed2688-7ff665ed268d 3533->3535 3544 7ff665ed25e0-7ff665ed262a CreateFileW GetLastError 3534->3544 3545 7ff665ed262c 3534->3545 3537 7ff665ed2693-7ff665ed2697 3535->3537 3538 7ff665ed26a5-7ff665ed26a9 3537->3538 3539 7ff665ed2699-7ff665ed269c 3537->3539 3542 7ff665ed26cf-7ff665ed26e3 3538->3542 3543 7ff665ed26ab-7ff665ed26af 3538->3543 3539->3538 3541 7ff665ed269e 3539->3541 3541->3538 3547 7ff665ed26e5-7ff665ed26f0 3542->3547 3548 7ff665ed270c-7ff665ed2735 call 7ff665ef2320 3542->3548 3543->3542 3546 7ff665ed26b1-7ff665ed26c9 SetFileTime 3543->3546 3549 7ff665ed2632-7ff665ed263a 3544->3549 3545->3549 3546->3542 3550 7ff665ed26f2-7ff665ed26fa 3547->3550 3551 7ff665ed2708 3547->3551 3552 7ff665ed2673-7ff665ed2686 3549->3552 3553 7ff665ed263c-7ff665ed2653 3549->3553 3555 7ff665ed26ff-7ff665ed2703 call 7ff665ec20b0 3550->3555 3556 7ff665ed26fc 3550->3556 3551->3548 3552->3537 3557 7ff665ed2655-7ff665ed2668 3553->3557 3558 7ff665ed266e call 7ff665ef220c 3553->3558 3555->3551 3556->3555 3557->3558 3561 7ff665ed2736-7ff665ed273b call 7ff665ef7904 3557->3561 3558->3552
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: File$CreateErrorLast$Time_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 3536497005-0
                                                  • Opcode ID: dc46ff84bd0c57c9ac2b9914d0228e8f14f7433d989622a2074281460ea8d587
                                                  • Instruction ID: ea94dcb7346269a09af0eaf9361a32099d6c6414232bcbce2e58e5368353ff2a
                                                  • Opcode Fuzzy Hash: dc46ff84bd0c57c9ac2b9914d0228e8f14f7433d989622a2074281460ea8d587
                                                  • Instruction Fuzzy Hash: F061F762A18741C5EB208B29EA0136E67B1FB94BA8F101335DFAD4BAD8DF3DD854C744

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Global$Resource$Object$AllocBitmapCreateDeleteGdipLoadLock$FindFreeFromSizeofStreamUnlock
                                                  • String ID: ]
                                                  • API String ID: 3561356813-3352871620
                                                  • Opcode ID: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                                                  • Instruction ID: 685e0198733e581f2f1ee756436191d81a58a29d4ccc843c13981195a965af28
                                                  • Opcode Fuzzy Hash: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                                                  • Instruction Fuzzy Hash: DD115C61A1D282C2EE259B61E75627953B1AF88FC4F080034EA5D8FB99DE3CEC058A00

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Message$DialogDispatchPeekTranslate
                                                  • String ID:
                                                  • API String ID: 1266772231-0
                                                  • Opcode ID: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                                                  • Instruction ID: 0935c8930fbb4e685a2398e2fe757fd6dadab32624f83d2aa79035573f6004f1
                                                  • Opcode Fuzzy Hash: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                                                  • Instruction Fuzzy Hash: 4AF0EC76A38582C2FB509BA1E896A362371BFD0F05F945435EA4E8A864DF3CD908CB00

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                  • String ID: EDIT
                                                  • API String ID: 4243998846-3080729518
                                                  • Opcode ID: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                                                  • Instruction ID: ba804e2c44c57d729a31773c89f2ebe439b04267f5c86f221f57cccd2123d9d6
                                                  • Opcode Fuzzy Hash: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                                                  • Instruction Fuzzy Hash: 7E011261B18A87C1FE209B62F8127F663B0AF98F44F585031D94DCF655DE3CD9498A50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 3838 7ff665ed2ce0-7ff665ed2d0a 3839 7ff665ed2d13-7ff665ed2d1b 3838->3839 3840 7ff665ed2d0c-7ff665ed2d0e 3838->3840 3842 7ff665ed2d2b 3839->3842 3843 7ff665ed2d1d-7ff665ed2d28 GetStdHandle 3839->3843 3841 7ff665ed2ea9-7ff665ed2ec4 call 7ff665ef2320 3840->3841 3845 7ff665ed2d31-7ff665ed2d3d 3842->3845 3843->3842 3847 7ff665ed2d3f-7ff665ed2d44 3845->3847 3848 7ff665ed2d86-7ff665ed2da2 WriteFile 3845->3848 3850 7ff665ed2daf-7ff665ed2db3 3847->3850 3851 7ff665ed2d46-7ff665ed2d7a WriteFile 3847->3851 3849 7ff665ed2da6-7ff665ed2da9 3848->3849 3849->3850 3853 7ff665ed2ea2-7ff665ed2ea6 3849->3853 3850->3853 3854 7ff665ed2db9-7ff665ed2dbd 3850->3854 3851->3849 3852 7ff665ed2d7c-7ff665ed2d82 3851->3852 3852->3851 3855 7ff665ed2d84 3852->3855 3853->3841 3854->3853 3856 7ff665ed2dc3-7ff665ed2dd8 call 7ff665ecb4f8 3854->3856 3855->3849 3859 7ff665ed2e1e-7ff665ed2e6d call 7ff665ef797c call 7ff665ec129c call 7ff665ecbca8 3856->3859 3860 7ff665ed2dda-7ff665ed2de1 3856->3860 3859->3853 3871 7ff665ed2e6f-7ff665ed2e86 3859->3871 3860->3845 3862 7ff665ed2de7-7ff665ed2de9 3860->3862 3862->3845 3864 7ff665ed2def-7ff665ed2e19 3862->3864 3864->3845 3872 7ff665ed2e9d call 7ff665ef220c 3871->3872 3873 7ff665ed2e88-7ff665ed2e9b 3871->3873 3872->3853 3873->3872 3874 7ff665ed2ec5-7ff665ed2ecb call 7ff665ef7904 3873->3874
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$Handle
                                                  • String ID:
                                                  • API String ID: 4209713984-0
                                                  • Opcode ID: 759593f06e971a5af3dff942057e3884964648b854c35b3f90eb8150d1d2c130
                                                  • Instruction ID: 8afeebb74cbc1d7c4b412faff87b29ffa8cbb747c749f2c3694a97454df7c44f
                                                  • Opcode Fuzzy Hash: 759593f06e971a5af3dff942057e3884964648b854c35b3f90eb8150d1d2c130
                                                  • Instruction Fuzzy Hash: 7C51D562A19642C2EF118B25DA5677A2370FF95F90F444232FA4E8BA94DF3CE885C740

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$TextWindow
                                                  • String ID:
                                                  • API String ID: 2912839123-0
                                                  • Opcode ID: 5598f9f6159c26352fed43e9fa1146c75ce6583aafc26ff498caee47ac5bdfe3
                                                  • Instruction ID: 4f48f0fcaac8d248ae437de0d3a022cc3890ef559a465a6ae56fefd4dc4a863e
                                                  • Opcode Fuzzy Hash: 5598f9f6159c26352fed43e9fa1146c75ce6583aafc26ff498caee47ac5bdfe3
                                                  • Instruction Fuzzy Hash: DA518D62F14652C4FF109BA4E9462AD2332AF84FA4F804635EA5D9EBD5DFACD940C300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectory$ErrorLast_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 2359106489-0
                                                  • Opcode ID: 5cda4ea00785afd89f4b2a0283e369f756aeb3863be6a65230e4b36aaec5c4cf
                                                  • Instruction ID: f9d6772f6b83a0e80ee27e498b418d78cdc7c6e7bf2e40c95a9b0b65283b0df2
                                                  • Opcode Fuzzy Hash: 5cda4ea00785afd89f4b2a0283e369f756aeb3863be6a65230e4b36aaec5c4cf
                                                  • Instruction Fuzzy Hash: 8A317E62A0CA82C1EE609B25E65627A6371BBCCFA0F544331FA9DCB695DF3CDC458600
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                  • String ID:
                                                  • API String ID: 1452418845-0
                                                  • Opcode ID: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                                                  • Instruction ID: d7162d5b90e8fb70d7673f58532db404eefcb0254c6f1f7276d073c7d797945b
                                                  • Opcode Fuzzy Hash: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                                                  • Instruction Fuzzy Hash: 9C31F521A0D282C2EF55AB64FA232B922B1AF94B84F541435F90ECF2D7DE2DAC058641
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$FileHandleRead
                                                  • String ID:
                                                  • API String ID: 2244327787-0
                                                  • Opcode ID: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                                                  • Instruction ID: 1a812ba263cacbfb72f508862a34fb81edff276b33d09ae966d278722347f5ae
                                                  • Opcode Fuzzy Hash: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                                                  • Instruction Fuzzy Hash: 2D214121A08643C1EE605B11ED0123A6370BBA5F94F144631EE9D8F688CE7DDC858B51
                                                  APIs
                                                    • Part of subcall function 00007FF665EDECD8: ResetEvent.KERNEL32 ref: 00007FF665EDECF1
                                                    • Part of subcall function 00007FF665EDECD8: ReleaseSemaphore.KERNEL32 ref: 00007FF665EDED07
                                                  • ReleaseSemaphore.KERNEL32 ref: 00007FF665EDE974
                                                  • CloseHandle.KERNELBASE ref: 00007FF665EDE993
                                                  • DeleteCriticalSection.KERNEL32 ref: 00007FF665EDE9AA
                                                  • CloseHandle.KERNEL32 ref: 00007FF665EDE9B7
                                                    • Part of subcall function 00007FF665EDEA5C: WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF665EDE95F,?,?,?,00007FF665ED463A,?,?,?), ref: 00007FF665EDEA63
                                                    • Part of subcall function 00007FF665EDEA5C: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF665EDE95F,?,?,?,00007FF665ED463A,?,?,?), ref: 00007FF665EDEA6E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: CloseHandleReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                  • String ID:
                                                  • API String ID: 502429940-0
                                                  • Opcode ID: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                                                  • Instruction ID: 353e4512c95c1dc18a9426535adee12e94791e4a8d8a7b51a9bb92ad5e23f8e5
                                                  • Opcode Fuzzy Hash: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                                                  • Instruction Fuzzy Hash: DB012D32A15E81D2E6489B21E65526DB330FBC8B80F044131EB5E4B625CF39E8B48B80
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Thread$CreatePriority
                                                  • String ID: CreateThread failed
                                                  • API String ID: 2610526550-3849766595
                                                  • Opcode ID: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                                                  • Instruction ID: 9a2aad327069d369ade16c93b2da4bd8653cdeca7f00640bd6ba3d66ec36c5a6
                                                  • Opcode Fuzzy Hash: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                                                  • Instruction Fuzzy Hash: 82116332908A82C1EB10DB10E953179B375FB84F84F544232EA8E8B669DF7CED45CB40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: DirectoryInitializeMallocSystem
                                                  • String ID: riched20.dll
                                                  • API String ID: 174490985-3360196438
                                                  • Opcode ID: 0d85db053d286d1bd0fa19ead2840fc3f5149c6ee0f027e6ed6c33eb2c824e37
                                                  • Instruction ID: 52e85f35206160ee8704bac899660a67fe4a58bf90ef68c65be383bb355a6bd8
                                                  • Opcode Fuzzy Hash: 0d85db053d286d1bd0fa19ead2840fc3f5149c6ee0f027e6ed6c33eb2c824e37
                                                  • Instruction Fuzzy Hash: 1BF03CB1618A82C2EB009F60F8161AAB7B0FB88B54F540135EA8D8B654DF7CD959CF00
                                                  APIs
                                                    • Part of subcall function 00007FF665EE853C: GlobalMemoryStatusEx.KERNEL32 ref: 00007FF665EE856C
                                                    • Part of subcall function 00007FF665EDAAE0: LoadStringW.USER32 ref: 00007FF665EDAB67
                                                    • Part of subcall function 00007FF665EDAAE0: LoadStringW.USER32 ref: 00007FF665EDAB80
                                                    • Part of subcall function 00007FF665EC1FA0: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665EC1FFB
                                                    • Part of subcall function 00007FF665EC129C: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF665EC1396
                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665EF01BB
                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665EF01C1
                                                  • SendDlgItemMessageW.USER32 ref: 00007FF665EF01F2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$LoadString$Concurrency::cancel_current_taskGlobalItemMemoryMessageSendStatus
                                                  • String ID:
                                                  • API String ID: 3106221260-0
                                                  • Opcode ID: 8c360d5f5e245417109053446ee31c3b82c6562e62a189eed3094808beb71bb9
                                                  • Instruction ID: 76202278ef32c53e700dfe74babdf42ec5f9e4cf0450499c5a8fb2e217da8f24
                                                  • Opcode Fuzzy Hash: 8c360d5f5e245417109053446ee31c3b82c6562e62a189eed3094808beb71bb9
                                                  • Instruction Fuzzy Hash: 5C519F62F15682C6FF109BA5E5562FD2372ABC5F84F400235EA1E9F79ADE2CD901C340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task__std_exception_copy_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 2371198981-0
                                                  • Opcode ID: 38f8f32a5aa73e3028a820fc3bd1ecc749b441f7b309afffc1eaa69fcbc17178
                                                  • Instruction ID: e0ec025c69ad1c2d1a4436b5e6e6caf1f7fcaf80977345a14c1ffe9ba4eb9cae
                                                  • Opcode Fuzzy Hash: 38f8f32a5aa73e3028a820fc3bd1ecc749b441f7b309afffc1eaa69fcbc17178
                                                  • Instruction Fuzzy Hash: 9B41F062B08685C1EE08DB92E642279A361EB44FE0F448231EE7C8FBD5DF3CE4918304
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: CreateFile$_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 2272807158-0
                                                  • Opcode ID: 650906bb36444c59f78769edd7e70a31dc34f49dc41decdeb4024168be9b1e6b
                                                  • Instruction ID: 9542270f1b1fef30377cd4f34ba0c1478ede0004906ccbf5e012b2a47cab10a3
                                                  • Opcode Fuzzy Hash: 650906bb36444c59f78769edd7e70a31dc34f49dc41decdeb4024168be9b1e6b
                                                  • Instruction Fuzzy Hash: 08419172A18781C2EF108B15E94626963B1FB94BB4F105735EBAD4BAD5CF3CE8918600
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: TextWindow$Length_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 2176759853-0
                                                  • Opcode ID: 1bf85210b9a87779fb11811f9a7e2f8ba75c636e64e4f9da94f36f1c7ff0fb34
                                                  • Instruction ID: b946e7046a877409d2f8a04f70488c45bc954a6d606c60d57e865c9701ef84b1
                                                  • Opcode Fuzzy Hash: 1bf85210b9a87779fb11811f9a7e2f8ba75c636e64e4f9da94f36f1c7ff0fb34
                                                  • Instruction Fuzzy Hash: 54219C62A28B8282EA148B65E94117AA371FB89FD0F145231FBDD47B95CF3CD4808B40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: std::bad_alloc::bad_alloc
                                                  • String ID:
                                                  • API String ID: 1875163511-0
                                                  • Opcode ID: 0ac8b931c67533783bb99e44ed512301af0920adb1b65b15738df05c1e7b1342
                                                  • Instruction ID: 2c3af052a130c64ded49ea701f3479e2c1901460f0d92e6edf7bd352bce29a89
                                                  • Opcode Fuzzy Hash: 0ac8b931c67533783bb99e44ed512301af0920adb1b65b15738df05c1e7b1342
                                                  • Instruction Fuzzy Hash: EC317E22A18686D1FF259F14EA463B963B0FB50F84F544431E28D8A6E9DF7CED86C301
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 1203560049-0
                                                  • Opcode ID: 30421b436104fcb90b4cd2208b99a3bf3782908f0837f7a91d3eb4cb73bf7196
                                                  • Instruction ID: fd6931434caaf5e328b24645514bd1d07c59a54df99780d771b816a646d6b11f
                                                  • Opcode Fuzzy Hash: 30421b436104fcb90b4cd2208b99a3bf3782908f0837f7a91d3eb4cb73bf7196
                                                  • Instruction Fuzzy Hash: E321D662A08A81C1EE208B25E45626A6371FFC8F94F545330FA9D8B6D5DF3CD940CA40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: DeleteFile$_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 3118131910-0
                                                  • Opcode ID: 539e2a0488ada646b9a4eb5c90a9f278ffd13936dc8dbc7caf4118334a65d282
                                                  • Instruction ID: ffa9231b7ded610d2f861935d00bd72a37a74d187516dee11818e52cc06a3563
                                                  • Opcode Fuzzy Hash: 539e2a0488ada646b9a4eb5c90a9f278ffd13936dc8dbc7caf4118334a65d282
                                                  • Instruction Fuzzy Hash: BB217462A18B81C1EE108B25F95626E6371FBC8F94F501331FA9D8BA99DF3CD940CA40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 1203560049-0
                                                  • Opcode ID: a8bcf6e2598255fa991570dfaf367ef52c8767d47326b3423635884fafe6ecbe
                                                  • Instruction ID: 8527560941e4af6810434b3dedbd1a3847daaf21099c6ddb2cb8923bcf06a66e
                                                  • Opcode Fuzzy Hash: a8bcf6e2598255fa991570dfaf367ef52c8767d47326b3423635884fafe6ecbe
                                                  • Instruction Fuzzy Hash: 32216262A18681C1EE109B29F94612A6371FBC8FA4F541331FAAD8BBD5DF3CD941CA44
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Process$CurrentExitTerminate
                                                  • String ID:
                                                  • API String ID: 1703294689-0
                                                  • Opcode ID: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                                                  • Instruction ID: f5ea3966ce3d76e3cec8b6570516237667eb62d68155514d3e02fc38af307a9c
                                                  • Opcode Fuzzy Hash: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                                                  • Instruction Fuzzy Hash: 5EE01A25F04706C6EF546B21EDA637923766FC8F41F145438E90A8B396DE3DAC098B40
                                                  APIs
                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665ECF895
                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665ECF89B
                                                    • Part of subcall function 00007FF665ED3EC8: FindClose.KERNELBASE(?,?,00000000,00007FF665EE0811), ref: 00007FF665ED3EFD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$CloseFind
                                                  • String ID:
                                                  • API String ID: 3587649625-0
                                                  • Opcode ID: ca0581ef1bb473589dba99f130bc419ae7e505527f8951cee1cfdbbcd028e8d5
                                                  • Instruction ID: 7681f5e018d314be0604d6e3a2657d60509d082378a67f212afd923545e47ec7
                                                  • Opcode Fuzzy Hash: ca0581ef1bb473589dba99f130bc419ae7e505527f8951cee1cfdbbcd028e8d5
                                                  • Instruction Fuzzy Hash: E7917073A18681D0EF10DB64D9452AD6771FB84B98F504135FA6C8BAE9DF7CD985C300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 3668304517-0
                                                  • Opcode ID: 64605ea4c96cd6a261f561e4281ee818068104f0c146ac1253270dcee5fc1f01
                                                  • Instruction ID: 818e4e65e89b6ee3fcb9e9ddd47b660630d6ba2de0a9b76a61c4ac61b9c222b8
                                                  • Opcode Fuzzy Hash: 64605ea4c96cd6a261f561e4281ee818068104f0c146ac1253270dcee5fc1f01
                                                  • Instruction Fuzzy Hash: 78418262F14651C5FF00DBB5D5422AD2771AF88F98F145235EE2DAFB99DF38D8828200
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,00000002,?,00000F99,?,00007FF665ED274D), ref: 00007FF665ED28A9
                                                  • GetLastError.KERNEL32(?,00007FF665ED274D), ref: 00007FF665ED28B8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastPointer
                                                  • String ID:
                                                  • API String ID: 2976181284-0
                                                  • Opcode ID: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                                                  • Instruction ID: 56104bfda3e891e2fef1cf0e1cb4224c4065d2c230f3a859aec8af5ca8a9e484
                                                  • Opcode Fuzzy Hash: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                                                  • Instruction Fuzzy Hash: BD31A436B19A52C2EE604B2ADE426796370AFA4FD4F144231EE1D8F790DE3DDC418640
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Item_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 1746051919-0
                                                  • Opcode ID: 95739ad7301a08b82252912ada3ab6f57aee1bff7a48893d1edd4817af44debc
                                                  • Instruction ID: 53cecf99eecf37b6aac8a520dd5c24b1d131b48616a0c30e9a56ae1c95d28179
                                                  • Opcode Fuzzy Hash: 95739ad7301a08b82252912ada3ab6f57aee1bff7a48893d1edd4817af44debc
                                                  • Instruction Fuzzy Hash: FC31C122A18782C2EE149B29F94636E7371EB94F90F445231FBAD4BB95DF3CE8408704
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: File$BuffersFlushTime
                                                  • String ID:
                                                  • API String ID: 1392018926-0
                                                  • Opcode ID: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                                                  • Instruction ID: b905cfb4633e9de0d4721ce6aba4bb41a86002535933fa2faa81ccfc40cd2e4b
                                                  • Opcode Fuzzy Hash: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                                                  • Instruction Fuzzy Hash: 7D21E523E0DB52D5EE628E11DA063B667B1AF91F94F144231EE4C4B291EE7CDC46C200
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: LoadString
                                                  • String ID:
                                                  • API String ID: 2948472770-0
                                                  • Opcode ID: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                                                  • Instruction ID: e4826f22d48bb890bc033aab070b6118143e271ebb71f22dba5a953ab479faec
                                                  • Opcode Fuzzy Hash: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                                                  • Instruction Fuzzy Hash: 581190B2B08681C5EA008F56E94612877B2BB88FC0F544535DE4DEB720DFBCEA418F44
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastPointer
                                                  • String ID:
                                                  • API String ID: 2976181284-0
                                                  • Opcode ID: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                                                  • Instruction ID: ecccface1b8ef51c215a74bbd3af61e71115bcda3a69c58a9c76d1961ab9e1ba
                                                  • Opcode Fuzzy Hash: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                                                  • Instruction Fuzzy Hash: E3116022A08645C1EF608B25E9822696770EB94FA4F544332EA7D9B2D4CF3CED82C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ItemRectTextWindow$Clientswprintf
                                                  • String ID:
                                                  • API String ID: 3322643685-0
                                                  • Opcode ID: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                                                  • Instruction ID: bf0884f6a99fe873befe64e7c46996e3e4df261e3e7ac386eb522daa176c9c03
                                                  • Opcode Fuzzy Hash: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                                                  • Instruction Fuzzy Hash: 6B019260E0928AC2FE455791EA662BA17725F95F44F081034E8DE8F2D9DF3CEC848700
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(?,?,?,?,00007FF665EDEBAD,?,?,?,?,00007FF665ED5752,?,?,?,00007FF665ED56DE), ref: 00007FF665EDEB5C
                                                  • GetProcessAffinityMask.KERNEL32 ref: 00007FF665EDEB6F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Process$AffinityCurrentMask
                                                  • String ID:
                                                  • API String ID: 1231390398-0
                                                  • Opcode ID: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                                                  • Instruction ID: 084395a15ed65479d9e1b052ca8b4a0fa11ac660ecea5c3052261335e7155179
                                                  • Opcode Fuzzy Hash: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                                                  • Instruction Fuzzy Hash: 1AE09B61F14D86C6DF598F55C4565E9B3B2BFC8F40B848136E60BC7614DE3CE9498B40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                                  • String ID:
                                                  • API String ID: 1173176844-0
                                                  • Opcode ID: ac554a43d54612151bc7e480101717375080be3004ee5b366f50feb51e7139dd
                                                  • Instruction ID: 20fb90cc00d4292da4db3150471f8c95bcd4fc4e53f0308a5babc259ff74f6dc
                                                  • Opcode Fuzzy Hash: ac554a43d54612151bc7e480101717375080be3004ee5b366f50feb51e7139dd
                                                  • Instruction Fuzzy Hash: 9DE0B640E1A287C1FF286261AE271B801600FA9B70E585730FA7E8D2C2AF1CAC918114
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 485612231-0
                                                  • Opcode ID: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                                                  • Instruction ID: 28ae796a7d4b1453807b83ba310146ed02c12ab0c0df9b6be255d57114ffee15
                                                  • Opcode Fuzzy Hash: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                                                  • Instruction Fuzzy Hash: 5DE04668E09143C2FF09ABF2EA171B817B05FD4F50B088034E90ECF252EE3CAC818A01
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 3668304517-0
                                                  • Opcode ID: 8948bb9802c6c0987d886fae829bf96634841c4c74bd64b8e97cfea881f89bd5
                                                  • Instruction ID: 83a73215de7f8c8579ba99422a4a3134b9e206af4a9c201a2c86c9ab929ca305
                                                  • Opcode Fuzzy Hash: 8948bb9802c6c0987d886fae829bf96634841c4c74bd64b8e97cfea881f89bd5
                                                  • Instruction Fuzzy Hash: D0D18562B08681D6EF68CB25D7512BD6FB1FB49F84F040035EA6D8B7A5CF38E8618701
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: CompareString_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 1017591355-0
                                                  • Opcode ID: 60054bf23714923d6cf658706c57d8570bb270d346a0b8b9a17da1f048c8cd6a
                                                  • Instruction ID: 6255f8e51d61ea7319495978f5ce59161664230d7da8b384b1d7677e955fac6b
                                                  • Opcode Fuzzy Hash: 60054bf23714923d6cf658706c57d8570bb270d346a0b8b9a17da1f048c8cd6a
                                                  • Instruction Fuzzy Hash: 4B619F51A1C647C1EE649A25EA1727A52B1EFC5FD4F144232FE4ECEAC9EE6CEC418201
                                                  APIs
                                                    • Part of subcall function 00007FF665EDE948: ReleaseSemaphore.KERNEL32 ref: 00007FF665EDE974
                                                    • Part of subcall function 00007FF665EDE948: CloseHandle.KERNELBASE ref: 00007FF665EDE993
                                                    • Part of subcall function 00007FF665EDE948: DeleteCriticalSection.KERNEL32 ref: 00007FF665EDE9AA
                                                    • Part of subcall function 00007FF665EDE948: CloseHandle.KERNEL32 ref: 00007FF665EDE9B7
                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665EE1ACB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: CloseHandle$CriticalDeleteReleaseSectionSemaphore_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 904680172-0
                                                  • Opcode ID: 706733c944098cb8a605eaf932642e2f84c02d8e7386b9a1576d55af7d044be2
                                                  • Instruction ID: 62739e3f753cd913c76ac21d775ec3dcb1142fab57d684eab94914ca9e91e288
                                                  • Opcode Fuzzy Hash: 706733c944098cb8a605eaf932642e2f84c02d8e7386b9a1576d55af7d044be2
                                                  • Instruction Fuzzy Hash: 19614D62B266C5D2EE0CDBA5D6560BC7375FF80F94B544236E76D4FA85CF28E8A18300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 3668304517-0
                                                  • Opcode ID: 89b76225f611734f1827ebf27dd46062ec279a58f062f7148514824cdf62f394
                                                  • Instruction ID: 604547cd6d2e6def4922d9117c8b0d7c5013afcc911c5a41602920c158faff52
                                                  • Opcode Fuzzy Hash: 89b76225f611734f1827ebf27dd46062ec279a58f062f7148514824cdf62f394
                                                  • Instruction Fuzzy Hash: 0151A562A08A82C4EE159B25D5473A96B71FB86FC4F440136FE6D8B396CF3DE885C340
                                                  APIs
                                                    • Part of subcall function 00007FF665ED3EC8: FindClose.KERNELBASE(?,?,00000000,00007FF665EE0811), ref: 00007FF665ED3EFD
                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665ECE993
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: CloseFind_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 1011579015-0
                                                  • Opcode ID: 7ccb79097edba5c9ff264a6ea3acda2e11d4279ec26602cbe1bb149cda34522a
                                                  • Instruction ID: cbcbaadd7cc549f67a34be6dd1beebed323a1692c5c4fd2178ee4c632217e70d
                                                  • Opcode Fuzzy Hash: 7ccb79097edba5c9ff264a6ea3acda2e11d4279ec26602cbe1bb149cda34522a
                                                  • Instruction Fuzzy Hash: 89514C62A08A86C1FE61CB24D68736D7775FB84F84F440276EA9D8F7A5DF2CE8418710
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 3668304517-0
                                                  • Opcode ID: fa2a17a97775c6e4db7bd4990806455efc5e9f2c6fb18008f40fc3b9be66a623
                                                  • Instruction ID: f2a09e20072e5e36f37b9d06b99b1ef6aced53a205bb77753b54099821181bfc
                                                  • Opcode Fuzzy Hash: fa2a17a97775c6e4db7bd4990806455efc5e9f2c6fb18008f40fc3b9be66a623
                                                  • Instruction Fuzzy Hash: 1041C462B18A8182EE18DA57EB41369A261ABC4FC0F448535FE4C8FF5ADF3CD8918300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 3668304517-0
                                                  • Opcode ID: a8ea22521cea6cd4b61983f62ff8cdba4ac10663c0ba25c39cf8fdd3d1c97acc
                                                  • Instruction ID: f4ece8dd9446ac7fd504062fa552dd83a0625aad012f8e84fbc36d7efbdcee7b
                                                  • Opcode Fuzzy Hash: a8ea22521cea6cd4b61983f62ff8cdba4ac10663c0ba25c39cf8fdd3d1c97acc
                                                  • Instruction Fuzzy Hash: 5041CE62A08A42C1EE149F29E64637963B1EBD8FD8F141235FA5D8B6D9DF3DE8408640
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: HandleModule$AddressFreeLibraryProc
                                                  • String ID:
                                                  • API String ID: 3947729631-0
                                                  • Opcode ID: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                                                  • Instruction ID: 8dae62f7c51ee0134cab5da35b587aedfa5cbbde37b4005826f285f773b9229f
                                                  • Opcode Fuzzy Hash: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                                                  • Instruction Fuzzy Hash: 6441BF22E28A56C2FF249B50EA521782379AF94F40F544436EA0DCF6A5DF3DEC44CB40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                                                  • String ID:
                                                  • API String ID: 680105476-0
                                                  • Opcode ID: 41fe73495443f79e47f3f56e4fb3fe22cc61c7737b70dfa3b267077ac309d4e7
                                                  • Instruction ID: ffb3736f587eb1455ba4df93f3c678d902c2e541a564ce8137e934c6136ab3bb
                                                  • Opcode Fuzzy Hash: 41fe73495443f79e47f3f56e4fb3fe22cc61c7737b70dfa3b267077ac309d4e7
                                                  • Instruction Fuzzy Hash: D121A322A08351C5EE189E95E6022796A60EB45FF4F690730EE7E8FBC1DF7CE8518344
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                                                  • Instruction ID: 590bc459005b2a397ed1d35419e5e3055065059cf20315fba2cc7f3e54a59e2a
                                                  • Opcode Fuzzy Hash: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                                                  • Instruction Fuzzy Hash: 2B117C3290C682C2E7109B90E95293973B5FB80B88F580136E68DCF691DF3CEC408F84
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 3668304517-0
                                                  • Opcode ID: 454a1fcff6e1850c8b97cdd7684a735fd34d2cefc8bc4c1965818da2daadb151
                                                  • Instruction ID: 670e733f4ebf0223f4db83a18a8f054fab1fa47a326a90c280b968367d77fe1f
                                                  • Opcode Fuzzy Hash: 454a1fcff6e1850c8b97cdd7684a735fd34d2cefc8bc4c1965818da2daadb151
                                                  • Instruction Fuzzy Hash: 46016562A18A85C1EE159728E54626D7372FBC9F94F505331F6AC4B6A5DF2CD8408704
                                                  APIs
                                                    • Part of subcall function 00007FF665EF1604: GetModuleHandleW.KERNEL32(?,?,?,00007FF665EF1573,?,?,?,00007FF665EF192A), ref: 00007FF665EF162B
                                                  • DloadProtectSection.DELAYIMP ref: 00007FF665EF15C9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: DloadHandleModuleProtectSection
                                                  • String ID:
                                                  • API String ID: 2883838935-0
                                                  • Opcode ID: 908f49ac33541a8240f4269ada82e733cc5c0c647bda27ab8868a2cee9a60ef3
                                                  • Instruction ID: 81018cfb7b75302f8ce10db5f749adb57ae2ac7a357c46c83c684c5385b60fcc
                                                  • Opcode Fuzzy Hash: 908f49ac33541a8240f4269ada82e733cc5c0c647bda27ab8868a2cee9a60ef3
                                                  • Instruction Fuzzy Hash: 04117CE1D0868AC2FF549F95E9633742370AF94B58F540439D94DCF2A1EE3CAD958A40
                                                  APIs
                                                    • Part of subcall function 00007FF665ED40BC: FindFirstFileW.KERNELBASE ref: 00007FF665ED410B
                                                    • Part of subcall function 00007FF665ED40BC: FindFirstFileW.KERNELBASE ref: 00007FF665ED415E
                                                    • Part of subcall function 00007FF665ED40BC: GetLastError.KERNEL32 ref: 00007FF665ED41AF
                                                  • FindClose.KERNELBASE(?,?,00000000,00007FF665EE0811), ref: 00007FF665ED3EFD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Find$FileFirst$CloseErrorLast
                                                  • String ID:
                                                  • API String ID: 1464966427-0
                                                  • Opcode ID: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                                                  • Instruction ID: 1676e900acc917536509c40d3fa50b75ea97fa1b4eb74db6bcce1c8ff40fc465
                                                  • Opcode Fuzzy Hash: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                                                  • Instruction Fuzzy Hash: E7F04462508281C5DE609F75E3062B977709B99FB4F145335FA7D4B2C7CE28D844C745
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 3668304517-0
                                                  • Opcode ID: 0fb954f495e7f9b02f6a3e94d6a46f68925db21b8932cab22a75c4798dbb9f44
                                                  • Instruction ID: 8ddf8cf18e8014fed06c2980874ce8b8c18c463faf1988f9ccef03895c71f4e5
                                                  • Opcode Fuzzy Hash: 0fb954f495e7f9b02f6a3e94d6a46f68925db21b8932cab22a75c4798dbb9f44
                                                  • Instruction Fuzzy Hash: DCF09AA1B106C980EF189BA9D58A36C2362EF84F88F500421E75C8EA55DF6CD8808300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: File
                                                  • String ID:
                                                  • API String ID: 749574446-0
                                                  • Opcode ID: 182d9e1e92039184aab4081fafd09b1cf385b4bd914a3c272b872952a66d9790
                                                  • Instruction ID: f1121bc4993304a760ad23c9bc451e5f67f8c0ab489cd006d7eaf00ee3b09161
                                                  • Opcode Fuzzy Hash: 182d9e1e92039184aab4081fafd09b1cf385b4bd914a3c272b872952a66d9790
                                                  • Instruction Fuzzy Hash: 0CE08C12A20915C2EF60AB2ACC636791330AF88F85B481031DE0C8B321CE28C8818A40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: FileType
                                                  • String ID:
                                                  • API String ID: 3081899298-0
                                                  • Opcode ID: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                                                  • Instruction ID: aa48a4291a8bef7dc09206893172591209f2ff41e4acae46bd1969f6e05c8f62
                                                  • Opcode Fuzzy Hash: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                                                  • Instruction Fuzzy Hash: 0CD01212D09451C2DD109735DD5303D2360AFE2B39FA40731EA3EC66E1CE2D9896A751
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: CurrentDirectory
                                                  • String ID:
                                                  • API String ID: 1611563598-0
                                                  • Opcode ID: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                                                  • Instruction ID: 54bce7ca91a01e281825313830677e1f4d897b01557887ccfef764dd81aad396
                                                  • Opcode Fuzzy Hash: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                                                  • Instruction Fuzzy Hash: 88C08C20F09502C1DE085B26C8CA11913B4BB80F04B648035D10CC6120CE3CC8EA9785
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: AllocHeap
                                                  • String ID:
                                                  • API String ID: 4292702814-0
                                                  • Opcode ID: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                                                  • Instruction ID: 0e4594c8acb9fe56e2825550755ebe9da1551fb78d1c15d5df1683dc0fad4d08
                                                  • Opcode Fuzzy Hash: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                                                  • Instruction Fuzzy Hash: BFF04955F09A07C5FF545B61EB132B412B05FC4F80F486430E91ECE381EE2CEE818620
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: CloseHandle
                                                  • String ID:
                                                  • API String ID: 2962429428-0
                                                  • Opcode ID: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                                                  • Instruction ID: 438cc10875521fc273e688cfd4ce9cbb2aa7f6d4f6697d3016e6d7d4bcf03187
                                                  • Opcode Fuzzy Hash: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                                                  • Instruction Fuzzy Hash: 56F08C22A08682C5FF248B20EA422792771EB64F79F488335EB3D8A1D4CF28DC958700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: AllocHeap
                                                  • String ID:
                                                  • API String ID: 4292702814-0
                                                  • Opcode ID: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                                                  • Instruction ID: 14172d7e8ada26b78ebf106a49b88d0888906abe78ccec1a27823328ceb7ccf6
                                                  • Opcode Fuzzy Hash: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                                                  • Instruction Fuzzy Hash: 4BF0DA59B09246C6FF5456A1EB522B52AB05FC8FA0F485A30E96ECE2C1EE6CAC808511
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$CloseErrorFileHandleLastwcscpy$ControlCreateCurrentDeleteDeviceDirectoryProcessRemove
                                                  • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                  • API String ID: 2659423929-3508440684
                                                  • Opcode ID: f1e6eec8ecbe5e09d381db8a89365ebfa2c377f5d47fbbeb23eb751c6f3faf25
                                                  • Instruction ID: bbc900ca9f85d78fd5bf6e6685216b58ac9af5c63ee9817f9d2088fc675950f3
                                                  • Opcode Fuzzy Hash: f1e6eec8ecbe5e09d381db8a89365ebfa2c377f5d47fbbeb23eb751c6f3faf25
                                                  • Instruction Fuzzy Hash: E462C262F08682C5FF00DBB4D5462BD2771AB85BA4F505232EA7D9BAD5DF38E985C300
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastLoadString$Concurrency::cancel_current_taskInit_thread_footer
                                                  • String ID: %ls$%s: %s
                                                  • API String ID: 2539828978-2259941744
                                                  • Opcode ID: 7531b1a8951024dce7d14e1856eeb041d056becd58a60b273f62812b6ec532c2
                                                  • Instruction ID: b0b4396f864b03e9bf5ee15a755995e3010559d714c00e230d83a28c175f30da
                                                  • Opcode Fuzzy Hash: 7531b1a8951024dce7d14e1856eeb041d056becd58a60b273f62812b6ec532c2
                                                  • Instruction Fuzzy Hash: 4AB2B962E68682C1EE149B65E6561BE6331EFC5B90F105336F69D8B6D6DF3CE940C300
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfomemcpy_s
                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                  • API String ID: 1759834784-2761157908
                                                  • Opcode ID: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                                                  • Instruction ID: 45fcf3fea896abcee81a56544bdf403e632d47567d576b78310b19f90f53fd96
                                                  • Opcode Fuzzy Hash: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                                                  • Instruction Fuzzy Hash: 7BB20A72A08182CBE7658E25D951BFD37B1FB84B88F545136DA099BB84DF39ED048F80
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: NamePath$File_invalid_parameter_noinfo_noreturn$LongMoveShort$CompareCreateString
                                                  • String ID: rtmp
                                                  • API String ID: 3587137053-870060881
                                                  • Opcode ID: 6844fc52beb637c2b27de38a8f1773b81546f1263b6adb3febe2d016913ca72a
                                                  • Instruction ID: 65824ef97b8f70f97ac8464eafe6885110d20220ce7911cd0accba145d3e8200
                                                  • Opcode Fuzzy Hash: 6844fc52beb637c2b27de38a8f1773b81546f1263b6adb3febe2d016913ca72a
                                                  • Instruction Fuzzy Hash: 14F1B322B08A82C1EF14DBA5D9421BD6771EBD5BC4F501232FA4D8BAA9DF3CD984C740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: FullNamePath_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 1693479884-0
                                                  • Opcode ID: b93ad2ce8aad967ae532d61f25a7d43417873e191935b00f4afba2dee12255a3
                                                  • Instruction ID: 2a8e3ff46df7ab6a929664058dcd35594b5de1b2d5c6b894252bf42bea727763
                                                  • Opcode Fuzzy Hash: b93ad2ce8aad967ae532d61f25a7d43417873e191935b00f4afba2dee12255a3
                                                  • Instruction Fuzzy Hash: F3A1A062F15A52C4FF109B79DA461BC2331AB85FA4B545336EE2D9BBC9DE3CE8418200
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                                                  • Instruction ID: d4b27491aa08dd3236bd752d8aa8f60f8d815ad027bbb7f2fd9b2b72cd946a5f
                                                  • Opcode Fuzzy Hash: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                                                  • Instruction Fuzzy Hash: D0311272609B81CAEB649F64E8513ED7374FB88B44F44443ADA4D8BB99DF38D948C710
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                                                  • Instruction ID: 44173ec1c236cbd5400088231d335625473da9504a17b7add3f7b943511034c0
                                                  • Opcode Fuzzy Hash: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                                                  • Instruction Fuzzy Hash: 7A316D36618B81C6EB608F25E8512AE73B0FBC8B54F540136EA8D87B99DF38D945CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 3668304517-0
                                                  • Opcode ID: fb96d10bca390bfec114724123450dd1eda7456c883d7babf62e98013e8dd4f7
                                                  • Instruction ID: cc31d4d6d65bd48c560fbd2f93020358294334ff41fc5e4ae57b46073b181f15
                                                  • Opcode Fuzzy Hash: fb96d10bca390bfec114724123450dd1eda7456c883d7babf62e98013e8dd4f7
                                                  • Instruction Fuzzy Hash: 98B1CF62B14A86C6EF149BA5D9422ED2771FF85B84F505231FA6D8BB99DF3CD940C300
                                                  APIs
                                                  • _invalid_parameter_noinfo.LIBCMT ref: 00007FF665EFFAC4
                                                    • Part of subcall function 00007FF665EF7934: GetCurrentProcess.KERNEL32(00007FF665F00CCD), ref: 00007FF665EF7961
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: CurrentProcess_invalid_parameter_noinfo
                                                  • String ID: *?$.
                                                  • API String ID: 2518042432-3972193922
                                                  • Opcode ID: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                                                  • Instruction ID: f9aeb3d00ad8fa3d0f5ab9d371ddc8b131951e1a908adbb6e428a931ef5a2dc7
                                                  • Opcode Fuzzy Hash: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                                                  • Instruction Fuzzy Hash: BF51C462B14A9581EF10DFA1E6124BD67B5FB84FD8B444531EE2D9BB85EE3CD841C300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: memcpy_s
                                                  • String ID:
                                                  • API String ID: 1502251526-0
                                                  • Opcode ID: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                                  • Instruction ID: cc9386c216572b3ca55373eeb3df800e8aeae0f775778f2b8714a78e46c1a8d2
                                                  • Opcode Fuzzy Hash: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                                  • Instruction Fuzzy Hash: E7D1C232B18286C7EB74CF15E59566AB7A1F788B84F188135CB4E9BB44DE3DEC418B40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ErrorFormatFreeLastLocalMessage
                                                  • String ID:
                                                  • API String ID: 1365068426-0
                                                  • Opcode ID: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                                                  • Instruction ID: c95960ddf8d0d48625d4a9f6110033d02734c1014ad37c3bfb78ed9351087148
                                                  • Opcode Fuzzy Hash: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                                                  • Instruction Fuzzy Hash: B601EC72A08742C2EB109F22F95117A67A5BB89BC0F484135EE9E8BB49CF3CD9058F44
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: .
                                                  • API String ID: 0-248832578
                                                  • Opcode ID: 7c9d8364e7b62915daf92aecf888b4814fe01b6aae5fc02ec6e7aa2f3019df5b
                                                  • Instruction ID: 1df69dfecc8bf23eb0cb7ae6388f94ff2affde4f58b147a6eacb05809d7616bd
                                                  • Opcode Fuzzy Hash: 7c9d8364e7b62915daf92aecf888b4814fe01b6aae5fc02ec6e7aa2f3019df5b
                                                  • Instruction Fuzzy Hash: FE310E61B1469185EB209B36E9067A96A61ABD4FE4F148235EE6C8BBC5CE3CD901C300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ExceptionRaise_clrfp
                                                  • String ID:
                                                  • API String ID: 15204871-0
                                                  • Opcode ID: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                                                  • Instruction ID: 166089503af689650e4c5de08580261db3651560ff9806bcdbf859697ed08cc3
                                                  • Opcode Fuzzy Hash: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                                                  • Instruction Fuzzy Hash: D6B14C73605B85CAEB15CF29C4563683BB0F744F58F198922DA5D8B7A8CF79D851CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ObjectRelease$CapsDevice
                                                  • String ID:
                                                  • API String ID: 1061551593-0
                                                  • Opcode ID: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                                                  • Instruction ID: 4ce9f7db0c5168930f9bcaf38099328d070a6f54d0fefc863443b7dc52f876b1
                                                  • Opcode Fuzzy Hash: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                                                  • Instruction Fuzzy Hash: CC811766B18A45C6EB208F6AE8516AD3771FB88F98F044132DE0D9B728DF38D945C780
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: FormatInfoLocaleNumber
                                                  • String ID:
                                                  • API String ID: 2169056816-0
                                                  • Opcode ID: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                                                  • Instruction ID: 44f6bb4bc5ec90b5c6773c7f0b874fc9e6219e1798da1a646e5c2c1bc6064b9a
                                                  • Opcode Fuzzy Hash: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                                                  • Instruction Fuzzy Hash: 24114A72A19B81D5E7618B51E8123A97370FF88B84F844135EA4D8B758DF3CD945CB44
                                                  APIs
                                                    • Part of subcall function 00007FF665ED24C0: CreateFileW.KERNELBASE ref: 00007FF665ED259B
                                                    • Part of subcall function 00007FF665ED24C0: GetLastError.KERNEL32 ref: 00007FF665ED25AE
                                                    • Part of subcall function 00007FF665ED24C0: CreateFileW.KERNEL32 ref: 00007FF665ED260E
                                                    • Part of subcall function 00007FF665ED24C0: GetLastError.KERNEL32 ref: 00007FF665ED2617
                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF665ED15D0
                                                    • Part of subcall function 00007FF665ED3980: MoveFileW.KERNEL32 ref: 00007FF665ED39BD
                                                    • Part of subcall function 00007FF665ED3980: MoveFileW.KERNEL32 ref: 00007FF665ED3A34
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: File$CreateErrorLastMove$_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 34527147-0
                                                  • Opcode ID: b6c9c40237190830a1427cc90f699f3ed679a8c4b0b9819d305839f030af1316
                                                  • Instruction ID: 7ddb15524e52db58fd79331a47942fe6529fd72ae82ca32910c5e33136aff713
                                                  • Opcode Fuzzy Hash: b6c9c40237190830a1427cc90f699f3ed679a8c4b0b9819d305839f030af1316
                                                  • Instruction Fuzzy Hash: CB91AC22B18A42C2EE14DBA6DA462AE6371FB94FC4F401132FE4D8BA95DE3CD945C340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Version
                                                  • String ID:
                                                  • API String ID: 1889659487-0
                                                  • Opcode ID: 6220f8f0736b52f52a4f9f0684f7fcd1da0b773ba531a70ae5974f71c0de4052
                                                  • Instruction ID: a7e1e6d3f2426b9118cdfc69c93bf4427f678eec1e52f3e46f73de48532a680c
                                                  • Opcode Fuzzy Hash: 6220f8f0736b52f52a4f9f0684f7fcd1da0b773ba531a70ae5974f71c0de4052
                                                  • Instruction Fuzzy Hash: 2001D7B2909682CBE6648B10E85277A33B2FBD8B14F500235E65E8B794DF3CE9058E00
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID: 0
                                                  • API String ID: 3215553584-4108050209
                                                  • Opcode ID: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                                                  • Instruction ID: 4e6f1cbdfab962125ce0e71d5659dee1d7a689e1b530f8e8e3b4950f6b85d6a0
                                                  • Opcode Fuzzy Hash: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                                                  • Instruction Fuzzy Hash: D381E062B1C242C2EFA88A16E64267922B4AFE1F48F141531FD49CF695CF3EEC01C201
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID: 0
                                                  • API String ID: 3215553584-4108050209
                                                  • Opcode ID: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                                                  • Instruction ID: 702a0661d9eb10728c80c20d2da429fc50b4368ead63f5f4274a3f70ad6977ce
                                                  • Opcode Fuzzy Hash: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                                                  • Instruction Fuzzy Hash: 4471C262E0CA42C6EFA88A1AE24227D23B1DFC1F44F145531ED49CF696CE2DEC468751
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: gj
                                                  • API String ID: 0-4203073231
                                                  • Opcode ID: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                                                  • Instruction ID: 4e3aac7b5edab63aa194f05965d2c7577d4d138dbf42289d3f65bda5b28b7957
                                                  • Opcode Fuzzy Hash: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                                                  • Instruction Fuzzy Hash: 85518F37B286908BD724CF25E401A9AB3B5F388798F455126EF4A97B09CF39E945CF40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: @
                                                  • API String ID: 0-2766056989
                                                  • Opcode ID: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                                                  • Instruction ID: 7024887bfb1962128411407fca35838e5db19d02036c579f75be22a13c06ef3c
                                                  • Opcode Fuzzy Hash: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                                                  • Instruction Fuzzy Hash: 3141BD72718A44C6EF08CF2AE5162A973A1A798FD0B5DA036EE0D8B754DE3CD842C340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: HeapProcess
                                                  • String ID:
                                                  • API String ID: 54951025-0
                                                  • Opcode ID: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                                                  • Instruction ID: 8b18e3b2d542b5da9909e83ab0aa377fc6d3c864802e23968e2973a3f1193270
                                                  • Opcode Fuzzy Hash: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                                                  • Instruction Fuzzy Hash: F1B09220E17A46C2EA082B51AE9325423B4BF88B00F988039C10CC7320DE3C28E54B00
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 93e830777a8553980f5fe243353a36f6d8d27a5fc8052bc9569f2c684e316ecf
                                                  • Instruction ID: 0bf484ff3e9107a1b91b11f9589076905de371115b3d26127a219edc0d6a91b8
                                                  • Opcode Fuzzy Hash: 93e830777a8553980f5fe243353a36f6d8d27a5fc8052bc9569f2c684e316ecf
                                                  • Instruction Fuzzy Hash: 6482F4A2A196C1C6DB15CF24D5062BC7BB1E755F88F198136EA8E8B395DE3CE845C310
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                                                  • Instruction ID: 40d340103f1ca7803457190884ca09876645c7fe5423351b258246aa76cf026c
                                                  • Opcode Fuzzy Hash: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                                                  • Instruction Fuzzy Hash: 27628E9AD3AF9A1EE303A53954131D2E35C0EF74C9551E31BFCE431E66EB92A6832314
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 569adc29ececf777b1726fc3f5cd67d4b9927b4b604ee9515eb09b13eba64041
                                                  • Instruction ID: 427be36beb17568822c9961177044b1dcc063f39b692c51144e373853a447222
                                                  • Opcode Fuzzy Hash: 569adc29ececf777b1726fc3f5cd67d4b9927b4b604ee9515eb09b13eba64041
                                                  • Instruction Fuzzy Hash: DF8210B3A196C18ADB24CF28D6056FC7BB1E755F48F088136EA4E8B789DE3C9845C710
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                                                  • Instruction ID: 40279294a4350a2f3e73c2d31ba5f63de193d97e01bfa6b42f68d4ad9aa15505
                                                  • Opcode Fuzzy Hash: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                                                  • Instruction Fuzzy Hash: 6D22E3B3B246508BD728CF25D89AA5E3766F798744B4B8228DF0ACB785DF38D505CB40
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                                                  • Instruction ID: ee317122851093af8296d042b318293ec0eead1b9fb59c46dae79d967ed51d28
                                                  • Opcode Fuzzy Hash: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                                                  • Instruction Fuzzy Hash: 5332A272A14691CBEB18CF24D651ABC37B1F754B48F05813AEA4A9BB88DF3CAC55C740
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                                                  • Instruction ID: 4b8feaca57192e1fa2f3f7bd5a476816d3095b85d258e5017b55d3b9321a4a9c
                                                  • Opcode Fuzzy Hash: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                                                  • Instruction Fuzzy Hash: DAC18DB7B281908FE350CF7AE400A9D3BB1F39878CB519125EF59A7B09D639DA45CB40
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                                                  • Instruction ID: cbe54c7d4af6c36c990f1cc08f53a82c699d7b2eef1b8923222f56a2064e903a
                                                  • Opcode Fuzzy Hash: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                                                  • Instruction Fuzzy Hash: 5BA12773A181D2C6EF25CE28DA067BD27A1EBA4B44F454635EA899F785DE3CEC41C700
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                                                  • Instruction ID: b9b3f9dffa7dbda23e801036b4a7884ab3c755dc7e547ed594a1d399c224ed0e
                                                  • Opcode Fuzzy Hash: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                                                  • Instruction Fuzzy Hash: 37C13773A291E08DE302CBB5E4208FD3FF5E75E70DB4A4251EF9656B4AD6285201DF20
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: AddressProc
                                                  • String ID:
                                                  • API String ID: 190572456-0
                                                  • Opcode ID: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                                                  • Instruction ID: 22703a3a0c153a8a1a8454c01004c86793af249de26c185d5405d3a4944c07e0
                                                  • Opcode Fuzzy Hash: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                                                  • Instruction Fuzzy Hash: 6F91FE62B1858196EF11CF29E5522ED6731FF95B88F441131FE4E8BA49EF38EA46C700
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                                                  • Instruction ID: cd6dae3266ffaf422361bdd27fd0af160862a68bb9f14dd9f319e783e9732ff2
                                                  • Opcode Fuzzy Hash: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                                                  • Instruction Fuzzy Hash: 8E613463F081D189EF01CF75C6014FD7BB5A789B84B458232EE9A9B646EE39E905CF10
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                                                  • Instruction ID: cfa7b3bd5c8cafec9499819ed62f9d38f5b3d917661786a1857140517a11dc3a
                                                  • Opcode Fuzzy Hash: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                                                  • Instruction Fuzzy Hash: A5510673B281928BEB298F24EA0576D3761F7A4F44F454134EB498B688DE3DDD41CB00
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                                                  • Instruction ID: d7a285202572b82403cafd788085598238168b668d573e41a8df6be712e0457e
                                                  • Opcode Fuzzy Hash: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                                                  • Instruction Fuzzy Hash: D731A6A2A185828BEB18DF1ADA5227E77E1B795744F048139EF4ACB741DE7CE841CB00
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 20052d42666034676028b01d15d2cffdefdd266dec7e2dd0f98b8d8f07818195
                                                  • Instruction ID: 47c0c61ae4000515960db6033a2bcf4f18810b57a16389c1fb51008835f4c5c3
                                                  • Opcode Fuzzy Hash: 20052d42666034676028b01d15d2cffdefdd266dec7e2dd0f98b8d8f07818195
                                                  • Instruction Fuzzy Hash: 48F062B2B18295CBDBA48F69E84362977E0F708780F84843DD68DC7B04DE3C98A08F04
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                                                  • Instruction ID: eeeb9f26b7629571efa4b902a302e200d4e139c10ed985851ab99db7142989ad
                                                  • Opcode Fuzzy Hash: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                                                  • Instruction Fuzzy Hash: 67A0026194DC42D0EB48CB14F9720712330FBD4B00B940032F15DCA0A4DF3CAC01C741
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID: :$EFS:$LOGGED_UTILITY_STREAM$:$I30:$INDEX_ALLOCATION$:$TXF_DATA:$LOGGED_UTILITY_STREAM$::$ATTRIBUTE_LIST$::$BITMAP$::$DATA$::$EA$::$EA_INFORMATION$::$FILE_NAME$::$INDEX_ALLOCATION$::$INDEX_ROOT$::$LOGGED_UTILITY_STREAM$::$OBJECT_ID$::$REPARSE_POINT
                                                  • API String ID: 3668304517-727060406
                                                  • Opcode ID: 74d68d42448b2834d40d390ad32eed462d68e051ec4e29c63c0154d737a3ceed
                                                  • Instruction ID: 243a676b72c0af055af2d966217bede5e1f718fdd6ca24b0ad4eb2ecba75c807
                                                  • Opcode Fuzzy Hash: 74d68d42448b2834d40d390ad32eed462d68e051ec4e29c63c0154d737a3ceed
                                                  • Instruction Fuzzy Hash: 6F411876B06F41D9EB009B60E9523E833B5EB48B98F440136DA5D8B768EF38D955C780
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                  • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                  • API String ID: 2565136772-3242537097
                                                  • Opcode ID: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                                                  • Instruction ID: 684dd770424716a16ab4b4010fe9ddd9f46bab7d01532c1ef2306d625aeb4a12
                                                  • Opcode Fuzzy Hash: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                                                  • Instruction Fuzzy Hash: CB21C960E19B83C1EF559B51FD6617423B0AF98F80F984435D90ECB6A0DF3CAC458A50
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$Xinvalid_argumentstd::_
                                                  • String ID: DXGIDebug.dll$UNC$\\?\
                                                  • API String ID: 4097890229-4048004291
                                                  • Opcode ID: 49a63e71edebf0e47042e7ea65e43b03e9a3fa67d865ab852c8f354cac801883
                                                  • Instruction ID: fee3063451429c1f07796c47a384bd8fa95d19a4002a99c67f648dd1478ccdcc
                                                  • Opcode Fuzzy Hash: 49a63e71edebf0e47042e7ea65e43b03e9a3fa67d865ab852c8f354cac801883
                                                  • Instruction Fuzzy Hash: 3A12AE22B08A42C4EF10DF65E5461AD6371EB81F88F504236EA6D8BBE9DF3CD945C340
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskDialog
                                                  • String ID: GETPASSWORD1$Software\WinRAR SFX
                                                  • API String ID: 431506467-1315819833
                                                  • Opcode ID: d8322a208530c57668d9ab0bd9eeb9a998ed53718cd7cec1bf797515a4396991
                                                  • Instruction ID: 41168798473ba9450487d43ac150004d8822770613a1b8491771faa73a39dcc7
                                                  • Opcode Fuzzy Hash: d8322a208530c57668d9ab0bd9eeb9a998ed53718cd7cec1bf797515a4396991
                                                  • Instruction Fuzzy Hash: E1B1B062F59782C5FF00DBA4D54A2BC2372AB85B94F404235EA5C6BAD9DF3CE845C344
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$Global$AllocCreateStream
                                                  • String ID: </html>$<html>$<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                  • API String ID: 2868844859-1533471033
                                                  • Opcode ID: 99020ba5446ec8b5071b5be278ebc62a02c6a64c5a04705e5c2bdc59161e89ed
                                                  • Instruction ID: 5aedf009b76fa13121ca405b0a84bd64f246dc0cf295f4f7a550a61e3b6f3d95
                                                  • Opcode Fuzzy Hash: 99020ba5446ec8b5071b5be278ebc62a02c6a64c5a04705e5c2bdc59161e89ed
                                                  • Instruction Fuzzy Hash: 06818162F18B82C5FF00DBA5DA521ED2371AF84B94F444136EE1D9B69AEF38D906C340
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                                                  • API String ID: 3215553584-2617248754
                                                  • Opcode ID: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                                                  • Instruction ID: 6ea8f70fea362fa0f8e8a7c7aec206954a400df0c32d1147f45a9b9927e307c5
                                                  • Opcode Fuzzy Hash: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                                                  • Instruction Fuzzy Hash: 4A41CE72A0AB45C9FB40CF24E8527AD37B5EB54B94F054136EE4C8BB94DE38D425C384
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Window$MessageObjectSend$ClassDeleteLongName
                                                  • String ID: STATIC
                                                  • API String ID: 2845197485-1882779555
                                                  • Opcode ID: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                                                  • Instruction ID: c4cc6ea152f91e336f0fb83d10f206a5c2f2260edc841688f83afd3812fbef19
                                                  • Opcode Fuzzy Hash: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                                                  • Instruction Fuzzy Hash: 96317275B18683C6FE609B61E6567B923B1AB89F80F540430EE4D8BB95DE3CDC068B40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ItemTextWindow
                                                  • String ID: LICENSEDLG
                                                  • API String ID: 2478532303-2177901306
                                                  • Opcode ID: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                                                  • Instruction ID: 2e13fd1303ad000a9be8ef68a3f5a970eef82af78b08f519e87cd0624f10d98b
                                                  • Opcode Fuzzy Hash: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                                                  • Instruction Fuzzy Hash: BC41A371E18692C2FB148B61E9167792771AF84F84F544435EA0E8FBA5CF3CED458B00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$CurrentDirectoryProcessSystem
                                                  • String ID: Crypt32.dll$CryptProtectMemory$CryptProtectMemory failed$CryptUnprotectMemory$CryptUnprotectMemory failed
                                                  • API String ID: 2915667086-2207617598
                                                  • Opcode ID: d2e93635ec338890dfe438c4789fcaf7e26687fbfe6c7ce53d5981307f2d6baa
                                                  • Instruction ID: e131c898358eed546d1ff15f917cfcb5220d7ebf63fdb93ffbfe87066b7dc7e0
                                                  • Opcode Fuzzy Hash: d2e93635ec338890dfe438c4789fcaf7e26687fbfe6c7ce53d5981307f2d6baa
                                                  • Instruction Fuzzy Hash: D0314164F0AB46C0FE148B55EA6217527B4AF84F90F485235D85DCF3A9EE3CED458B40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID: $
                                                  • API String ID: 3668304517-227171996
                                                  • Opcode ID: c3d23b65519d6b0e16bf2cf387636935753ce78294b0e94f23a44a4be1d6057b
                                                  • Instruction ID: c7724e8ca12583f1b0be90621a7669bba2af522a6de3c5f02a754c31321ce79f
                                                  • Opcode Fuzzy Hash: c3d23b65519d6b0e16bf2cf387636935753ce78294b0e94f23a44a4be1d6057b
                                                  • Instruction Fuzzy Hash: 10F1E4A2F29B86C0EF049B64D6461BC2372AB94F98F405631EA6D9B7D5DF7CD880C340
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Is_bad_exception_allowedabortstd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 2940173790-393685449
                                                  • Opcode ID: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                                                  • Instruction ID: 6e843b94d179f041e3847a3329bc059b8f24604bd92850c4f210e72d56ac9b91
                                                  • Opcode Fuzzy Hash: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                                                  • Instruction Fuzzy Hash: 9BE1B473908782CAEB109F25E5423AD7BB0FB95B58F144136EA8D8B695CF38E885C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: AllocClearStringVariant
                                                  • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                  • API String ID: 1959693985-3505469590
                                                  • Opcode ID: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                                                  • Instruction ID: b102bb136871780b9d8de73768f7857e57e401592c8de863fd3208d8e6d9d2cb
                                                  • Opcode Fuzzy Hash: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                                                  • Instruction Fuzzy Hash: 30711576A14A05C5EF20CF25E9915A977B0FB88F98B045237EA4E8BB68CF38D944C740
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF665EF74F3,?,?,?,00007FF665EF525E,?,?,?,00007FF665EF5219), ref: 00007FF665EF7371
                                                  • GetLastError.KERNEL32(?,?,00000000,00007FF665EF74F3,?,?,?,00007FF665EF525E,?,?,?,00007FF665EF5219), ref: 00007FF665EF737F
                                                  • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF665EF74F3,?,?,?,00007FF665EF525E,?,?,?,00007FF665EF5219), ref: 00007FF665EF73A9
                                                  • FreeLibrary.KERNEL32(?,?,00000000,00007FF665EF74F3,?,?,?,00007FF665EF525E,?,?,?,00007FF665EF5219), ref: 00007FF665EF73EF
                                                  • GetProcAddress.KERNEL32(?,?,00000000,00007FF665EF74F3,?,?,?,00007FF665EF525E,?,?,?,00007FF665EF5219), ref: 00007FF665EF73FB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: api-ms-
                                                  • API String ID: 2559590344-2084034818
                                                  • Opcode ID: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                                                  • Instruction ID: f8c9602bb5fe214e1d4efc179f3f1e0cbc492004bd14b02558c9a586aa1f3d5c
                                                  • Opcode Fuzzy Hash: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                                                  • Instruction Fuzzy Hash: 0C31AF21A1AA42D1EF52AB06F90257927B4FF88FA4F594935ED2D8F394DF3CE8408710
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(?,?,?,00007FF665EF1573,?,?,?,00007FF665EF192A), ref: 00007FF665EF162B
                                                  • GetProcAddress.KERNEL32(?,?,?,00007FF665EF1573,?,?,?,00007FF665EF192A), ref: 00007FF665EF1648
                                                  • GetProcAddress.KERNEL32(?,?,?,00007FF665EF1573,?,?,?,00007FF665EF192A), ref: 00007FF665EF1664
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$HandleModule
                                                  • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                  • API String ID: 667068680-1718035505
                                                  • Opcode ID: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                                                  • Instruction ID: b8bc176e4ae2618e40d4180e259d99ba14bff043dc1bceb784f1e8c5b2eb13b7
                                                  • Opcode Fuzzy Hash: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                                                  • Instruction Fuzzy Hash: 98111EA0B19B46C1FF598B81FA6327513B56F88F94F8E5435D81D8F354EE3CAC448A40
                                                  APIs
                                                    • Part of subcall function 00007FF665ED51A4: GetVersionExW.KERNEL32 ref: 00007FF665ED51D5
                                                  • FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF665EC5AB4), ref: 00007FF665EDED8C
                                                  • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF665EC5AB4), ref: 00007FF665EDED98
                                                  • SystemTimeToTzSpecificLocalTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF665EC5AB4), ref: 00007FF665EDEDA8
                                                  • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF665EC5AB4), ref: 00007FF665EDEDB6
                                                  • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF665EC5AB4), ref: 00007FF665EDEDC4
                                                  • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF665EC5AB4), ref: 00007FF665EDEE05
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Time$File$System$Local$SpecificVersion
                                                  • String ID:
                                                  • API String ID: 2092733347-0
                                                  • Opcode ID: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                                                  • Instruction ID: 4f228730c0da78e936820b929740a86c44d554ff6ba292bff23828f65e7bd4fb
                                                  • Opcode Fuzzy Hash: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                                                  • Instruction Fuzzy Hash: E7517DB2B10A52CAEB14CF74D8451AC77B1F748B88B64413AEE0D9BB58DF38D955CB40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Time$File$System$Local$SpecificVersion
                                                  • String ID:
                                                  • API String ID: 2092733347-0
                                                  • Opcode ID: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                                                  • Instruction ID: 087c092529d82cd6464c8134da009e05438b03d500a45d2b2ebfeb520824c1ea
                                                  • Opcode Fuzzy Hash: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                                                  • Instruction Fuzzy Hash: 62313862B10A51DEFB00CFB5E8911AC3770FB18B58B54502AEE0E97A58EF38D895C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID: .rar$exe$rar$sfx
                                                  • API String ID: 3668304517-630704357
                                                  • Opcode ID: ded382a5f33e5d00d019a19aa0952dad5d31072c5da8fffb523e0446b7f74fbf
                                                  • Instruction ID: 39cdcccfeb75095d529b8345cb0d5c3f08977a223c605485004030e0716c7328
                                                  • Opcode Fuzzy Hash: ded382a5f33e5d00d019a19aa0952dad5d31072c5da8fffb523e0446b7f74fbf
                                                  • Instruction Fuzzy Hash: D1A18F22A14A06C0EF049B25DA563BC2372AF95F98F545336ED1D8B6E6DF3CE945C340
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: abort$CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 2889003569-2084237596
                                                  • Opcode ID: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                                                  • Instruction ID: 8e4878c765a5b450666a466666b16f939d89bfd92658e677944f5eca2fd8c90b
                                                  • Opcode Fuzzy Hash: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                                                  • Instruction Fuzzy Hash: 3B91B073A08B91DAEB10CB64E5412AD7BB0F794B88F10812AEE8D9BB55DF38D595C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm$f
                                                  • API String ID: 2395640692-629598281
                                                  • Opcode ID: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                                                  • Instruction ID: 9511626103bedf0c6d2ca824aeb4b048ec70a1e78921b8c7f45ec5f4f69286dc
                                                  • Opcode Fuzzy Hash: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                                                  • Instruction Fuzzy Hash: 5F518F32A19A02C6EF14CF15F945A2937A5FB90F88F51C032EA5E8B748EF78EC418740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast_invalid_parameter_noinfo_noreturn$CloseCurrentHandleProcess
                                                  • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                  • API String ID: 2102711378-639343689
                                                  • Opcode ID: cc2cdb65981a4fcc868e5d913d4f06653a23f25da57a99a038b17aaaeb8469e6
                                                  • Instruction ID: af7f3c719eaebaec5466dd49a3392218b024dd191feeb094472908cc3dcc42d2
                                                  • Opcode Fuzzy Hash: cc2cdb65981a4fcc868e5d913d4f06653a23f25da57a99a038b17aaaeb8469e6
                                                  • Instruction Fuzzy Hash: CC51AF62E08682C5FF10DB64DA532BD2771AF85BA4F440135EE6D9B696DF3CEC86C600
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Window$Show$Rect
                                                  • String ID: RarHtmlClassName
                                                  • API String ID: 2396740005-1658105358
                                                  • Opcode ID: 95333b9ad2bfddc98b100d65ee3ae7a1141886215ecc40d0d40dcbf9cb340d19
                                                  • Instruction ID: 08381d186fdc27692c367f261330480b0a9469d51bce5321ff2e61bd03bc6d66
                                                  • Opcode Fuzzy Hash: 95333b9ad2bfddc98b100d65ee3ae7a1141886215ecc40d0d40dcbf9cb340d19
                                                  • Instruction Fuzzy Hash: 77518462A197C2C6EB249B21E54637A6771FB85F80F144435EE8E8BB55DF3CE8458B00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: EnvironmentVariable$_invalid_parameter_noinfo_noreturn
                                                  • String ID: sfxcmd$sfxpar
                                                  • API String ID: 3540648995-3493335439
                                                  • Opcode ID: 42a5c16ff962b42e9c466757ddc2add4312beed441a9accfeec164922430c806
                                                  • Instruction ID: 2a0b71c7cda810e6ed5d022b0907faeeb45c1e28142cd67f8d994e9731c52ab1
                                                  • Opcode Fuzzy Hash: 42a5c16ff962b42e9c466757ddc2add4312beed441a9accfeec164922430c806
                                                  • Instruction Fuzzy Hash: FC316F72A24A46C4EF00DB69E9862AC3371FB88F98F541136EE5D9B7A9DE3CD441C344
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: RENAMEDLG$REPLACEFILEDLG
                                                  • API String ID: 0-56093855
                                                  • Opcode ID: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                                                  • Instruction ID: 0a8df626dd33e1d3177b2c14e3d76b98fdd47cd52e40805751d4882ff3a80d4f
                                                  • Opcode Fuzzy Hash: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                                                  • Instruction Fuzzy Hash: B121E561A1DAD7C1FE108BA5F94617467B1AB4AF88F640036E99DCB364DE3CED84CB40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                                                  • Instruction ID: dfe1b5c426ea613a48da97c0d5b405572a84f289b2d6a279ba87b617a44109c6
                                                  • Opcode Fuzzy Hash: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                                                  • Instruction Fuzzy Hash: 43F04F21B19A42C1EF548B11F8612796370EFC8F90F581036E94F8B665DE3CE8858B40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                                                  • Instruction ID: c8416e4fffaeb6d25bd1669a19d79c5f07ecee51576e8c638cb2d4359e1e282b
                                                  • Opcode Fuzzy Hash: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                                                  • Instruction Fuzzy Hash: D9810162F18642C5FB109B61D8666BD27B0BBA4F88F084536DD8E9B695DF3CEC41CB40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: File$Create$CloseHandleTime_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 2398171386-0
                                                  • Opcode ID: 94d33130e0d3e07453908689b86af48371af1e3e167329ed22bda644dbf2c176
                                                  • Instruction ID: 385d5c5a01bc6ede599f18072f8318a27602327eff9dde0fd0752a516eac5a00
                                                  • Opcode Fuzzy Hash: 94d33130e0d3e07453908689b86af48371af1e3e167329ed22bda644dbf2c176
                                                  • Instruction Fuzzy Hash: 9051A262B04A42D9FF50DB75E9423BD6372AB88FA8F144735EE1D8B7D8DE3898458300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
                                                  • String ID:
                                                  • API String ID: 3659116390-0
                                                  • Opcode ID: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                                                  • Instruction ID: 174f6532d750f3b91d111b3000c1720b21487b437ce59fa14a1753715cdf819b
                                                  • Opcode Fuzzy Hash: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                                                  • Instruction Fuzzy Hash: BF511132A14A51C9E710CF65E8563AD3BB1FB54B88F088136DE4E9BB98CF38D845CB40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$AllocString
                                                  • String ID:
                                                  • API String ID: 262959230-0
                                                  • Opcode ID: 8c2dc27bb1e4af113538b7172bb6dd323e96cb8c94470b0dbd49c9d6f404eed7
                                                  • Instruction ID: 58a90d664d83300e07edeabc64a57b7e07cdc20115d5dcf7f539c027eabcfad6
                                                  • Opcode Fuzzy Hash: 8c2dc27bb1e4af113538b7172bb6dd323e96cb8c94470b0dbd49c9d6f404eed7
                                                  • Instruction Fuzzy Hash: A041D661A0964AC5EF188FA1E51227923B0EF84FA4F144635FA6DCB7D5DF3CD8418300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: AddressProc
                                                  • String ID:
                                                  • API String ID: 190572456-0
                                                  • Opcode ID: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                                                  • Instruction ID: 1935793df1860438b1d0c7a188cbe76ed2d63c5282e1b34796cece51592ed8bc
                                                  • Opcode Fuzzy Hash: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                                                  • Instruction Fuzzy Hash: BF419D62B09A42C1EF258B12EA5256563A5BB84F90F094536EE6D8F794EE3CEC40C740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                                  • Instruction ID: 09e7095bbeb242c7c5e7b2849c49c959d13879f77123299ab83e02af6bc84aa1
                                                  • Opcode Fuzzy Hash: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                                  • Instruction Fuzzy Hash: C011D076E0860FC1FA240124E4A737907616F44BA0E9C4A32EA7D8F1D68EFCAC416980
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Message$DispatchObjectPeekSingleTranslateWait
                                                  • String ID:
                                                  • API String ID: 3621893840-0
                                                  • Opcode ID: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                                                  • Instruction ID: 1d953c702cb8a7a03ee3c620b5d16e9dfb00ebe90e3f9fd4d26ee06b2b8d5e49
                                                  • Opcode Fuzzy Hash: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                                                  • Instruction Fuzzy Hash: EFF0EC61B38586C2FB509771E456A762361FFA4F05F941030EA4A8A9A4DE3CE949CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: __except_validate_context_recordabort
                                                  • String ID: csm$csm
                                                  • API String ID: 746414643-3733052814
                                                  • Opcode ID: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                                                  • Instruction ID: b614c4e85fe9551e147870e0ca2b3e375864f1fc35e949e33116b7fc7275072a
                                                  • Opcode Fuzzy Hash: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                                                  • Instruction Fuzzy Hash: 40719F72A08681C6DB609F25E25177D7BB0FB85F88F148136EA4D8BA89CF3CD991C740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID: $*
                                                  • API String ID: 3215553584-3982473090
                                                  • Opcode ID: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                                                  • Instruction ID: 169927faf25ae586a025d309c838dd252ca4cdef3c1d3ec855d38f678f981054
                                                  • Opcode Fuzzy Hash: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                                                  • Instruction Fuzzy Hash: 9751477290C642CAFF648E2AE65637C3BB1FB85F18F142235E64989199CF38FC81C605
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$StringType
                                                  • String ID: $%s
                                                  • API String ID: 3586891840-3791308623
                                                  • Opcode ID: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                                                  • Instruction ID: ea8cda8bbfe87f3710397f0b810d2c913eab92f7d19553c2a5554048ab49effc
                                                  • Opcode Fuzzy Hash: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                                                  • Instruction Fuzzy Hash: 15419422B14B85CAEB618F25D8116A933E1FB44FA8F484636EE1D8B7C4DF3CE9458740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: CreateFrameInfo__except_validate_context_recordabort
                                                  • String ID: csm
                                                  • API String ID: 2466640111-1018135373
                                                  • Opcode ID: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                                                  • Instruction ID: 5484e8d9eca67363cae49a4e95a0a0dc68a1ac19ae0175e5e35169544d3c81df
                                                  • Opcode Fuzzy Hash: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                                                  • Instruction Fuzzy Hash: 91513B72618781C7EB20AB15F24226E77B4FBC9B90F145235EA8D8BB55CF38E850CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ByteCharErrorFileLastMultiWideWrite
                                                  • String ID: U
                                                  • API String ID: 2456169464-4171548499
                                                  • Opcode ID: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                                                  • Instruction ID: fbfc35e4d676d726cfe7d359e7c5d87918b7821e8cd62d714f05121b0b888557
                                                  • Opcode Fuzzy Hash: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                                                  • Instruction Fuzzy Hash: 4B419322619A81C2DB608F65E8553BA6770FB98B94F444132EE8DCB798EF7CD841CB40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ObjectRelease
                                                  • String ID:
                                                  • API String ID: 1429681911-3916222277
                                                  • Opcode ID: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                                                  • Instruction ID: 4ffccab29cf9022f04050f2e362cf46bf8b56096d0c4facf596c4c3197e22ae2
                                                  • Opcode Fuzzy Hash: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                                                  • Instruction Fuzzy Hash: 4F312B7560978287EA04DF62F819A2AB770FB89FD1F605435EE4A87B54CE3CD8498B00
                                                  APIs
                                                  • InitializeCriticalSection.KERNEL32(?,?,?,00007FF665EE317F,?,?,00001000,00007FF665ECE51D), ref: 00007FF665EDE8BB
                                                  • CreateSemaphoreW.KERNEL32(?,?,?,00007FF665EE317F,?,?,00001000,00007FF665ECE51D), ref: 00007FF665EDE8CB
                                                  • CreateEventW.KERNEL32(?,?,?,00007FF665EE317F,?,?,00001000,00007FF665ECE51D), ref: 00007FF665EDE8E4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                  • String ID: Thread pool initialization failed.
                                                  • API String ID: 3340455307-2182114853
                                                  • Opcode ID: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                                                  • Instruction ID: 9627bd646dde391f09ddb179dcc21f7126fa62c42d1aac7da2536c97143301b5
                                                  • Opcode Fuzzy Hash: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                                                  • Instruction Fuzzy Hash: 8D21A172E15A42C6FB108F24D55A3AD37B2EBC8F08F188135DA098F295CF7E9C458B80
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: CapsDeviceRelease
                                                  • String ID:
                                                  • API String ID: 127614599-3916222277
                                                  • Opcode ID: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                                                  • Instruction ID: d3a0ea30f50f4a0b99f7482b7cf3f829565764603133920d580f80d96d902041
                                                  • Opcode Fuzzy Hash: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                                                  • Instruction Fuzzy Hash: D5E08C60B08682C2EB0857B6F58A03A2361AB4CFD0F298035DA1B8B794CE3CC8854B00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$FileTime
                                                  • String ID:
                                                  • API String ID: 1137671866-0
                                                  • Opcode ID: 3e0de6b87fc756f79ac571a371d77b74ab10159eff9a06e36aa9ff194842a8ae
                                                  • Instruction ID: 1a94ff28a953794b9cf0e9f1b349bcab4d97c6f9082b7e11de2a16d33986ca2e
                                                  • Opcode Fuzzy Hash: 3e0de6b87fc756f79ac571a371d77b74ab10159eff9a06e36aa9ff194842a8ae
                                                  • Instruction Fuzzy Hash: 36A1B562A18A82C1EF10DB65EA421AD6771FFC5B84F405131FAAD8BAD9DF3DE944C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast
                                                  • String ID:
                                                  • API String ID: 1452528299-0
                                                  • Opcode ID: 4871fa0c943a6bda4a75b5c3ad29a9496d44a7a9e564bd7977e1d2a914031524
                                                  • Instruction ID: 104f869a197e8061c32a6e8250df86bd599597523fdeb2d5a0e566f9b0371fa7
                                                  • Opcode Fuzzy Hash: 4871fa0c943a6bda4a75b5c3ad29a9496d44a7a9e564bd7977e1d2a914031524
                                                  • Instruction Fuzzy Hash: CA517172F14A86D5FF009B65D5562AC2331EB85F98F404232EA5C9BB95DF3CDA45C340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: CreateCurrentDirectoryErrorFreeLastLocalProcess
                                                  • String ID:
                                                  • API String ID: 1077098981-0
                                                  • Opcode ID: 5a43cb7f5a8bc2b697eb0b834037522765625dc86c8d5e2913923eaf6a834e49
                                                  • Instruction ID: 93b9ac7c4455acb3f064ec2303be387b161224df583e31fc45deb3df4d3859e8
                                                  • Opcode Fuzzy Hash: 5a43cb7f5a8bc2b697eb0b834037522765625dc86c8d5e2913923eaf6a834e49
                                                  • Instruction Fuzzy Hash: 44513D32628B82C6EB508F61E5457AE77B4FB84B84F501036EA4D9BB58DF3CD845CB40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                                                  • String ID:
                                                  • API String ID: 4141327611-0
                                                  • Opcode ID: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                                                  • Instruction ID: 3980f2aa8adee7729fd372fb9fe290623af2a35390917e2c105a020eafd934b5
                                                  • Opcode Fuzzy Hash: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                                                  • Instruction Fuzzy Hash: D6417F26A08682C6FF659F10F346379AAB1AFC0F94F158131EA4DCFA99DE7CDC418601
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: FileMove_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 3823481717-0
                                                  • Opcode ID: 2b6e6cda77fd8470acf22c2ab4e7c3ce966b7b843ddf4af9049b565a023b9c35
                                                  • Instruction ID: be4a6625a8dbafa77f3f2f145bfbe5cf98f2b5ad19d7d7aa1409d4ea100143a8
                                                  • Opcode Fuzzy Hash: 2b6e6cda77fd8470acf22c2ab4e7c3ce966b7b843ddf4af9049b565a023b9c35
                                                  • Instruction Fuzzy Hash: 74418E62F14B51C4FF00CB75E9861AC2372BB88FA8B505235EE5DABA99DF7CD845C240
                                                  APIs
                                                  • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF665EFC45B), ref: 00007FF665F00B91
                                                  • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF665EFC45B), ref: 00007FF665F00BF3
                                                  • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF665EFC45B), ref: 00007FF665F00C2D
                                                  • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF665EFC45B), ref: 00007FF665F00C57
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ByteCharEnvironmentMultiStringsWide$Free
                                                  • String ID:
                                                  • API String ID: 1557788787-0
                                                  • Opcode ID: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                                                  • Instruction ID: 41572598d18e7526f28cadd287447d66121f780c489ad5216eff472f862baa77
                                                  • Opcode Fuzzy Hash: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                                                  • Instruction Fuzzy Hash: 73218221E18B51C1E7249F11A451029A7B8FB94FE0B4C8136DE8EABB94DF7CE8528B40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$abort
                                                  • String ID:
                                                  • API String ID: 1447195878-0
                                                  • Opcode ID: df247b5a3948333368795c339682862bf84e23f7c025c70b8dad3e7beb060077
                                                  • Instruction ID: 40fd8d48d8ada71cd39ac43cf4fb7f0f59f1cbe999886a32ed609adf3467946e
                                                  • Opcode Fuzzy Hash: df247b5a3948333368795c339682862bf84e23f7c025c70b8dad3e7beb060077
                                                  • Instruction Fuzzy Hash: F0012528A09606C2FF59A761F75B1791AB15FC4F90F084838E92ECFBD6ED2CBC408610
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: CapsDevice$Release
                                                  • String ID:
                                                  • API String ID: 1035833867-0
                                                  • Opcode ID: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                                                  • Instruction ID: 216fc93c22d0f11f3861dfe3b2234e93c903a8f9da1d4f5c2886da0e3e9938f2
                                                  • Opcode Fuzzy Hash: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                                                  • Instruction Fuzzy Hash: 11E0E5A0E09642C2FF095BB1E85A13623709F48F41F184439D91FCF390DD3C98458E14
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID: DXGIDebug.dll
                                                  • API String ID: 3668304517-540382549
                                                  • Opcode ID: fb1ea5274bf47759c68f5a3c4d742861032828cbeb5af038f443ece21ae78c4e
                                                  • Instruction ID: 0db55c78cf137cd05ad1cad023ee11da252e96a501e7dfacb5147057e758615d
                                                  • Opcode Fuzzy Hash: fb1ea5274bf47759c68f5a3c4d742861032828cbeb5af038f443ece21ae78c4e
                                                  • Instruction Fuzzy Hash: FA71AC72A14B81C6EB14CB65E9423ADB3B8FB94B94F444235EBAC4BB95DF78D461C300
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID: e+000$gfff
                                                  • API String ID: 3215553584-3030954782
                                                  • Opcode ID: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                                                  • Instruction ID: 44d16bbca26ed8b484366773160d82708dc85b99fc5e73e110c10b7a1dff29a8
                                                  • Opcode Fuzzy Hash: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                                                  • Instruction Fuzzy Hash: 8A51ED52B197C286EB658F35E64236D6BA1A7C1F90F089231D69CCBBD5DF2CE844C701
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$swprintf
                                                  • String ID: SIZE
                                                  • API String ID: 449872665-3243624926
                                                  • Opcode ID: 049592b23eccf18b91a3e94430bb7a89aa9f7458b84fc95e0ae4febadba54acb
                                                  • Instruction ID: d1949f20db4535f9cc898acbec96ebcd34d703f3912f7902095d0acba8004c68
                                                  • Opcode Fuzzy Hash: 049592b23eccf18b91a3e94430bb7a89aa9f7458b84fc95e0ae4febadba54acb
                                                  • Instruction Fuzzy Hash: 22418162A28682C5EE10DB64E9523BD6370EFD5B94F504331FA9D8A6D6EE3DD940C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: FileModuleName_invalid_parameter_noinfo
                                                  • String ID: C:\Users\user\Desktop\0438.pdf.exe
                                                  • API String ID: 3307058713-792344357
                                                  • Opcode ID: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                                                  • Instruction ID: 464aef41a56829b5a4b2438a5355f16a46dad0efb10221603cb2aee1f954b35c
                                                  • Opcode Fuzzy Hash: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                                                  • Instruction Fuzzy Hash: 5A417976A0CA56C6EB149F61F6420BC6BB4EF84FC4B544032FA4E8BB45DE3CE8818740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ItemText$DialogWindow
                                                  • String ID: ASKNEXTVOL
                                                  • API String ID: 445417207-3402441367
                                                  • Opcode ID: 97ebd98f0834f70bd8f3ada112357d921bc9d5e9383391aa045354938bfaeae3
                                                  • Instruction ID: 9506e715a707be8950db1862b6828dd8e09d669cfe211afdb69aa8d47c12a8eb
                                                  • Opcode Fuzzy Hash: 97ebd98f0834f70bd8f3ada112357d921bc9d5e9383391aa045354938bfaeae3
                                                  • Instruction Fuzzy Hash: C3417E62A186C2C1EE14AB62EA522B927B1AF85FC0F540035EE4DDF799DE3CEC418740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide_snwprintf
                                                  • String ID: $%s$@%s
                                                  • API String ID: 2650857296-834177443
                                                  • Opcode ID: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                                                  • Instruction ID: 759a8048c8ce8b7713f24ba6a1d026df0eca1dcec171e1f1cb2519952381611c
                                                  • Opcode Fuzzy Hash: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                                                  • Instruction Fuzzy Hash: 2531A472B18A46C5EE508F66EA526E923B0FB94F84F401132EE0D9F795EE3DE905C740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: FileHandleType
                                                  • String ID: @
                                                  • API String ID: 3000768030-2766056989
                                                  • Opcode ID: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                                                  • Instruction ID: 3820b4b6fbc3a5b9d7971d9594c6a1cee8fdb6fdcaf00304e6a5cc26ee9cbc1b
                                                  • Opcode Fuzzy Hash: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                                                  • Instruction Fuzzy Hash: B1217522A08E83C1EFB04B24E5911792662EB85F74F280335E66F4B7D4DE38EC85C341
                                                  APIs
                                                  • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF665EF1D3E), ref: 00007FF665EF40BC
                                                  • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF665EF1D3E), ref: 00007FF665EF4102
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                                                  • Instruction ID: 63f1790c44d8ed243a25f402b7e55b949b2da431b5a9f20bbe72bf336c267bf8
                                                  • Opcode Fuzzy Hash: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                                                  • Instruction Fuzzy Hash: C9111922608B4182EB208F15F65026977B1FB88F94F184232EA8D4B758DF3CD955CB40
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF665EDE95F,?,?,?,00007FF665ED463A,?,?,?), ref: 00007FF665EDEA63
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF665EDE95F,?,?,?,00007FF665ED463A,?,?,?), ref: 00007FF665EDEA6E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastObjectSingleWait
                                                  • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                  • API String ID: 1211598281-2248577382
                                                  • Opcode ID: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                                                  • Instruction ID: 44b8e6c165a42c7291ad8238b7e541d1bee65a7598331999bc27654a0038f25a
                                                  • Opcode Fuzzy Hash: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                                                  • Instruction Fuzzy Hash: 9EE0E5A1E19842C1EA00A720DC9746827357FA4B60F944332E43ECB1E19F7CAD458A40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1752154916.00007FF665EC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665EC0000, based on PE: true
                                                  • Associated: 00000000.00000002.1752128106.00007FF665EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752204519.00007FF665F08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F1B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752231839.00007FF665F24000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1752337122.00007FF665F2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff665ec0000_0438.jbxd
                                                  Similarity
                                                  • API ID: FindHandleModuleResource
                                                  • String ID: RTL
                                                  • API String ID: 3537982541-834975271
                                                  • Opcode ID: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                                                  • Instruction ID: fc6ad1ed701612cd936282381fbaa5e9d65e5ecfc9a9627d59e3e6ed2f237254
                                                  • Opcode Fuzzy Hash: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                                                  • Instruction Fuzzy Hash: E8D017A1F09602C2FF195B71E45A37517705F18F41F4C403AC80A8B390EE7C9998CB90